<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Applying Vulnerability Protection to GlobalProtect Interfaces in GlobalProtect Articles</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/ta-p/340184</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Summary&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This document discusses the configuration steps for applying a vulnerability protection security profile to GlobalProtect interface, in order to protect the GlobalProtect services from attacks using published product security vulnerabilities.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Background&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In customer deployments that use GlobalProtect for remote access, customers often configure and apply security profiles such as vulnerability protection to network traffic between VPN clients and internal network zones.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are also certain circumstances where a customer may want to apply a vulnerability protection profile to traffic hitting the GlobalProtect portal and gateway services, which are served by the firewall and not just traffic going through the firewall into the network. For example, there may be situations where a customer wants to block attempted attacks before they are able to upgrade PAN-OS to a patched version. This can be accomplished by applying a properly configured vulnerability protection profile to a firewall rule that is configured to apply to traffic hitting the GlobalProtect portal and gateway services hosted by the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note 1:&lt;/STRONG&gt; &lt;SPAN&gt;4/14/2024: A hotfix for each of the PAN-OS versions (10.2, 11.0, 11.1) affected by&amp;nbsp;CVE-2024-3400 is now available in the Customer Support Portal (&lt;/SPAN&gt;&lt;STRONG&gt;&lt;A href="https://support.paloaltonetworks.com/Updates/SoftwareUpdates/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://support.paloaltonetworks.com/Updates/SoftwareUpdates/&amp;amp;source=gmail&amp;amp;ust=1713249852722000&amp;amp;usg=AOvVaw29BBKXvJyZJ93MEpyHWvKG"&gt;CSP&lt;/A&gt;&lt;/STRONG&gt;&lt;SPAN&gt;) and inside PAN-OS (both NGFWs and Panorama). An ETA for other commonly deployed versions of PAN-OS is available on the product security advisory fo&lt;/SPAN&gt;r &lt;STRONG&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://security.paloaltonetworks.com/CVE-2024-3400&amp;amp;source=gmail&amp;amp;ust=1713249852722000&amp;amp;usg=AOvVaw0h2yo1Bz7MTwX1GDejNxUf"&gt;CVE-2024-3400&lt;/A&gt;&lt;/STRONG&gt;.&lt;SPAN&gt; It is recommended to apply this hotfix and also complete the mitigations recommended in the advisory.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note 2:&lt;/STRONG&gt; This document uses &lt;SPAN&gt;CVE-2024-3400&lt;/SPAN&gt; as an example in this how-to guide, where vulnerability protection signature #&lt;SPAN&gt;95187&lt;/SPAN&gt; was released in content version &lt;SPAN&gt;8833-8682&lt;/SPAN&gt;, released on &lt;SPAN&gt;4/11/2024&lt;/SPAN&gt; to detect and prevent attempted attacks. The vulnerability affected GlobalProtect portal and gateway services. This document assumes that the firewall is already configured and used as a GlobalProtect portal and/or gateway service.&lt;/P&gt;
&lt;H6&gt;&amp;nbsp;&lt;/H6&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Configuration Steps:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 1: Ensure that you have the latest content update installed that includes the relevant threat protection&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Make sure the content version that you are running includes the threat signature(s) that need to be applied to the GlobalProtect interfaces in order to block the attack.&lt;/LI&gt;
&lt;LI&gt;In the example used in this document, the minimum content version required is &lt;SPAN&gt;8833-8682&lt;/SPAN&gt;, which was released on &lt;SPAN&gt;4/11/2024&lt;/SPAN&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 2: Determine the correct zone for GP portal and GP gateway&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;UL&gt;
&lt;LI&gt;If a GP Portal is configured, go to &lt;I&gt;Network &amp;gt; GlobalProtect &amp;gt; Portals&lt;/I&gt;&amp;nbsp;and find the portal and associated interface. In the example below, you will see we are using &lt;STRONG&gt;GP-Auto-Portal1 &lt;/STRONG&gt;as an example. The interface that the portal connects to is shown to be&amp;nbsp;&lt;STRONG&gt;&lt;STRONG&gt;ethernet1/1&lt;/STRONG&gt;.&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GlobalProtect Step 2.png" style="width: 512px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20743iB043183AB63472FC/image-size/large?v=v2&amp;amp;px=999" role="button" title="GlobalProtect Step 2.png" alt="GlobalProtect Step 2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Determine the associated zone for the GlobalProtect portal that includes the interface found in the previous step. &lt;BR /&gt;Go to &lt;I&gt;Network &amp;gt; Interfaces &amp;gt; Ethernet.&lt;/I&gt;&amp;nbsp;In the example below, we can see that interface ethernet1/1 is in &lt;STRONG&gt;GP-untrust zone&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GlobalProtect Step 2.1.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20744iACEBB58A366540A4/image-size/large?v=v2&amp;amp;px=999" role="button" title="GlobalProtect Step 2.1.png" alt="GlobalProtect Step 2.1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;If a GlobalProtect gateway is configured, go to &lt;I&gt;Network &amp;gt; GlobalProtect &amp;gt; Gateways&lt;/I&gt;&amp;nbsp;and find the gateway and associated interface. In the example below, you will see we are using &lt;STRONG&gt;GP-GW1&lt;/STRONG&gt; as an example. The interface is &lt;STRONG&gt;loopback.1&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GlobalProtect Step 2.2.