<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Playbook of the Week: Using CVEs in Incident Investigation in Cortex XSOAR Articles</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-articles/playbook-of-the-week-using-cves-in-incident-investigation/ta-p/552669</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Playbook of the Week Using CVEs in Incident Investigation_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52566i7B331BE332299FFF/image-size/large?v=v2&amp;amp;px=999" role="button" title="Playbook of the Week Using CVEs in Incident Investigation_palo-alto-networks.jpg" alt="Playbook of the Week Using CVEs in Incident Investigation_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;This blog written by&amp;nbsp;Dror Avrahami&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Common Vulnerabilities and Exposures (CVE) repository is designed to provide a reference for a publicly known information security vulnerability. CVE identifiers, or CVEs, are formatted with the prefix “CVE” followed by the year and unique identifier - for example, the “log4j” vulnerability is referenced as CVE-2021-44228. CVEs are assigned by a CVE Numbering Authority (CNA). It should be noted that assigning a CVE does not automatically make it an official CVE entry, in order to avoid duplicating a previously reported CVE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have significantly revamped the way CVEs are displayed and stored as indicators within Cortex XSOAR Threat Intelligence Management (TIM). Our main goal was to store and make available as much data as possible to help you query and use CVEs whether in your incident investigations or as a tool aiding in vulnerability management in your system. In this blog, we will go over the changes made in XSOAR TIM and modifications to the CVE indicator layout to present data in a more intuitive way. We will also cover how to install these changes to your TIM module.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A id="post-300087-_psucv4hi54ww" target="_blank"&gt;&lt;/A&gt;&lt;STRONG&gt;&lt;FONT size="5" color="#FF6600"&gt;Layout Changes&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;FIGURE id="attachment_300088" class="wp-caption aligncenter" aria-describedby="caption-attachment-300088"&gt;
&lt;DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;FIGCAPTION id="caption-attachment-300088" class="wp-caption-text"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 1: New CVE display layout in XSOAR TIM" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52555i6901B447E017B1F4/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 1-New-CVE-display-layout-in-XSOAR-TIM_palo-alto-networks.png" alt="Fig 1: New CVE display layout in XSOAR TIM" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Fig 1: New CVE display layout in XSOAR TIM&lt;/span&gt;&lt;/span&gt;&lt;/FIGCAPTION&gt;
&lt;/FIGURE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The new layout presents an analyst with detailed information about a CVE and the system(s) it affects, making it easy to build queries and playbooks with rich CVE data.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;A id="post-300087-_36lro1tn95w0" target="_blank"&gt;&lt;/A&gt;&lt;STRONG&gt;&lt;FONT size="5" color="#FF6600"&gt;CVSS Score&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CVSS score is now displayed in its own section and is color coordinated according to the CVE CVSS score. The score will display the CVE indicator verdict and will adjust its icon accordingly. This will now be the case across all CVE indicators in XSOAR thanks to an updated reputation script (CveReputationV2) which sets the correct XSOAR score according to the CVSS score.&lt;/P&gt;
&lt;FIGURE id="attachment_300624" class="wp-caption aligncenter" aria-describedby="caption-attachment-300624"&gt;
&lt;DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;FIGCAPTION id="caption-attachment-300624" class="wp-caption-text"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 2: CVE score display in XSOAR TIM" style="width: 886px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52556i2DECC3AA9A2EB2E5/image-dimensions/886x314?v=v2" width="886" height="314" role="button" title="Fig 2-CVE-score-display-in-XSOAR-TIM_palo-alto-networks.png" alt="Fig 2: CVE score display in XSOAR TIM" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Fig 2: CVE score display in XSOAR TIM&lt;/span&gt;&lt;/span&gt;&lt;/FIGCAPTION&gt;
&lt;/FIGURE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When a CVE has no CVSS score, it will display as “N\A” and the text color will be adjusted according to the color scheme set by the user:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CVE-has-no-CVSS-score_palo-alto-networks.png" style="width: 770px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52557iD7AAA8113147DD24/image-size/large?v=v2&amp;amp;px=999" role="button" title="CVE-has-no-CVSS-score_palo-alto-networks.png" alt="CVE-has-no-CVSS-score_palo-alto-networks.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 3: CVE score display with no score is defined" style="width: 278px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52558iC420E3FD8421691D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 3-CVE-score-display-with-no-score-is-defined_palo-alto-networks.png" alt="Fig 3: CVE score display with no score is defined" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Fig 3: CVE score display with no score is defined&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CVSS score is stored in two different fields:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Cvssscore (searchable)&lt;/LI&gt;
