<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traps CVE-2019-0708 in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/traps-cve-2019-0708/m-p/267207#M572</link>
    <description>&lt;P&gt;Thanks Brandon for sharing an update.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please do share outcome from your test.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 06 Jun 2019 04:59:39 GMT</pubDate>
    <dc:creator>ChiragBhatt</dc:creator>
    <dc:date>2019-06-06T04:59:39Z</dc:date>
    <item>
      <title>Traps CVE-2019-0708</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/traps-cve-2019-0708/m-p/261353#M552</link>
      <description>&lt;P&gt;Does Traps offer protection against&amp;nbsp;&lt;SPAN&gt;CVE-2019-0708 ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2019 12:58:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/traps-cve-2019-0708/m-p/261353#M552</guid>
      <dc:creator>JacobHusted</dc:creator>
      <dc:date>2019-05-16T12:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: Traps CVE-2019-0708</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/traps-cve-2019-0708/m-p/261531#M555</link>
      <description>&lt;P&gt;I've just opened a support case on this, I'll post when I hear back.&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2019 17:51:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/traps-cve-2019-0708/m-p/261531#M555</guid>
      <dc:creator>BrandonWright</dc:creator>
      <dc:date>2019-05-17T17:51:07Z</dc:date>
    </item>
    <item>
      <title>Re: Traps CVE-2019-0708</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/traps-cve-2019-0708/m-p/266656#M569</link>
      <description>&lt;P&gt;Hi, Any reply from the Support team?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2019 06:43:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/traps-cve-2019-0708/m-p/266656#M569</guid>
      <dc:creator>ChiragBhatt</dc:creator>
      <dc:date>2019-06-05T06:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: Traps CVE-2019-0708</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/traps-cve-2019-0708/m-p/266881#M571</link>
      <description>&lt;P&gt;Hello Chirag,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did receive a response, but it wasn't completely definitive.&amp;nbsp; At the time that I opened the case, there was no PoC code available for CVE-2019-0708, but the TAC engineer did research on the exploit and stated that it should be covered by Traps Default protections given his understanding of how the exploit works.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now that there is exploit code available I plan on spinning up a windows VM with Traps to test this statement.&amp;nbsp; I probably wont get to this until later this week.&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2019 16:28:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/traps-cve-2019-0708/m-p/266881#M571</guid>
      <dc:creator>BrandonWright</dc:creator>
      <dc:date>2019-06-05T16:28:08Z</dc:date>
    </item>
    <item>
      <title>Re: Traps CVE-2019-0708</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/traps-cve-2019-0708/m-p/267207#M572</link>
      <description>&lt;P&gt;Thanks Brandon for sharing an update.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please do share outcome from your test.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2019 04:59:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/traps-cve-2019-0708/m-p/267207#M572</guid>
      <dc:creator>ChiragBhatt</dc:creator>
      <dc:date>2019-06-06T04:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: Traps CVE-2019-0708</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/traps-cve-2019-0708/m-p/268511#M585</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So as of today, I was able to get some time to do some further testing.&amp;nbsp; It looks like the default protection built-in to traps unfortunately doesn't seem to catch this.&amp;nbsp; I'm still trying to determine if there is a configuration change (focusing on the Exploit Profiles) that will protect the process that is exploited as part of this CVE (CVE-2019-0708).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The testing methodology that I have used is as follows:&lt;/P&gt;&lt;P&gt;1. Spun up a Windows 7 VM, and fired a PoC Crash exploit at the unpatched system.&amp;nbsp; This resulted in a Blue Screen and the machine cratched.&amp;nbsp; Presumably if someone modifies this Blue Screen PoC code to get their own RCE (Remote Code Execution), then they could get their code executing on a system without a Blue Screen.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; Next, I installed the latest Traps Agent on the Windows 7 VM, and rebooted.&amp;nbsp; After the reboot, I fired the PoC crash exploit at the unpatched system yet again, and acheived the same result, with nothing being reported in the Traps Management Service.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I plan on opening another support ticket to inquire now that there is PoC code available.&amp;nbsp; I'll post the results of that here later.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 01:26:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/traps-cve-2019-0708/m-p/268511#M585</guid>
      <dc:creator>BrandonWright</dc:creator>
      <dc:date>2019-06-11T01:26:46Z</dc:date>
    </item>
  </channel>
</rss>

