<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Vulnerability CVE-2023-38802 in VM-Series in the Private Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/vulnerability-cve-2023-38802/m-p/582562#M207</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to know if my firewall is affected by this vulnerability. As per the workaround inserting an "unaffected BGP router—configured to drop the invalid BGP update instead of propagating it", we have already configured "Enforce First AS for EBGP."&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="shirishkulkarni_0-1712192467884.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/58821iE84F12E97FE8FD07/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="shirishkulkarni_0-1712192467884.png" alt="shirishkulkarni_0-1712192467884.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Please confirm that by enabling above means we are unaffected or let us know the exact steps to configure in vm-palo alto firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 04 Apr 2024 01:05:38 GMT</pubDate>
    <dc:creator>shirishkulkarni</dc:creator>
    <dc:date>2024-04-04T01:05:38Z</dc:date>
    <item>
      <title>Vulnerability CVE-2023-38802</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/vulnerability-cve-2023-38802/m-p/582562#M207</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to know if my firewall is affected by this vulnerability. As per the workaround inserting an "unaffected BGP router—configured to drop the invalid BGP update instead of propagating it", we have already configured "Enforce First AS for EBGP."&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="shirishkulkarni_0-1712192467884.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/58821iE84F12E97FE8FD07/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="shirishkulkarni_0-1712192467884.png" alt="shirishkulkarni_0-1712192467884.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Please confirm that by enabling above means we are unaffected or let us know the exact steps to configure in vm-palo alto firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2024 01:05:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-private-cloud/vulnerability-cve-2023-38802/m-p/582562#M207</guid>
      <dc:creator>shirishkulkarni</dc:creator>
      <dc:date>2024-04-04T01:05:38Z</dc:date>
    </item>
  </channel>
</rss>

