<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Certificate vulnerabilities in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/certificate-vulnerabilities/m-p/439385#M1335</link>
    <description>&lt;DIV class="wDYxhc"&gt;&lt;DIV class="LGOjhe"&gt;&lt;SPAN class="ILfuVd"&gt;&lt;SPAN class="hgKElc"&gt;Vulnerabilities in SSL Certificate is a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Self Signed&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is a Medium risk vulnerability that is also high frequency and high visibility. This is the most severe combination of security factors that exists and it is extremely important to find it on your network and fix it as soon as possible.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="g"&gt;&lt;DIV&gt;&lt;DIV class="tF2Cxc"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="tF2Cxc"&gt;&lt;A href="https://www.mybpcreditcard.pro/" target="_self"&gt;www.mybpcreditcard.com&lt;/A&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Fri, 08 Oct 2021 07:10:32 GMT</pubDate>
    <dc:creator>Wallace15</dc:creator>
    <dc:date>2021-10-08T07:10:32Z</dc:date>
    <item>
      <title>Certificate vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/certificate-vulnerabilities/m-p/438679#M1332</link>
      <description>&lt;P&gt;I have found several of my network devices are showing up within our vulnerability management scanner with&amp;nbsp;&lt;STRONG&gt;X.509 Certificate Subject CN does not match the entity name&amp;nbsp;&lt;/STRONG&gt;as a vulnerability. This is more than likely a DNS issue as I do not have any network devices with DNS records. I have been told conflicting opinions and would like to know how do I find the best practices on this finding. Which one would be the most accurate process that I should follow:&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;It is best practice not to place DNS records on my network devices as it will make them unrecognizable on the public-facing side. Therefore, security by obscurity.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Attempt to place DNS records as this secures all devices and allows for security teams to identify and ensure that these devices are behaving as needed through the SIEM.&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Oct 2021 03:30:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/certificate-vulnerabilities/m-p/438679#M1332</guid>
      <dc:creator>mcruz10</dc:creator>
      <dc:date>2021-10-05T03:30:18Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/certificate-vulnerabilities/m-p/439264#M1333</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;This can be several things or steps to remediate. Yes you should at least be running PKI certs from your internal cert authority, AD is great for this. Also the device that is performing the scans need to have those PKI root certs imported so that it can validate the internal PKI you are using.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope I got the question interpreted correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Wed, 06 Oct 2021 21:33:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/certificate-vulnerabilities/m-p/439264#M1333</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-10-06T21:33:39Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/certificate-vulnerabilities/m-p/439385#M1335</link>
      <description>&lt;DIV class="wDYxhc"&gt;&lt;DIV class="LGOjhe"&gt;&lt;SPAN class="ILfuVd"&gt;&lt;SPAN class="hgKElc"&gt;Vulnerabilities in SSL Certificate is a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Self Signed&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is a Medium risk vulnerability that is also high frequency and high visibility. This is the most severe combination of security factors that exists and it is extremely important to find it on your network and fix it as soon as possible.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="g"&gt;&lt;DIV&gt;&lt;DIV class="tF2Cxc"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="tF2Cxc"&gt;&lt;A href="https://www.mybpcreditcard.pro/" target="_self"&gt;www.mybpcreditcard.com&lt;/A&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 08 Oct 2021 07:10:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/certificate-vulnerabilities/m-p/439385#M1335</guid>
      <dc:creator>Wallace15</dc:creator>
      <dc:date>2021-10-08T07:10:32Z</dc:date>
    </item>
  </channel>
</rss>