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20745i6381592E61E007E2/image-size/large?v=v2&amp;amp;px=999" role="button" title="GlobalProtect Step 2.2.png" alt="GlobalProtect Step 2.2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Determine the zone associated with the GlobalProtect gateway. Go to &lt;I&gt;Network &amp;gt; Interfaces &amp;gt; Loopback&lt;/I&gt;. We can see that interface &lt;STRONG&gt;loopback.1&lt;/STRONG&gt; is also in &lt;STRONG&gt;GP-untrust zone&lt;/STRONG&gt;. Now we know the zone for the portal and gateway, which we need to protect with a vulnerability protection profile.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GlobalProtect step 2.3.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20746iCD1B89EE89DCC212/image-size/large?v=v2&amp;amp;px=999" role="button" title="GlobalProtect step 2.3.png" alt="GlobalProtect step 2.3.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 3: Modify or Create a New Vulnerability Protection Profile&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Configure a new or existing vulnerability profile that is specifically configured to block the relevant threat impacting the GlobalProtect services. Go to &lt;I&gt;Objects &amp;gt; Security Profiles &amp;gt; Vulnerability Protection&lt;/I&gt;. We recommend as a best practice to simply set the blocking action of “reset-server” for all critical severity signature triggers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GlobalProtect Step 3.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20747i9E969116846D2A7F/image-size/large?v=v2&amp;amp;px=999" role="button" title="GlobalProtect Step 3.png" alt="GlobalProtect Step 3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Alternatively, you can add an exception specifically for the relevant signature (#&lt;SPAN&gt;95187&lt;/SPAN&gt; in this case) to configure the reset-server action for this signature when it triggers (see below).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-04-14 at 8.33.05 AM.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59052iD8C3BB565473E629/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2024-04-14 at 8.33.05 AM.png" alt="Screenshot 2024-04-14 at 8.33.05 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 4: Modify or create a firewall security rule&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;After modifying or creating a new vulnerability protection object, verify what security policies were in place to protect GlobalProtect services, and add newly created Vulnerability Protection Profile. If you already have a customized / Best Practices Profile attached to your security policy, please go back to Step 3 and amend your existing Vulnerability Protection Profile instead of creating a new one.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;If you did not have an existing security policy and rule in place, then go ahead and create a security rule to apply the vulnerability protection profile to. Go to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;Policies &amp;gt; Security&lt;/I&gt;. Create a new policy. In this example, we name it “block_gp_vulnerability.” The source zone should be “any” and the destination zone is the GlobalProtect gateway and/or GlobalProtect portal zones we found in step 1. Assign to this rule the Vulnerability Protection Profile you modified or created in step 3. Please make sure that the rest of the the applied policy and security policies follow our&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/best-practices" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://docs.paloaltonetworks.com/best-practices&amp;amp;source=gmail&amp;amp;ust=1713217477189000&amp;amp;usg=AOvVaw2Gx6vV8z85OJ5ziFVHUPcs"&gt;best practices guides&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GlobalProtect Step 4.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20749i7004237E22D988AC/image-size/large?v=v2&amp;amp;px=999" role="button" title="GlobalProtect Step 4.png" alt="GlobalProtect Step 4.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step 5: Commit&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Commit the changes to apply the new Vulnerability Protection Profile to the Security Rule protecting the GP Portal and/or Gateway.&amp;nbsp; Any attempted attacks against the GlobalProtect services that attempt to use this specific vulnerability will be blocked and logged in the threat log.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 id="toc-hId-1663738456"&gt;&lt;STRONG&gt;FAQ:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="p-rich_text_section"&gt;&lt;STRONG data-stringify-type="bold"&gt;Is GlobalProtect enabled?&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;UL class="p-rich_text_list p-rich_text_list__bullet" data-stringify-type="unordered-list" data-indent="0" data-border="0"&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;You can verify by checking for entries in your firewall web interface (Network &amp;gt; GlobalProtect)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="p-rich_text_section"&gt;&lt;STRONG data-stringify-type="bold"&gt;Am I compromised?&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;UL class="p-rich_text_list p-rich_text_list__bullet" data-stringify-type="unordered-list" data-indent="0" data-border="0"&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;You can upload a technical support file (TSF) to Customer Support Portal (CSP) after opening a case to determine if your firewall device(s) match(es) known indicators of compromise (IoC).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="p-rich_text_section"&gt;