&lt;LI&gt;cvss.Score (JSON format)&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;A id="post-300087-_8vvrq668pph2" target="_blank"&gt;&lt;/A&gt;&lt;STRONG&gt;&lt;FONT size="5" color="#FF6600"&gt;CPEs Tags and Relationships&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another enhancement includes the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Vulnerable Products&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;section which is dedicated to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://en.wikipedia.org/wiki/Common_Platform_Enumeration" target="_blank" rel="nofollow,noopener"&gt;Common Platform Enumerations&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;(CPEs). In this section, the analyst can now find a full list of all the CPEs relevant to the CVE.&lt;/P&gt;
&lt;FIGURE id="attachment_300214" class="wp-caption aligncenter" aria-describedby="caption-attachment-300214"&gt;
&lt;DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;FIGCAPTION id="caption-attachment-300214" class="wp-caption-text"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 4: List of CPEs relevant to CVE" style="width: 883px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52559i21ED8267075A52D2/image-dimensions/883x637?v=v2" width="883" height="637" role="button" title="Fig 4-List-of-CPEs-relevant-to-CVE_palo-alto-networks.png" alt="Fig 4: List of CPEs relevant to CVE" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Fig 4: List of CPEs relevant to CVE&lt;/span&gt;&lt;/span&gt;&lt;/FIGCAPTION&gt;
&lt;/FIGURE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CPEs are parsed according to the their format:&lt;/P&gt;
&lt;P&gt;cpe:&amp;lt;cpe_version&amp;gt;:&amp;lt;part&amp;gt;:&amp;lt;vendor&amp;gt;:&amp;lt;product&amp;gt;:&amp;lt;version&amp;gt;:&amp;lt;update&amp;gt;:&amp;lt;edition&amp;gt;:&amp;lt;language&amp;gt;:&amp;lt;sw_edition&amp;gt;:&amp;lt;target_sw&amp;gt;:&amp;lt;target_hw&amp;gt;:&amp;lt;other&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The following sections are parsed and exported:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Part&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;- Tagged as Operating-System, Hardware, or Software accordingly.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Vendor&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;- Will be&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;tagged&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;and a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;relationship&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;created to an&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Identity&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;type indicator.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Product&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;- Will be&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;tagged&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;relationship&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;created to a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Software&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;type indicator.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;The extraction will remove escape characters and capitalize the results.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 5: Extracted text from CPE display in XSOAR TIM" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52560i70E0A1E86C2AD2D1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Fig 5-Extracted-text-from-CPE-display-in-XSOAR-TIM_palo-alto-networks.png" alt="Fig 5: Extracted text from CPE display in XSOAR TIM" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Fig 5: Extracted text from CPE display in XSOAR TIM&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;FIGURE id="attachment_300242" class="wp-caption aligncenter" aria-describedby="caption-attachment-300242"&gt;
&lt;DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;FIGCAPTION id="caption-attachment-300242" class="wp-caption-text"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 6: Vulnerability tags" style="width: 888px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52561iAFC7C09964236428/image-dimensions/888x281?v=v2" width="888" height="281" role="button" title="Fig 6-Vulnerability-tags_palo-alto-networks.png" alt="Fig 6: Vulnerability tags" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Fig 6: Vulnerability tags&lt;/span&gt;&lt;/span&gt;&lt;/FIGCAPTION&gt;
&lt;/FIGURE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;A id="post-300087-_jidgxp69zir5" target="_blank"&gt;&lt;/A&gt;&lt;STRONG&gt;&lt;FONT size="5" color="#FF6600"&gt;CWE-ID&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Those of you with a keen sense of sight will notice that the CVE also has a tag named&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;NVD-CWE-Other.&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;This tag is created when no&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://en.wikipedia.org/wiki/Common_Weakness_Enumeration" target="_blank" rel="nofollow,noopener"&gt;Common Weakness Enumeration&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(CWE) is found. When a CWE is found, the tag will point to the correct CWE ID. The CWE provides additional details about the type of vulnerability in that specific CVE, including its name, description, likelihood of exploit, examples of vulnerabilities in which the weakness is used, detection methods, and more. For example, in the picture below we can see CWE-416 which is the ID of the vulnerability known as “&lt;A href="https://cwe.mitre.org/data/definitions/416.html" target="_blank" rel="nofollow,noopener"&gt;Use After Free&lt;/A&gt;”.&lt;/P&gt;
