<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Alert ID 95501 Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594764#M3588</link>
    <description>&lt;P&gt;Hello, You need to update your license server.&lt;BR /&gt;Palo updated their threat database :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="alixc_0-1723562035926.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/61469i7E4265C8CE38029C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="alixc_0-1723562035926.png" alt="alixc_0-1723562035926.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit : I just saw, you installed the patch ..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 13 Aug 2024 15:16:35 GMT</pubDate>
    <dc:creator>alix-c</dc:creator>
    <dc:date>2024-08-13T15:16:35Z</dc:date>
    <item>
      <title>Alert ID 95501 Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594689#M3569</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;After installing the last content update (&lt;A href="https://proditpdownloads.paloaltonetworks.com/content/content-8880-8907.html?__token__=exp=1724141521~acl=/content/content-8880-8907.html*~hmac=1db8a0453380feaed30e6acb96df65d1a9c07f4e7ebe53abb34ad3cffda87f9d" target="_blank" rel="noopener"&gt;https://proditpdownloads.paloaltonetworks.com/content/content-8880-8907.html?__token__=exp=1724141521~acl=/content/content-8880-8907.html*~hmac=1db8a0453380feaed30e6acb96df65d1a9c07f4e7ebe53abb34ad3cffda87f9d&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;I have a lot of traffic blocked from my servers to the licence microsoft server. But the licence servers get the patch from microsoft (CVE-2024-38077). Does anyone have the same problem ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Other question more technical:&amp;nbsp; I configured Ip address exemption (licence servers ) on my IPS profile with the 'alert' action for this signature. Could you confirm, if this signature match other servers, traffic will still be blocked?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit: I have found the answer for IP-address-exemptions behaviour,&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UscCAE" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UscCAE&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I opened a tac case as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 13:15:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594689#M3569</guid>
      <dc:creator>RomainSalmon</dc:creator>
      <dc:date>2024-08-13T13:15:29Z</dc:date>
    </item>
    <item>
      <title>Re: Alert ID 95501 Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594692#M3570</link>
      <description>&lt;P&gt;Yes, we have the same issue!&lt;BR /&gt;We rolled back the update and disabled threat prevention update's as a temporary solution.&lt;BR /&gt;We also made a case with Palo Alto.&lt;BR /&gt;It looks like it also blocks none malicious traffic&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 09:20:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594692#M3570</guid>
      <dc:creator>Wijnand343</dc:creator>
      <dc:date>2024-08-13T09:20:30Z</dc:date>
    </item>
    <item>
      <title>Re: Alert ID 95501 Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594693#M3571</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello thanks for your reply. Concerning 'We rolled back the update and disabled threat prevention as a temporary solution.' : i cannot do this for securiy reasons, it's safer to disable only the signature if you want my opinion. If you have news from Palo Alto&amp;nbsp; : i m all ears.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 09:11:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594693#M3571</guid>
      <dc:creator>RomainSalmon</dc:creator>
      <dc:date>2024-08-13T09:11:59Z</dc:date>
    </item>
    <item>
      <title>Re: Alert ID 95501 Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594697#M3575</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I will continue to work with you to answer your queries and provide the necessary technical assistance. &lt;BR /&gt;&lt;BR /&gt;As per the case description, I understand that you updated the content version to 8880 and after that, you noticed the traffic stopped working, once reverted the issue is resolved. &lt;BR /&gt;&lt;BR /&gt;Kindly note that content 8880 provided coverage for a critical remote code execution vulnerability CVE-2024-38077 on Windows &lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38077" target="_blank" rel="noopener"&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38077&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The first thing to understand about vulnerability signatures is that these are just alerting you of any possible exploitation. They are only telling you that the firewall has detected a stream of traffic that matches a known signature for a vulnerability. It doesn't mean you have been exploited by someone.&lt;BR /&gt;&lt;BR /&gt;Windows remote desktop licensing service is prone to a remote code execution vulnerability while parsing certain crafted DCE/RPC requests. The vulnerability is due to the lack of proper checks in DCE/RPC requests, leading to an exploitable remote code execution. An attacker could exploit the vulnerability by sending a crafted DCE/RPC request. A successful attack could lead to remote code execution&lt;BR /&gt;&lt;BR /&gt;Can you please verify if the Remote Desktop Licensing Service is activated in your environment? &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 09:22:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594697#M3575</guid>
      <dc:creator>Wijnand343</dc:creator>
      <dc:date>2024-08-13T09:22:19Z</dc:date>
    </item>
    <item>
