<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: XQL to detect the ScreenConnect Client in response to CVE-2024-1709 and CVE-2024-1708 in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-to-detect-the-screenconnect-client-in-response-to-cve-2024/m-p/579232#M6241</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/194856"&gt;@LtwcTeam10&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for sharing the XQL query with community. We appreciate you contribution.&lt;/P&gt;
&lt;P&gt;To learn more about Palo Alto's threat brief on it and how Palo Alto products protect against it please refer below article.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://unit42.paloaltonetworks.com/connectwise-threat-brief-cve-2024-1708-cve-2024-1709/" target="_blank"&gt;https://unit42.paloaltonetworks.com/connectwise-threat-brief-cve-2024-1708-cve-2024-1709/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 05 Mar 2024 03:22:31 GMT</pubDate>
    <dc:creator>nsinghvirk</dc:creator>
    <dc:date>2024-03-05T03:22:31Z</dc:date>
    <item>
      <title>XQL to detect the ScreenConnect Client in response to CVE-2024-1709 and CVE-2024-1708</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-to-detect-the-screenconnect-client-in-response-to-cve-2024/m-p/578389#M6148</link>
      <description>&lt;P&gt;On&amp;nbsp;February 19th ConnectWise released a security bulletin and update for their ScreenConnect software.&amp;nbsp;&amp;nbsp;&lt;A href="https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8" target="_blank"&gt;https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8&lt;/A&gt;&lt;BR /&gt;On February 20th&amp;nbsp;ConnectWise announced that exploitation had been seen in the wild.&amp;nbsp; At least one proof of concept was available at 6:27 AM UTC Feb 21&amp;nbsp;&lt;A href="https://twitter.com/watchtowrcyber/status/1760189490067390581" target="_blank"&gt;https://twitter.com/watchtowrcyber/status/1760189490067390581&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The exploit complexity was incredibly low.&amp;nbsp; A demo can be found here&amp;nbsp;&lt;SPAN&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;&lt;A class="fui-Link ___1rxvrpe f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://www.youtube.com/watch?v=ud5fp-whocs" href="https://www.youtube.com/watch?v=ud5FP-wHOcs" target="_blank" rel="noreferrer noopener" aria-label="Link https://www.youtube.com/watch?v=ud5FP-wHOcs"&gt;https://www.youtube.com/watch?v=ud5FP-wHOcs&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;The following XQL will show hosts that have the Windows ScreenConnect client on them.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;config case_sensitive = true | preset = xdr_image_load | filter actor_process_image_name =  "ScreenConnect.WindowsClient.exe" | dedup agent_hostname &lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 20:35:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-to-detect-the-screenconnect-client-in-response-to-cve-2024/m-p/578389#M6148</guid>
      <dc:creator>LtwcTeam10</dc:creator>
      <dc:date>2024-02-26T20:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: XQL to detect the ScreenConnect Client in response to CVE-2024-1709 and CVE-2024-1708</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-to-detect-the-screenconnect-client-in-response-to-cve-2024/m-p/579232#M6241</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/194856"&gt;@LtwcTeam10&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for sharing the XQL query with community. We appreciate you contribution.&lt;/P&gt;
&lt;P&gt;To learn more about Palo Alto's threat brief on it and how Palo Alto products protect against it please refer below article.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://unit42.paloaltonetworks.com/connectwise-threat-brief-cve-2024-1708-cve-2024-1709/" target="_blank"&gt;https://unit42.paloaltonetworks.com/connectwise-threat-brief-cve-2024-1708-cve-2024-1709/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2024 03:22:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-to-detect-the-screenconnect-client-in-response-to-cve-2024/m-p/579232#M6241</guid>
      <dc:creator>nsinghvirk</dc:creator>
      <dc:date>2024-03-05T03:22:31Z</dc:date>
    </item>
  </channel>
</rss>