&lt;FIGURE id="attachment_300256" class="wp-caption aligncenter" aria-describedby="caption-attachment-300256"&gt;
&lt;DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;FIGCAPTION id="caption-attachment-300256" class="wp-caption-text"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 7: CWE vulnerability details" style="width: 892px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52562i557FC8CD46490A3B/image-dimensions/892x288?v=v2" width="892" height="288" role="button" title="Fig 7-CWE-vulnerability-details_palo-alto-networks.png" alt="Fig 7: CWE vulnerability details" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Fig 7: CWE vulnerability details&lt;/span&gt;&lt;/span&gt;&lt;/FIGCAPTION&gt;
&lt;/FIGURE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;A id="post-300087-_6mx36ylc83dh" target="_blank"&gt;&lt;/A&gt;&lt;STRONG&gt;&lt;FONT size="5" color="#FF6600"&gt;CVSS Table&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Another section that got a small facelift is the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;CVSS Table&lt;/STRONG&gt;. The section will now display the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;CVSS Version&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;that was used to calculate the score, the full&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;CVSS Vector&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and a table of the values used to calculate the score.&lt;/P&gt;
&lt;FIGURE id="attachment_300270" class="wp-caption aligncenter" aria-describedby="caption-attachment-300270"&gt;
&lt;DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;FIGCAPTION id="caption-attachment-300270" class="wp-caption-text"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 8: CVSS Table" style="width: 892px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52563i7B29149BAC533E29/image-dimensions/892x425?v=v2" width="892" height="425" role="button" title="Fig 8-CVSS-Table_palo-alto-networks.png" alt="Fig 8: CVSS Table" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Fig 8: CVSS Table&lt;/span&gt;&lt;/span&gt;&lt;/FIGCAPTION&gt;
&lt;/FIGURE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CVSS version is extracted according to the specific vector in order to avoid mistakes in the data. The table is flexible and contextual, so version changes such as CVSS 3.0, 3.1, and 4.0 changes will not affect what is displayed for CVSS 2.0.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Relevant publications can now be properly exported and these are available in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Additional Details&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;tab under&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Publications&lt;/STRONG&gt;.&lt;/P&gt;
&lt;FIGURE id="attachment_300284" class="wp-caption aligncenter" aria-describedby="caption-attachment-300284"&gt;
&lt;DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;FIGCAPTION id="caption-attachment-300284" class="wp-caption-text"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 9: Relevant publications" style="width: 893px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52564iBB05097F9DE8AC93/image-dimensions/893x344?v=v2" width="893" height="344" role="button" title="Fig 9-Relevant-publications_palo-alto-networks.png" alt="Fig 9: Relevant publications" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Fig 9: Relevant publications&lt;/span&gt;&lt;/span&gt;&lt;/FIGCAPTION&gt;
&lt;/FIGURE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These changes will allow you to better incorporate CVE data into your various playbooks and workflow jobs. The additional data allows for better visibility into CVEs impacting your organization and provides more info for threat hunting and security updates.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;A id="post-300087-_lhvcq2z8i34v" target="_blank"&gt;&lt;/A&gt;&lt;STRONG&gt;&lt;FONT size="5" color="#FF6600"&gt;Installing the New Content Packs&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As this is a big change, there are multiple content packs that need to be updated. Most can automatically be updated but the Common Type content packs need additional steps as described below.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;A href="https://cortex.marketplace.pan.dev/marketplace/details/CommonTypes/" target="_blank" rel="nofollow,noopener"&gt;Common Types&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://cortex.marketplace.pan.dev/marketplace/details/Base/" target="_blank" rel="nofollow,noopener"&gt;Base&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://cortex.marketplace.pan.dev/marketplace/details/CommonScripts/" target="_blank" rel="nofollow,noopener"&gt;Common Scripts&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://cortex.marketplace.pan.dev/marketplace/details/CIRCL/" target="_blank" rel="nofollow,noopener"&gt;CIRCL&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(We will use CIRCL CVE Search integration)&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;A id="post-300087-_b2xb60upqhrb" target="_blank"&gt;&lt;/A&gt;&lt;STRONG&gt;&lt;FONT size="5" color="#FF6600"&gt;Common Types Content Pack installation&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When updating layouts and indicators in TIM, we have to update the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Common Types&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;content pack (where the indicator types and layouts are configured).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;A id="post-300087-_ttx5aw7zgwb9" target="_blank"&gt;&lt;/A&gt;&lt;STRONG&gt;Automated Update&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Be careful, do not use this method if you have configured custom mapping for any of your indicators!