<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2021-44790 &amp;amp; CVE-2021-44224 in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2021-44790-amp-cve-2021-44224/m-p/465765#M1499</link>
    <description>&lt;P&gt;thanks for your helpful response. All questions answered&lt;/P&gt;&lt;P class="lia-align-right"&gt;&lt;A href="https://slopegame3d.com" target="_self"&gt;&lt;FONT size="1 2 3 4 5 6 7" color="#FFFFFF"&gt;slope game&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 15 Feb 2022 05:11:40 GMT</pubDate>
    <dc:creator>marxcaro</dc:creator>
    <dc:date>2022-02-15T05:11:40Z</dc:date>
    <item>
      <title>CVE-2021-44790 &amp; CVE-2021-44224</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2021-44790-amp-cve-2021-44224/m-p/455642#M1439</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;we are using Paloalto firewall 3060 with OS version 8.1.7&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is there any updated info regarding this vulnerability CVE-2021-44790 &amp;amp; CVE-2021-44224? Has Paloalto found a way to mitigate this vulnerability?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please advise&lt;/P&gt;</description>
      <pubDate>Tue, 28 Dec 2021 04:12:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2021-44790-amp-cve-2021-44224/m-p/455642#M1439</guid>
      <dc:creator>ChandraAlem</dc:creator>
      <dc:date>2021-12-28T04:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44790 &amp; CVE-2021-44224</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2021-44790-amp-cve-2021-44224/m-p/455659#M1440</link>
      <description>&lt;P&gt;Hi there&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would do the following:&lt;/P&gt;&lt;P&gt;- for your inbound rule, from internet to DMZ and your webserver on App-ID ssl, or web-browsing if you’re doing ssl decryption, I would add URL as a match criteria. Add a custom URL category containing the FQDN based URLs for you website. domain.com/ and *.domain.com/. This will prevent the scanners from abusing your website by purely using IP. With CVE-2021-44228 we’ve seen IP based scans, and this config would stop successful scans&lt;/P&gt;&lt;P&gt;- SSL Inbound Inspection. Use it for all your services, including for the internal services. By doing this you gain full visibility, for App-ID, and for IoC signatures. You are also then able to add even more granular URLs in your custom category in the match criteria&lt;/P&gt;&lt;P&gt;- I haven’t found details on how and what body headers needs to be modified to abuse this vulnerability, but the SSL decryption will make it possible to read these headers when the IPS signatures are to be available.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;GT&lt;/P&gt;</description>
      <pubDate>Tue, 28 Dec 2021 06:38:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2021-44790-amp-cve-2021-44224/m-p/455659#M1440</guid>
      <dc:creator>gorantomte</dc:creator>
      <dc:date>2021-12-28T06:38:15Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2021-44790 &amp; CVE-2021-44224</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2021-44790-amp-cve-2021-44224/m-p/465765#M1499</link>
      <description>&lt;P&gt;thanks for your helpful response. All questions answered&lt;/P&gt;&lt;P class="lia-align-right"&gt;&lt;A href="https://slopegame3d.com" target="_self"&gt;&lt;FONT size="1 2 3 4 5 6 7" color="#FFFFFF"&gt;slope game&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Feb 2022 05:11:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2021-44790-amp-cve-2021-44224/m-p/465765#M1499</guid>
      <dc:creator>marxcaro</dc:creator>
      <dc:date>2022-02-15T05:11:40Z</dc:date>
    </item>
  </channel>
</rss>

