<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto Firewall CVE-2022-2884 in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/palo-alto-firewall-cve-2022-2884/m-p/513299#M1739</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Here is the PAN threat vault.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/" target="_blank"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I did a quick search and didnt find it. I bet PAN is working on one.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Mon, 29 Aug 2022 19:31:53 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2022-08-29T19:31:53Z</dc:date>
    <item>
      <title>Palo Alto Firewall CVE-2022-2884</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/palo-alto-firewall-cve-2022-2884/m-p/512927#M1733</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone know&amp;nbsp;if GitLab Remote Command Execution Vulnerability is covered with Palo Alto AV Signature?&lt;/P&gt;
&lt;P&gt;Is Palo Alto affected by it?&lt;/P&gt;
&lt;P&gt;I was not able to find it in their Security Advisories.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Vulnerability Details:&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="113"&gt;
&lt;P&gt;Title&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="483"&gt;
&lt;P&gt;GitLab Remote Command Execution Vulnerability&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="113"&gt;
&lt;P&gt;CVE ID&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="483"&gt;
&lt;P&gt;CVE-2022-2884&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="113"&gt;
&lt;P&gt;CVE Summary&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="483"&gt;
&lt;P&gt;GitLab Community Edition and GitLab Enterprise Edition are prone to remote code-execution vulnerabilities via GitHub Import. An attacker can leverage this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial of service conditions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The vulnerability has a CVSS base score of 9.9.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="113"&gt;
&lt;P&gt;Link(s)&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="483"&gt;
&lt;P&gt;&lt;A href="https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fabout.gitlab.com%2Freleases%2F2022%2F08%2F22%2Fcritical-security-release-gitlab-15-3-1-released%2F&amp;amp;data=05%7C01%7Cnetwork_mnt%40ncs.com.sg%7C4778bda1ea2e440cbf5108da863a5daa%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C637969882495081472%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&amp;amp;sdata=CGQkf4kOR%2BA5%2F2kEurFnGO83zFra1vFvWAHiegBosgE%3D&amp;amp;reserved=0" target="_blank"&gt;https://about.gitlab.com/releases/2022/08/22/critical-security-release-gitlab-15-3-1-released/&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;&lt;BR /&gt;&lt;BR /&gt;Please note you are posting a public message where community members and experts can provide assistance. Sharing private information such as serial numbers or company information is not recommended.</description>
      <pubDate>Thu, 25 Aug 2022 03:40:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/palo-alto-firewall-cve-2022-2884/m-p/512927#M1733</guid>
      <dc:creator>Johnson_Tan</dc:creator>
      <dc:date>2022-08-25T03:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Firewall CVE-2022-2884</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/palo-alto-firewall-cve-2022-2884/m-p/513299#M1739</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Here is the PAN threat vault.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/" target="_blank"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;I did a quick search and didnt find it. I bet PAN is working on one.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2022 19:31:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/palo-alto-firewall-cve-2022-2884/m-p/513299#M1739</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-08-29T19:31:53Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Firewall CVE-2022-2884</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/palo-alto-firewall-cve-2022-2884/m-p/526429#M1826</link>
      <description>&lt;P&gt;A signature was already released. It's a vulnerability protection signature (not an AV signature).&lt;BR /&gt;&lt;A href="https://threatvault.paloaltonetworks.com/?query=CVE-2022-2884&amp;amp;type=" target="_blank"&gt;https://threatvault.paloaltonetworks.com/?query=CVE-2022-2884&amp;amp;type=&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Palo Alto Networks Firewall is not using GitLab, thus not affected by CVE-2022-2884.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 02:27:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/palo-alto-firewall-cve-2022-2884/m-p/526429#M1826</guid>
      <dc:creator>ymiyashita</dc:creator>
      <dc:date>2023-01-10T02:27:27Z</dc:date>
    </item>
  </channel>
</rss>