&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The easiest way to update this pack is to delete the existing pack on your XSOAR instance and reinstall the latest version. This will automatically rebuild the mapping from the context to the correct indicator fields.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;A id="post-300087-_1vc1vcxjl5m3" target="_blank"&gt;&lt;/A&gt;&lt;STRONG&gt;Manual Update&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Use this method if you have changed indicators mappings in the past&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Update your&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Common Types&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;content pack and go to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Settings&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;\&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Object Setup&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;\&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Indicators&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;CVE&lt;/STRONG&gt;. Press the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Edit&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;button and move to the second tab called&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Custom Fields&lt;/STRONG&gt;. Now we will have to set the mapping manually, so TIM will be able to pull the enriched data from the CVE context in XSOAR:&lt;/P&gt;
&lt;FIGURE id="attachment_300638" class="wp-caption aligncenter" aria-describedby="caption-attachment-300638"&gt;
&lt;DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;FIGCAPTION id="caption-attachment-300638" class="wp-caption-text"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Fig 10: Series of screenshot of the XSOAR UI" style="width: 747px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52565iEC955C2A10527843/image-dimensions/747x682?v=v2" width="747" height="682" role="button" title="Fig 10-Series-of-screenshot-of-the-XSOAR-UI_palo-alto-networks.png" alt="Fig 10: Series of screenshot of the XSOAR UI" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Fig 10: Series of screenshot of the XSOAR UI&lt;/span&gt;&lt;/span&gt;&lt;/FIGCAPTION&gt;
&lt;/FIGURE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After configuring these fields press&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Save&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;A id="post-300087-_kq5evimb29ys" target="_blank"&gt;&lt;/A&gt;&lt;STRONG&gt;&lt;FONT size="5" color="#FF6600"&gt;Base Content Pack Installation&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As some new fields were added to the CVE class&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Base&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;needs to be updated to accommodate those. As this is just new content, go ahead and update the pack, No special care is needed here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;A id="post-300087-_75nllm3og1n6" target="_blank"&gt;&lt;/A&gt;&lt;STRONG&gt;&lt;FONT size="5" color="#FF6600"&gt;Common Scripts Content Pack Installation&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since we are integrating a few new scripts (dynamic ones and a reputation script for CVEs), we must also update this pack. As this is new content, just go ahead and update the pack. No special care is needed here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;A id="post-300087-_3idi37drlbtr" target="_blank"&gt;&lt;/A&gt;&lt;STRONG&gt;&lt;FONT size="5" color="#FF6600"&gt;CIRCL Integration Content Pack Installation&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only integration that supports all of these new features at the moment is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;CIRCL CVE Search&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(formerly known as CVE Search). You can download the pack and install the integration, no API Key is needed, this is a free&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://cortex.marketplace.pan.dev/marketplace/details/FreeEnrichers/" target="_blank" rel="nofollow,noopener"&gt;&lt;STRONG&gt;Plug &amp;amp; Enrich&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;enricher&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;available as part of the TIM module.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Fri, 11 Apr 2025 01:53:01 GMT</pubDate>
    <dc:creator>emgarcia</dc:creator>
    <dc:date>2025-04-11T01:53:01Z</dc:date>
    <item>
      <title>Playbook of the Week: Using CVEs in Incident Investigation</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-articles/playbook-of-the-week-using-cves-in-incident-investigation/ta-p/552669</link>
      <description>&lt;P&gt;&lt;SPAN&gt;The Common Vulnerabilities and Exposures (CVE) repository is designed to provide a reference for a publicly known information security vulnerability.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Playbook of the Week Using CVEs in Incident Investigation_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/52567i6D5D4ECAEC71E893/image-size/large?v=v2&amp;amp;px=999" role="button" title="Playbook of the Week Using CVEs in Incident Investigation_palo-alto-networks.jpg" alt="Playbook of the Week Using CVEs in Incident Investigation_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2025 01:53:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-articles/playbook-of-the-week-using-cves-in-incident-investigation/ta-p/552669</guid>
      <dc:creator>emgarcia</dc:creator>
      <dc:date>2025-04-11T01:53:01Z</dc:date>
    </item>
  </channel>
</rss>

