<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wind River VxWorks in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/wind-river-vxworks/m-p/291142#M650</link>
    <description>&lt;P&gt;I would like to know this as well. Will this be something we could implement via a signature update or would it have to be something deeper in the inspection of the TCP/IP stack for things like SYN/URG/FIN flags?&lt;/P&gt;</description>
    <pubDate>Thu, 03 Oct 2019 17:22:37 GMT</pubDate>
    <dc:creator>KevinMedeiros</dc:creator>
    <dc:date>2019-10-03T17:22:37Z</dc:date>
    <item>
      <title>Wind River VxWorks</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/wind-river-vxworks/m-p/281518#M625</link>
      <description>&lt;P&gt;Is Palo Alto working on signatures/rules for the CVE's listed below ( &lt;A title="ICS Advisory (ICSA-19-211-01)" href="https://www.us-cert.gov/ics/advisories/icsa-19-211-01" target="_self"&gt;ICS Advisory (ICSA-19-211-01)&lt;/A&gt; )?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE‐2019‐12255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE‐2019‐12256&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE‐2019‐12260&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE‐2019‐12257&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE‐2019‐12261&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE‐2019‐12263&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE‐2019‐12258&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE‐2019‐12262&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE‐2019‐12264&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE‐2019‐12259&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE‐2019‐12265&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 15:01:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/wind-river-vxworks/m-p/281518#M625</guid>
      <dc:creator>matthewroberson</dc:creator>
      <dc:date>2019-08-07T15:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: Wind River VxWorks</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/wind-river-vxworks/m-p/291142#M650</link>
      <description>&lt;P&gt;I would like to know this as well. Will this be something we could implement via a signature update or would it have to be something deeper in the inspection of the TCP/IP stack for things like SYN/URG/FIN flags?&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2019 17:22:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/wind-river-vxworks/m-p/291142#M650</guid>
      <dc:creator>KevinMedeiros</dc:creator>
      <dc:date>2019-10-03T17:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: Wind River VxWorks</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/wind-river-vxworks/m-p/293915#M664</link>
      <description>&lt;P&gt;I know this thread is couple months old but I'll post a response anyway.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are 6 critical vulnerabilities from the Urgent/11 family.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;CVE-2019-12256&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;A specially crafted IP packet sent to the target can cause a stack overflow in the handling of IP options in the header to possibly cause remote code execution. If you have a device (like our NGFW) that can clear IP options from the IPv4 header for ingress traffic, you can neutralize this exploit. Palo Alto Networks NGFW does not clear IP options by default so you can create a specific zone protection profile that drops relevant IP options and apply to the segment where your vulnerable VxWorks device is connected. "Network tab - Zone Protection Profile - add - Packet based attack protection tab"&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="clipboard_image_4.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21882i720B933A808D96DB/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="clipboard_image_4.png" alt="clipboard_image_4.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;CVE-2019-12255, CVE-2019-12260, CVE-2019-12261, CVE-2019-12263&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;These 4 vulnerabilities all leverage manipulating TCP URG flag/pointer. Palo Alto Networks NGFW clears URG field as the default, out of the box configuration, neutralizing these attacks. This is a global setting however and cannot be applied only to a specific zone. You can run the following command to check your NGFW's current setting: "show running tcp state"&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="clipboard_image_1.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21879iF22113CC9E17C746/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="clipboard_image_1.png" alt="clipboard_image_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From the web GUI, under the Device tab - TCP Settings.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="clipboard_image_2.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21880i6566850F48A4B404/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="clipboard_image_2.png" alt="clipboard_image_2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;CVE-2019-12257&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Exploiting this vulnerability requires the attacker to send a crafted DHCP server response before the actual DHCP server response gets to the victim host. Configuring security rule from your NGFW to only allow DHCP traffic from your authorized DHCP server can thwart such attacks. This wouldn't obviously work if the attacker was on the same network as the victim host. If such implementation is not feasible due to other devices in the network, consider isolating vulnerable devices to their own network segment/zone(s) to be able to apply the desired FW security rule.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/68994"&gt;@jesseholland&lt;/a&gt;&lt;BR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/87840"&gt;@Eusono&lt;/a&gt;&lt;BR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77400"&gt;@tmcneil&lt;/a&gt;&lt;BR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113662"&gt;@matthewroberson&lt;/a&gt;&lt;BR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/95071"&gt;@KevinMedeiros&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 18:52:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/wind-river-vxworks/m-p/293915#M664</guid>
      <dc:creator>Mark_Baik</dc:creator>
      <dc:date>2019-11-21T18:52:33Z</dc:date>
    </item>
  </channel>
</rss>

