<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2022-00028 in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2022-00028/m-p/518245#M1765</link>
    <description>&lt;P&gt;Thanks &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 18 Oct 2022 18:16:50 GMT</pubDate>
    <dc:creator>Kashif_shaikh</dc:creator>
    <dc:date>2022-10-18T18:16:50Z</dc:date>
    <item>
      <title>CVE-2022-00028</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2022-00028/m-p/516951#M1757</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I wanted to ask CVE-2022-0028 Pan-os:Reflected amplification dow vulnerability in URL filtering Will still affect my environment if i am using separate PROXY SERVER(Forcepoint proxy) for url filtering purpose?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Palo alto url filtering is used but its for specific policies rather all other traffic use forcepoint proxy for URL filtering...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2022 06:48:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2022-00028/m-p/516951#M1757</guid>
      <dc:creator>Kashif_shaikh</dc:creator>
      <dc:date>2022-10-06T06:48:33Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-00028</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2022-00028/m-p/517281#M1759</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/227899"&gt;@Kashif_shaikh&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;As mentioned in the official security advisory - &lt;A href="https://security.paloaltonetworks.com/CVE-2022-0028" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2022-0028&lt;/A&gt; if you use URL Filtering profile with at least one category set to block in your rules, your firewall is exploitable.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;BUT&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As mentioned in the link the risk is drasticly lowered if you don't have URL filtering profile on inbound rule.&lt;/P&gt;
&lt;P&gt;If you have URL profile enabled only on rules for outbound traffic (from inside to internet), the risk of potential explotation is lower, but still there is a chance of insider threat. If you want to completely eliminate the risk you can follow the suggested workaround and enable the zone protection profile for the inside zone&lt;/P&gt;</description>
      <pubDate>Mon, 10 Oct 2022 11:16:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2022-00028/m-p/517281#M1759</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-10-10T11:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-00028</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2022-00028/m-p/518245#M1765</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2022 18:16:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2022-00028/m-p/518245#M1765</guid>
      <dc:creator>Kashif_shaikh</dc:creator>
      <dc:date>2022-10-18T18:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-00028</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2022-00028/m-p/524869#M1816</link>
      <description>&lt;P&gt;Thanks for the solution.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 15:15:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2022-00028/m-p/524869#M1816</guid>
      <dc:creator>PamelaDiaz</dc:creator>
      <dc:date>2022-12-22T15:15:02Z</dc:date>
    </item>
  </channel>
</rss>