&lt;DIV class="p-rich_text_section"&gt;&lt;STRONG data-stringify-type="bold"&gt;What do I need to do?&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;UL class="p-rich_text_list p-rich_text_list__bullet" data-stringify-type="unordered-list" data-indent="0" data-border="0"&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;Review the output of technical support file (TSF) analysis (see above question) to understand the level of attempted exploitation and remediation steps provided in the Unit 42&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="c-link c-link--focus-visible" href="https://unit42.paloaltonetworks.com/cve-2024-3400/" target="_blank" rel="noopener noreferrer" data-stringify-link="https://unit42.paloaltonetworks.com/cve-2024-3400/" data-sk="tooltip_parent"&gt;Threat Brief&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for CVE-2024-3400.&lt;/LI&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;As a best practice, we strongly recommend all customers apply the Threat Prevention signature with Threat ID 95187 and 95189 (available in Applications and Threats content version 8835-8689 and later), and apply&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="c-link c-link--focus-visible" href="https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/ta-p/340184" target="_blank" rel="noopener noreferrer" data-stringify-link="https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/ta-p/340184" data-sk="tooltip_parent"&gt;vulnerability protection&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to their GlobalProtect interface.&lt;/LI&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;After completing above steps we strongly recommend installing the hotfix listed in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="c-link c-link--focus-visible" href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer" data-stringify-link="https://security.paloaltonetworks.com/CVE-2024-3400" data-sk="tooltip_parent"&gt;advisory&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for your impacted PAN-OS devices.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="p-rich_text_section"&gt;&lt;STRONG data-stringify-type="bold"&gt;Is Prisma Access or Cloud NGFW impacted by this vulnerability?&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;UL class="p-rich_text_list p-rich_text_list__bullet" data-stringify-type="unordered-list" data-indent="0" data-border="0"&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;Prisma Access and Cloud NGFW are not impacted by this vulnerability.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="p-rich_text_section"&gt;&lt;STRONG data-stringify-type="bold"&gt;What PAN-OS versions are affected?&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;UL class="p-rich_text_list p-rich_text_list__bullet" data-stringify-type="unordered-list" data-indent="0" data-border="0"&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;This affects PAN-OS versions 10.2 and greater.&lt;/LI&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;Hotfixes are released for PAN-OS 10.2, 11.0 and 11.1 branches. Please refer to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="c-link c-link--focus-visible" tabindex="-1" href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer" data-stringify-link="https://security.paloaltonetworks.com/CVE-2024-3400" data-sk="tooltip_parent" data-remove-tab-index="true"&gt;security advisory&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for more information.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="p-rich_text_section"&gt;&lt;STRONG data-stringify-type="bold"&gt;Is disabling telemetry an effective mitigation strategy?&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;UL class="p-rich_text_list p-rich_text_list__bullet" data-stringify-type="unordered-list" data-indent="0" data-border="0"&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;In earlier versions of the advisory, disabling device telemetry was listed as a secondary mitigation action. Disabling device telemetry is no longer an effective mitigation. Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="p-rich_text_section"&gt;&lt;STRONG data-stringify-type="bold"&gt;How can I look for IoCs and research a potential compromise?&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;UL class="p-rich_text_list p-rich_text_list__bullet" data-stringify-type="unordered-list" data-indent="0" data-border="0"&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;Please refer to the Unit42 Threat Brief (&lt;A class="c-link c-link--focus-visible" tabindex="-1" href="https://unit42.paloaltonetworks.com/cve-2024-3400/" target="_blank" rel="noopener noreferrer" data-stringify-link="https://unit42.paloaltonetworks.com/cve-2024-3400/" data-sk="tooltip_parent" data-remove-tab-index="true"&gt;https://unit42.paloaltonetworks.com/cve-2024-3400/&lt;/A&gt;) and the Volexity blog post (&lt;A class="c-link c-link--focus-visible" tabindex="-1" href="https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/" target="_blank" rel="noopener noreferrer" data-stringify-link="https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/" data-sk="tooltip_parent" data-remove-tab-index="true"&gt;https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/&lt;/A&gt;) for the latest information.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="p-rich_text_section"&gt;&lt;STRONG data-stringify-type="bold"&gt;I applied the hotfix; how can I confirm I’m now “clean”?