<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: False positive - Cisco HyperFlex HX Remote Command Execution - ID: 91836 in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-cisco-hyperflex-hx-remote-command-execution-id/m-p/443579#M1353</link>
    <description>&lt;P&gt;Should be fixed soon.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 26 Oct 2021 21:01:31 GMT</pubDate>
    <dc:creator>vasinghal</dc:creator>
    <dc:date>2021-10-26T21:01:31Z</dc:date>
    <item>
      <title>False positive - Cisco HyperFlex HX Remote Command Execution - ID: 91836</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-cisco-hyperflex-hx-remote-command-execution-id/m-p/443526#M1352</link>
      <description>&lt;P&gt;Beginning this morning we are seeing lots of apparent false positives for threat ID: 91836 - Cisco HyperFlex HX RCE, which was added to the threat database last night. The destination server is in Wells Fargo IP space and we have determined that this is users trying to log into Wells Fargo online banking at:&lt;/P&gt;&lt;P&gt;&lt;A href="https://connect.secure.wellsfargo.com/auth/login/present" target="_blank"&gt;https://connect.secure.wellsfargo.com/auth/login/present&lt;/A&gt;?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This appears to be happening either on redirect of the initial user/pass login POST or a subsequent MFA page, and the users are getting a generic login error response do to the PA threat detection resetting the connection. I do not have a Wells Fargo account to fully test and full packet capture is going to be tricky as these are users' personal accounts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is anyone else seeing this threat detection and can confirm the destination, offer additional debugging?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 18:04:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-cisco-hyperflex-hx-remote-command-execution-id/m-p/443526#M1352</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2021-10-26T18:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: False positive - Cisco HyperFlex HX Remote Command Execution - ID: 91836</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-cisco-hyperflex-hx-remote-command-execution-id/m-p/443579#M1353</link>
      <description>&lt;P&gt;Should be fixed soon.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Oct 2021 21:01:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-cisco-hyperflex-hx-remote-command-execution-id/m-p/443579#M1353</guid>
      <dc:creator>vasinghal</dc:creator>
      <dc:date>2021-10-26T21:01:31Z</dc:date>
    </item>
    <item>
      <title>Re: False positive - Cisco HyperFlex HX Remote Command Execution - ID: 91836</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-cisco-hyperflex-hx-remote-command-execution-id/m-p/443965#M1358</link>
      <description>&lt;P&gt;It appears that this has been fixed in the App-Threat-8478-7015 release. We were unable to replicate the problem today (prior release -8477-7011 was flagging).&lt;/P&gt;</description>
      <pubDate>Thu, 28 Oct 2021 02:34:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/false-positive-cisco-hyperflex-hx-remote-command-execution-id/m-p/443965#M1358</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2021-10-28T02:34:47Z</dc:date>
    </item>
  </channel>
</rss>

