<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability found on Firewall Need to address in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/383919#M1064</link>
    <description>&lt;P&gt;The release notes for 9.1.5 didn't include it but it was issue&amp;nbsp;PAN-110168. I tested it in the lab and I actually see it was fixed earlier than stated in our notes (I see it fixed in 9.1.4, where the "&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Strict-Transport-Security&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;: max-age=31536000" header is included).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="s2"&gt;For jQuery the issue id is&amp;nbsp;PAN-147254 and the fix has not been released yet, however, we released a Security Advisory letting our customers know that even though the version of jQuery is outdated,&amp;nbsp;&lt;SPAN&gt;the conditions required for exploiting this vulnerability in jQuery do not exist in PAN-OS. You can find this information in&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2020-0007" target="_blank"&gt;https://security.paloaltonetworks.com/PAN-SA-2020-0007&lt;/A&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 04 Feb 2021 18:28:41 GMT</pubDate>
    <dc:creator>mivaldi</dc:creator>
    <dc:date>2021-02-04T18:28:41Z</dc:date>
    <item>
      <title>Vulnerability found on Firewall Need to address</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/383031#M1042</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are getting following vulnerabilities on one of our PA Firewall. Kindly suggest the next PoA regarding mentioned vulnerabilities.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE width="800"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="59"&gt;&lt;P&gt;&lt;STRONG&gt;Plugin&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="216"&gt;&lt;P&gt;&lt;STRONG&gt;Plugin Name&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="107"&gt;&lt;P&gt;&lt;STRONG&gt;Family&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="65"&gt;&lt;P&gt;&lt;STRONG&gt;Severity&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="85"&gt;&lt;P&gt;&lt;STRONG&gt;IP Address&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="72"&gt;&lt;P&gt;&lt;STRONG&gt;Type&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="56"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD width="140"&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="59"&gt;&lt;P&gt;84502&lt;/P&gt;&lt;/TD&gt;&lt;TD width="216"&gt;&lt;P&gt;HSTS Missing From HTTPS Server&lt;/P&gt;&lt;/TD&gt;&lt;TD width="107"&gt;&lt;P&gt;Web Servers&lt;/P&gt;&lt;/TD&gt;&lt;TD width="65"&gt;&lt;P&gt;Medium&lt;/P&gt;&lt;/TD&gt;&lt;TD width="85"&gt;&lt;P&gt;x.x.x.x&lt;/P&gt;&lt;/TD&gt;&lt;TD width="72"&gt;&lt;P&gt;&lt;STRONG&gt;Palo Alto&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="56"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD width="140"&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="59"&gt;&lt;P&gt;136929&lt;/P&gt;&lt;/TD&gt;&lt;TD width="216"&gt;&lt;P&gt;JQuery 1.2 &amp;lt; 3.5.0 Multiple XSS&lt;/P&gt;&lt;/TD&gt;&lt;TD width="107"&gt;&lt;P&gt;CGI abuses : XSS&lt;/P&gt;&lt;/TD&gt;&lt;TD width="65"&gt;&lt;P&gt;Medium&lt;/P&gt;&lt;/TD&gt;&lt;TD width="85"&gt;&lt;P&gt;x.x.x.x&lt;/P&gt;&lt;/TD&gt;&lt;TD width="72"&gt;&lt;P&gt;&lt;STRONG&gt;Palo Alto&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="56"&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD width="140"&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly review and share us with your inputs. Awaiting for response !!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Sahul Hameed&lt;/P&gt;</description>
      <pubDate>Sat, 30 Jan 2021 07:27:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/383031#M1042</guid>
      <dc:creator>SahulH</dc:creator>
      <dc:date>2021-01-30T07:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability found on Firewall Need to address</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/383394#M1056</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am wondering if you could share a little more info,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What scanner is this ?&lt;/P&gt;&lt;P&gt;Am I correct in assuming you are scanning the mgmt&amp;nbsp; of the PA ?&lt;/P&gt;&lt;P&gt;What Version of code is your PA running ?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2021 11:05:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/383394#M1056</guid>
      <dc:creator>laurence64</dc:creator>
      <dc:date>2021-02-02T11:05:47Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability found on Firewall Need to address</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/383591#M1058</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/163815"&gt;@laurence64&lt;/a&gt;-- Please find the answer for your queries below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What scanner is this ? -- Ans.. Nessus Vulnerability Scanner&lt;/P&gt;&lt;P&gt;Am I correct in assuming you are scanning the mgmt of the PA ? Ans.. Yes, scanned the MGMT interface only&lt;/P&gt;&lt;P&gt;What Version of code is your PA running ? Ans.. PAN OS 9.1.3-h1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do let us know if you need any other information. Awaiting for your reply !!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Sahul Hameed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 09:49:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/383591#M1058</guid>
