<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability protection for 2020-0674 RCE in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-protection-for-2020-0674-rce/m-p/307325#M729</link>
    <description>&lt;P&gt;The signature for CVE-2020-0674 has been released and should be available to all our NGFW customers. &lt;/P&gt;
&lt;P&gt;Applications and Threats Content Release Notes&lt;BR /&gt;Version 8228&lt;/P&gt;
&lt;H3&gt;New Vulnerability Signatures (1)&lt;/H3&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TH&gt;Severity&lt;/TH&gt;
&lt;TH&gt;ID&lt;/TH&gt;
&lt;TH&gt;Attack Name&lt;/TH&gt;
&lt;TH&gt;CVE ID&lt;/TH&gt;
&lt;TH&gt;Vendor ID&lt;/TH&gt;
&lt;TH&gt;Default Action&lt;/TH&gt;
&lt;TH&gt;Minimum PAN-OS Version&lt;/TH&gt;
&lt;TH&gt;Maximum PAN-OS Version&lt;/TH&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;critical&lt;/TD&gt;
&lt;TD&gt;57601&lt;/TD&gt;
&lt;TD&gt;Microsoft Scripting Engine Memory Corruption Vulnerability&lt;/TD&gt;
&lt;TD&gt;CVE-2020-0674&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;reset-both&lt;/TD&gt;
&lt;TD&gt;7.1.0&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
    <pubDate>Mon, 20 Jan 2020 19:01:40 GMT</pubDate>
    <dc:creator>jharrison</dc:creator>
    <dc:date>2020-01-20T19:01:40Z</dc:date>
    <item>
      <title>Vulnerability protection for 2020-0674 RCE</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-protection-for-2020-0674-rce/m-p/307194#M726</link>
      <description>&lt;P&gt;Is there a timeline for release of protection for this RCE, following the release of a patch?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200001" target="_blank"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200001&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2020 02:06:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-protection-for-2020-0674-rce/m-p/307194#M726</guid>
      <dc:creator>mb_equate</dc:creator>
      <dc:date>2020-01-20T02:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability protection for 2020-0674 RCE</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-protection-for-2020-0674-rce/m-p/307240#M727</link>
      <description>&lt;P&gt;I've received the same question from one of our biggest customers. Can we get an update on this? Will we come with a TP signature for this?&lt;/P&gt;
&lt;P&gt;Same for the coverage for this CVE with XDR prevent / pro..?&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2020 08:59:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-protection-for-2020-0674-rce/m-p/307240#M727</guid>
      <dc:creator>StevenDP</dc:creator>
      <dc:date>2020-01-20T08:59:07Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability protection for 2020-0674 RCE</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-protection-for-2020-0674-rce/m-p/307325#M729</link>
      <description>&lt;P&gt;The signature for CVE-2020-0674 has been released and should be available to all our NGFW customers. &lt;/P&gt;
&lt;P&gt;Applications and Threats Content Release Notes&lt;BR /&gt;Version 8228&lt;/P&gt;
&lt;H3&gt;New Vulnerability Signatures (1)&lt;/H3&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TH&gt;Severity&lt;/TH&gt;
&lt;TH&gt;ID&lt;/TH&gt;
&lt;TH&gt;Attack Name&lt;/TH&gt;
&lt;TH&gt;CVE ID&lt;/TH&gt;
&lt;TH&gt;Vendor ID&lt;/TH&gt;
&lt;TH&gt;Default Action&lt;/TH&gt;
&lt;TH&gt;Minimum PAN-OS Version&lt;/TH&gt;
&lt;TH&gt;Maximum PAN-OS Version&lt;/TH&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;critical&lt;/TD&gt;
&lt;TD&gt;57601&lt;/TD&gt;
&lt;TD&gt;Microsoft Scripting Engine Memory Corruption Vulnerability&lt;/TD&gt;
&lt;TD&gt;CVE-2020-0674&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;reset-both&lt;/TD&gt;
&lt;TD&gt;7.1.0&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Mon, 20 Jan 2020 19:01:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/vulnerability-protection-for-2020-0674-rce/m-p/307325#M729</guid>
      <dc:creator>jharrison</dc:creator>
      <dc:date>2020-01-20T19:01:40Z</dc:date>
    </item>
  </channel>
</rss>