&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;UL class="p-rich_text_list p-rich_text_list__bullet" data-stringify-type="unordered-list" data-indent="0" data-border="0"&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;Before rebooting into the hotfix it is recommended that you take a TSF and upload for analysis on any level of compromise and take the recommended remediation actions if appropriate&lt;/LI&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;After remediating if needed, upgrading and booting into the hotfix, you can verify that you are running the fixed version of code by running the “show system info” CLI command and checking the sw-version field against what is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="c-link c-link--focus-visible" tabindex="-1" href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer" data-stringify-link="https://security.paloaltonetworks.com/CVE-2024-3400" data-sk="tooltip_parent" data-remove-tab-index="true"&gt;published as fixed in the CVE&lt;/A&gt;.&lt;/LI&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;You can upload the new TSF for analysis and confirmation that no further indicators of compromise are seen from the upgraded device.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="p-rich_text_section"&gt;&lt;STRONG data-stringify-type="bold"&gt;Additional Resources on CVE-2024-3400:&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;UL class="p-rich_text_list p-rich_text_list__bullet" data-stringify-type="unordered-list" data-indent="0" data-border="0"&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;&lt;A class="c-link c-link--focus-visible" tabindex="-1" href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer" data-stringify-link="https://security.paloaltonetworks.com/CVE-2024-3400" data-sk="tooltip_parent" data-remove-tab-index="true"&gt;Security Advisory Page&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;&lt;A class="c-link c-link--focus-visible" tabindex="-1" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CrM5CAK" target="_blank" rel="noopener noreferrer" data-stringify-link="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CrM5CAK" data-sk="tooltip_parent" data-remove-tab-index="true"&gt;Knowledge Base Article&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;&lt;A class="c-link c-link--focus-visible" tabindex="-1" href="https://unit42.paloaltonetworks.com/cve-2024-3400/" target="_blank" rel="noopener noreferrer" data-stringify-link="https://unit42.paloaltonetworks.com/cve-2024-3400/" data-sk="tooltip_parent" data-remove-tab-index="true"&gt;UNIT42 on CVE-2024-3400&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;&lt;A class="c-link c-link--focus-visible" tabindex="-1" href="https://www.paloaltonetworks.com/blog/2024/04/more-on-the-pan-os-cve/" target="_blank" rel="noopener noreferrer" data-stringify-link="https://www.paloaltonetworks.com/blog/2024/04/more-on-the-pan-os-cve/" data-sk="tooltip_parent" data-remove-tab-index="true"&gt;More on CVE-2024-3400&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
    <pubDate>Wed, 24 Apr 2024 17:11:20 GMT</pubDate>
    <dc:creator>maurisy</dc:creator>
    <dc:date>2024-04-24T17:11:20Z</dc:date>
    <item>
      <title>Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/ta-p/340184</link>
      <description>&lt;P&gt;View the configuration steps for applying a vulnerability protection security profile to GlobalProtect.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 17:11:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/ta-p/340184</guid>
      <dc:creator>maurisy</dc:creator>
      <dc:date>2024-04-24T17:11:20Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583477#M75</link>
      <description>&lt;P&gt;I upgraded to version 8833, but signature ID 95187 is not visible.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 07:51:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583477#M75</guid>
      <dc:creator>BYUNGKWON-LEE</dc:creator>
      <dc:date>2024-04-12T07:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583478#M76</link>
      <description>&lt;P&gt;Yep, it was not there.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 08:06:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583478#M76</guid>
      <dc:creator>cciwa-admin</dc:creator>
      <dc:date>2024-04-12T08:06:45Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583479#M77</link>
      <description>&lt;P&gt;Same here&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 08:14:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583479#M77</guid>
      <dc:creator>ipohlschneider</dc:creator>
      <dc:date>2024-04-12T08:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583480#M78</link>
      <description>&lt;P&gt;I confirm, ThreatID 95187 not present in content update 8833-8682&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 08:16:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583480#M78</guid>
      <dc:creator>SomeSuch</dc:creator>
      <dc:date>2024-04-12T08:16:49Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583481#M79</link>
      <description>&lt;P&gt;upgraded to 8833-8682, cannot find 95187&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 08:17:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583481#M79</guid>
      <dc:creator>B.Yeung</dc:creator>
      <dc:date>2024-04-12T08:17:31Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583482#M80</link>
      <description>&lt;P&gt;95187 is in the release notes, but searching for it in the profile editing section yields no results.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 08:21:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583482#M80</guid>
      <dc:creator>michelealbrigo</dc:creator>
      <dc:date>2024-04-12T08:21:06Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583485#M81</link>
      <description>&lt;P&gt;Same issue as the above users 95187 is missing.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 08:24:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583485#M81</guid>