      <dc:creator>SahulH</dc:creator>
      <dc:date>2021-02-03T09:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability found on Firewall Need to address</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/383714#M1060</link>
      <description>&lt;P&gt;HSTS issue was resolved in 9.1.5&lt;/P&gt;
&lt;P&gt;JQuery is targeted to be resolved in 9.1.8&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 20:40:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/383714#M1060</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2021-02-03T20:40:43Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability found on Firewall Need to address</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/383773#M1062</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34186"&gt;@mivaldi&lt;/a&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="XzvDs _208Ie _3ogUL cw1QM _2QAo- _25MYV _2CDc4 public-DraftStyleDefault-block-depth0 public-DraftStyleDefault-text-ltr"&gt;Will try by upgrading the firewall to 9.1.5 to see whether it helps us on this.&lt;/P&gt;&lt;DIV class="XzvDs _208Ie _3ogUL cw1QM _2QAo- _25MYV _2CDc4 public-DraftStyleDefault-block-depth0 public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P class="XzvDs _208Ie _3ogUL cw1QM _2QAo- _25MYV _2CDc4 public-DraftStyleDefault-block-depth0 public-DraftStyleDefault-text-ltr"&gt;Also can you please share me with the reference document that points this point that HSTS issue was resolved in 9.1.5 and JQuery is targeted to resolved in 9.1.8 software code. This will help us for reference.&lt;/P&gt;&lt;DIV class="XzvDs _208Ie _3ogUL cw1QM _2QAo- _25MYV _2CDc4 public-DraftStyleDefault-block-depth0 public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P class="XzvDs _208Ie _3ogUL cw1QM _2QAo- _25MYV _2CDc4 public-DraftStyleDefault-block-depth0 public-DraftStyleDefault-text-ltr"&gt;Best Regards,&lt;/P&gt;&lt;P class="XzvDs _208Ie _3ogUL cw1QM _2QAo- _25MYV _2CDc4 public-DraftStyleDefault-block-depth0 public-DraftStyleDefault-text-ltr"&gt;Sahul Hameed&lt;/P&gt;</description>
      <pubDate>Thu, 04 Feb 2021 09:11:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/383773#M1062</guid>
      <dc:creator>SahulH</dc:creator>
      <dc:date>2021-02-04T09:11:28Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability found on Firewall Need to address</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/383919#M1064</link>
      <description>&lt;P&gt;The release notes for 9.1.5 didn't include it but it was issue&amp;nbsp;PAN-110168. I tested it in the lab and I actually see it was fixed earlier than stated in our notes (I see it fixed in 9.1.4, where the "&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Strict-Transport-Security&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;: max-age=31536000" header is included).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="s2"&gt;For jQuery the issue id is&amp;nbsp;PAN-147254 and the fix has not been released yet, however, we released a Security Advisory letting our customers know that even though the version of jQuery is outdated,&amp;nbsp;&lt;SPAN&gt;the conditions required for exploiting this vulnerability in jQuery do not exist in PAN-OS. You can find this information in&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2020-0007" target="_blank"&gt;https://security.paloaltonetworks.com/PAN-SA-2020-0007&lt;/A&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Feb 2021 18:28:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/383919#M1064</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2021-02-04T18:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability found on Firewall Need to address</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/441958#M1345</link>
      <description>&lt;P&gt;Is there a fix for this in the 8.1.x train? or are we required to upgrade to 9.1.x?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Oct 2021 17:26:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/441958#M1345</guid>
      <dc:creator>LCMember2975</dc:creator>
      <dc:date>2021-10-19T17:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability found on Firewall Need to address</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/442041#M1347</link>
      <description>&lt;P&gt;PAN-110168 was fixed in PAN-OS 8.1.9. It can be found in the release note.&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-release-notes/pan-os-8-1-addressed-issues/pan-os-8-1-9-addressed-issues.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-release-notes/pan-os-8-1-addressed-issues/pan-os-8-1-9-addressed-issues.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN-147254: jQuery was upgraded to 3.5.1 in PAN-OS 8.1.19.&lt;BR /&gt;At this time, OSS listing still shows 3.4.1. Palo Alto Networks is working on the documentation.&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/oss-listings/pan-os-oss-listings/pan-os-8-1-open-source-software-oss-listing.html" target="_blank"&gt;https://docs.paloaltonetworks.com/oss-listings/pan-os-oss-listings/pan-os-8-1-open-source-software-oss-listing.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 00:45:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-found-on-firewall-need-to-address/m-p/442041#M1347</guid>
      <dc:creator>ymiyashita</dc:creator>
      <dc:date>2021-10-20T00:45:58Z</dc:date>
    </item>
  </channel>
</rss>

