<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to enable signature of Unique threat id in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-enable-signature-of-unique-threat-id/m-p/430830#M1296</link>
    <description>&lt;P&gt;&lt;SPAN&gt;You can mitigate this vulnerability by having traffic that routes to the management interface be scanned by a Vulnerability Protection profile which should be set to reset-both on High severity vulnerabilities. Since the firewall does not run IPS on the traffic destined to the management *port*, the recommendation implies that you would either force management traffic through the firewall, or migrate the WebUI management of the device to a data port for in-band management (where the Vulnerability Protection profile can scan the traffic) using an interface management profile, and/or, mitigate risk by restricting access to the management port. This is covered in our documentation at &lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html" target="_blank" rel="noopener" data-aura-rendered-by="120:6;a"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Other than the in-band solution, a few ways to force traffic through the firewall for out of band management are to:&lt;BR /&gt;&lt;BR /&gt;1) Create a Layer 3 interface in a spare data port on a separate Management Zone, associate a management interface profile to it, and define all service routes to source from this interface. Define an intrazone security policy for the Management Zone with an associated Vulnerability Protection profile to have the traffic scanned. This solution requires a single spare data port.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;or,&lt;/P&gt;
&lt;P&gt;2)&amp;nbsp;Create a vWire on two data ports, connect one port of the vWire to the management port and another to your management network switch. Define a security policy for the vWire with an associated Vulnerability Protection profile to have the traffic scanned. This solution requires two spare data ports. The advantage in this scenario is that it provides true management isolation and that for any required services that do not honor Service Routes, traffic will continue to source from the Management port.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By the way, 10.1.2 and 9.1.11 have already released.&lt;/P&gt;</description>
    <pubDate>Wed, 01 Sep 2021 17:50:41 GMT</pubDate>
    <dc:creator>mivaldi</dc:creator>
    <dc:date>2021-09-01T17:50:41Z</dc:date>
    <item>
      <title>How to enable signature of Unique threat id</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-enable-signature-of-unique-threat-id/m-p/430814#M1295</link>
      <description>&lt;DIV&gt;Hello guys hope you doing well I had one question this vulnerability is resolved in the unstable version of PANOS as I see we want to enable the Unique id signature because the affected version is 9.1.4 and 10.0.0 so what should I do to enable this unique threat id.&amp;nbsp;&lt;SPAN&gt;what will be the impact to end users, If we go ahead with the workaround&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;CVE-2021-3050 PAN-OS: OS Command Injection Vulnerability in Web Interface&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;Description&lt;/DIV&gt;&lt;DIV&gt;An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to execute arbitrary OS commands to escalate privileges.&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;Solution:&lt;/DIV&gt;&lt;DIV&gt;We intend to fix this issue in PAN-OS 9.0.15 (ETA&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Object"&gt;November 2021&lt;/SPAN&gt;), PAN-OS 9.1.11 (ETA&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Object"&gt;September 2021&lt;/SPAN&gt;), PAN-OS 10.0.8 (ETA&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Object"&gt;September 2021&lt;/SPAN&gt;), PAN-OS 10.1.2 (ETA&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="Object"&gt;September 2021&lt;/SPAN&gt;) and all later PAN-OS versions.&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;Workarounds and Mitigations:&lt;/DIV&gt;&lt;DIV&gt;Enable signatures for Unique Threat ID 91439 on traffic destined for the web interface to block attacks against CVE-2021-3050&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Wed, 01 Sep 2021 17:09:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-enable-signature-of-unique-threat-id/m-p/430814#M1295</guid>
      <dc:creator>FarhanKoujalgi</dc:creator>
      <dc:date>2021-09-01T17:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable signature of Unique threat id</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-enable-signature-of-unique-threat-id/m-p/430830#M1296</link>
      <description>&lt;P&gt;&lt;SPAN&gt;You can mitigate this vulnerability by having traffic that routes to the management interface be scanned by a Vulnerability Protection profile which should be set to reset-both on High severity vulnerabilities. Since the firewall does not run IPS on the traffic destined to the management *port*, the recommendation implies that you would either force management traffic through the firewall, or migrate the WebUI management of the device to a data port for in-band management (where the Vulnerability Protection profile can scan the traffic) using an interface management profile, and/or, mitigate risk by restricting access to the management port. This is covered in our documentation at &lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html" target="_blank" rel="noopener" data-aura-rendered-by="120:6;a"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Other than the in-band solution, a few ways to force traffic through the firewall for out of band management are to:&lt;BR /&gt;&lt;BR /&gt;1) Create a Layer 3 interface in a spare data port on a separate Management Zone, associate a management interface profile to it, and define all service routes to source from this interface. Define an intrazone security policy for the Management Zone with an associated Vulnerability Protection profile to have the traffic scanned. This solution requires a single spare data port.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;or,&lt;/P&gt;
&lt;P&gt;2)&amp;nbsp;Create a vWire on two data ports, connect one port of the vWire to the management port and another to your management network switch. Define a security policy for the vWire with an associated Vulnerability Protection profile to have the traffic scanned. This solution requires two spare data ports. The advantage in this scenario is that it provides true management isolation and that for any required services that do not honor Service Routes, traffic will continue to source from the Management port.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By the way, 10.1.2 and 9.1.11 have already released.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Sep 2021 17:50:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-enable-signature-of-unique-threat-id/m-p/430830#M1296</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2021-09-01T17:50:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable signature of Unique threat id</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-enable-signature-of-unique-threat-id/m-p/431305#M1300</link>
      <description>&lt;P&gt;Is there any docs where we can enable the Unique Threat ID on the firewall or we should check the vulnerability severity is apply on the management port interface and 10.1.2&amp;nbsp; or 9.1.11 are not stable yet and also should this issue is not resolved in stable version 9.1.10 and 10.0.6.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Sep 2021 06:14:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/how-to-enable-signature-of-unique-threat-id/m-p/431305#M1300</guid>
      <dc:creator>FarhanKoujalgi</dc:creator>
      <dc:date>2021-09-03T06:14:49Z</dc:date>
    </item>
  </channel>
</rss>