      <dc:creator>RyanMinty</dc:creator>
      <dc:date>2024-04-12T08:24:39Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583489#M82</link>
      <description>app only shows the signature. However, the signature for app+threat is not visible.</description>
      <pubDate>Fri, 12 Apr 2024 08:30:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583489#M82</guid>
      <dc:creator>BYUNGKWON-LEE</dc:creator>
      <dc:date>2024-04-12T08:30:08Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583496#M83</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Same issue there is no 95187 in PAN-OS content update 8833-8682&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 09:09:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583496#M83</guid>
      <dc:creator>hien.vo</dc:creator>
      <dc:date>2024-04-12T09:09:47Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583499#M84</link>
      <description>&lt;P&gt;it is visible in CLI, but not gui&lt;/P&gt;&lt;P&gt;show threat id 95187&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;This signature detects malicious payload in HTTPS request.&lt;/P&gt;&lt;P&gt;critical&lt;BR /&gt;Unknown&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 09:19:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583499#M84</guid>
      <dc:creator>chagberg</dc:creator>
      <dc:date>2024-04-12T09:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583500#M85</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Apparently none of the new vulnerability signatures added to content release&amp;nbsp;8833 are visible, not only&amp;nbsp;signature ID 95187.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is everybody experiencing this same issue?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 09:19:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583500#M85</guid>
      <dc:creator>Gustor</dc:creator>
      <dc:date>2024-04-12T09:19:52Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583502#M86</link>
      <description>&lt;P&gt;I found the following article about missing threat ID's:&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008U27CAE" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008U27CAE&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 09:32:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583502#M86</guid>
      <dc:creator>Gustor</dc:creator>
      <dc:date>2024-04-12T09:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583511#M87</link>
      <description>&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008U27CAE" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008U27CAE&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I follow this article to use cli to add, although after added gui still not seen 95187, but total exceptions increase one.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 09:38:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583511#M87</guid>
      <dc:creator>B.Yeung</dc:creator>
      <dc:date>2024-04-12T09:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583512#M88</link>
      <description>&lt;P&gt;anyone know why threat id 95187 is showing threat name 'Malicious HTTPS Request Detection' and not related to the actual command injection vulnerability ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 09:43:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583512#M88</guid>
      <dc:creator>Gurminder_Birdee</dc:creator>
      <dc:date>2024-04-12T09:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583513#M89</link>
      <description>&lt;P&gt;I reverted the app and deleted 8833, then downloaded the app again and reinstalled it to solve the problem.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 09:48:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583513#M89</guid>
      <dc:creator>BYUNGKWON-LEE</dc:creator>
      <dc:date>2024-04-12T09:48:56Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583514#M90</link>
      <description>&lt;P&gt;Yeah, I think we all have same problem here, after updating the threat &amp;amp; apps, we couldn't find the Threat ID&amp;nbsp;&lt;SPAN&gt;95187, it's strange, pls let me know if there's an update&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 09:50:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583514#M90</guid>
      <dc:creator>bachtiar.adiguna</dc:creator>
      <dc:date>2024-04-12T09:50:01Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583516#M91</link>
      <description>&lt;P&gt;same issue with&amp;nbsp;&lt;SPAN&gt;95187 not showing&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 10:21:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583516#M91</guid>
      <dc:creator>GarethBulleyGarethBulley</dc:creator>
      <dc:date>2024-04-12T10:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583519#M92</link>
      <description>&lt;P&gt;did the same as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/137526"&gt;@BYUNGKWON-LEE&lt;/a&gt;,&amp;nbsp;and it now shows up in GUI.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 10:32:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583519#M92</guid>
      <dc:creator>chagberg</dc:creator>
      <dc:date>2024-04-12T10:32:17Z</dc:date>
    </item>
    <item>
      <title>Betreff: Applying Vulnerability Protection to GlobalProtect Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583521#M93</link>
      <description>&lt;P&gt;same here,&amp;nbsp;&lt;SPAN&gt;95187 not showing&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 10:54:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/tac-p/583521#M93</guid>
      <dc:creator>SOMJOB</dc:creator>
      <dc:date>2024-04-12T10:54:15Z</dc:date>
    </item>
  </channel>
</rss>