      <title>Re: Alert ID 95501 Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594698#M3576</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Update:&lt;BR /&gt;As per the case description, I understand that you updated the content version to 8880 and after that, you noticed the traffic stopped working, once reverted the issue is resolved. &lt;BR /&gt;&lt;BR /&gt;Kindly note that content 8880 provided coverage for a critical remote code execution vulnerability CVE-2024-38077 on Windows &lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38077" target="_blank" rel="noopener"&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38077&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The first thing to understand about vulnerability signatures is that these are just alerting you of any possible exploitation. They are only telling you that the firewall has detected a stream of traffic that matches a known signature for a vulnerability. It doesn't mean you have been exploited by someone.&lt;BR /&gt;&lt;BR /&gt;Windows remote desktop licensing service is prone to a remote code execution vulnerability while parsing certain crafted DCE/RPC requests. The vulnerability is due to the lack of proper checks in DCE/RPC requests, leading to an exploitable remote code execution. An attacker could exploit the vulnerability by sending a crafted DCE/RPC request. A successful attack could lead to remote code execution.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 09:27:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594698#M3576</guid>
      <dc:creator>Wijnand343</dc:creator>
      <dc:date>2024-08-13T09:27:09Z</dc:date>
    </item>
    <item>
      <title>Re: Alert ID 95501 Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594700#M3577</link>
      <description>&lt;P&gt;Update:&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Yes, we are seeing multiple internal reports with False positives, at this stage, we are reviewing the signature with engineering for a possible false positive. &lt;BR /&gt;&lt;BR /&gt;I will keep you updated! &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 09:30:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594700#M3577</guid>
      <dc:creator>Wijnand343</dc:creator>
      <dc:date>2024-08-13T09:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: Alert ID 95501 Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594711#M3578</link>
      <description>&lt;P&gt;On our side we just put the "Vulnerability Protection" to None on the matching security policy, waiting now for the corrective patch from Palo Alto.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 11:50:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594711#M3578</guid>
      <dc:creator>CSavoy</dc:creator>
      <dc:date>2024-08-13T11:50:32Z</dc:date>
    </item>
    <item>
      <title>Re: Alert ID 95501 Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594727#M3581</link>
      <description>&lt;P&gt;You can set an Exception for ID 95501 in your Vulnerability Protection Profile and set the Action to "alert".&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 12:41:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594727#M3581</guid>
      <dc:creator>starki</dc:creator>
      <dc:date>2024-08-13T12:41:34Z</dc:date>
    </item>
    <item>
      <title>Re: Alert ID 95501 Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594732#M3582</link>
      <description>&lt;P&gt;same issues here. Did make an exception.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 12:53:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594732#M3582</guid>
      <dc:creator>BrianClausen</dc:creator>
      <dc:date>2024-08-13T12:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: Alert ID 95501 Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594737#M3586</link>
      <description>&lt;P&gt;Same issue, added exception for now&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 13:13:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594737#M3586</guid>
      <dc:creator>R.Ilves</dc:creator>
      <dc:date>2024-08-13T13:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: Alert ID 95501 Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594764#M3588</link>
      <description>&lt;P&gt;Hello, You need to update your license server.&lt;BR /&gt;Palo updated their threat database :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="alixc_0-1723562035926.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/61469i7E4265C8CE38029C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="alixc_0-1723562035926.png" alt="alixc_0-1723562035926.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit : I just saw, you installed the patch ..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 15:16:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594764#M3588</guid>
      <dc:creator>alix-c</dc:creator>
      <dc:date>2024-08-13T15:16:35Z</dc:date>
    </item>
    <item>
      <title>Re: Alert ID 95501 Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594802#M3590</link>
      <description>&lt;P&gt;It looks like this specific content update (8880-8907) has been withdrawn. It is no longer visible at the Dynamic Updates or downloadable from the Customer Portal.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 18:42:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594802#M3590</guid>
      <dc:creator>Tamas_Arato</dc:creator>
      <dc:date>2024-08-13T18:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: Alert ID 95501 Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594815#M3591</link>
      <description>&lt;P&gt;Update : it's official they are working on it :&amp;nbsp;Version 8881 -&amp;nbsp;signature disabled to address a possible fp issue&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 20:36:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594815#M3591</guid>
      <dc:creator>RomainSalmon</dc:creator>
      <dc:date>2024-08-13T20:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: Alert ID 95501 Microsoft Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594925#M3595</link>
      <description>&lt;P&gt;looks like they resolved the issue as the exception added is now removed.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2024 14:49:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/alert-id-95501-microsoft-windows-remote-desktop-licensing/m-p/594925#M3595</guid>
      <dc:creator>mtwinam</dc:creator>
      <dc:date>2024-08-14T14:49:30Z</dc:date>
    </item>
  </channel>
</rss>

