<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ripple20 Vulnerability Group in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ripple20-vulnerability-group/m-p/337131#M896</link>
    <description>&lt;P&gt;Hello Edilang&lt;/P&gt;&lt;P&gt;Thanks for your reply. Especially the first one helps to easy an administrators mind.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I understand your answer to the second question, this is more a thing of the future. Nevertheless I ask myself if it would not be possible to identify i.e. the crafted DNS answer-packets as a Threat-Protection Signature: CVE-2020-11901&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks, regards&lt;BR /&gt;Andreas&lt;/P&gt;</description>
    <pubDate>Wed, 08 Jul 2020 09:37:11 GMT</pubDate>
    <dc:creator>AndreasTrautmann</dc:creator>
    <dc:date>2020-07-08T09:37:11Z</dc:date>
    <item>
      <title>Ripple20 Vulnerability Group</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ripple20-vulnerability-group/m-p/336484#M889</link>
      <description>&lt;P&gt;Hi there&lt;/P&gt;&lt;P&gt;About 14 days ago a group of new 19 vulnerabilities were published under the name of "ripple20" by JSOF (&lt;A href="https://www.jsof-tech.com/ripple20/)" target="_blank"&gt;https://www.jsof-tech.com/ripple20/)&lt;/A&gt;. So far I could not find any information about in the community (which I find very strange... Maybe I missed something?).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The two central questions for me concerning this topic are:&lt;/P&gt;&lt;P&gt;1. Are any Palo Alto Network Products affected themselves?&lt;/P&gt;&lt;P&gt;2. Are there any mitigations (Threat-Protections Signatures, Configurations) for these risks, that can be implemented on NGFWs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you, best&lt;/P&gt;&lt;P&gt;Andreas&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jul 2020 16:49:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ripple20-vulnerability-group/m-p/336484#M889</guid>
      <dc:creator>AndreasTrautmann</dc:creator>
      <dc:date>2020-07-02T16:49:35Z</dc:date>
    </item>
    <item>
      <title>Re: Ripple20 Vulnerability Group</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ripple20-vulnerability-group/m-p/336640#M891</link>
      <description>&lt;P&gt;Hello Andreas,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The two central questions for me concerning this topic are:&lt;/P&gt;
&lt;P&gt;1. Are any Palo Alto Network Products affected themselves?&lt;/P&gt;
&lt;P&gt;Answer:&amp;nbsp;&lt;SPAN&gt;Ripple20 vulnerabilities are not applicable nor does it affect PAN-OS as we do not use Treck's TCP/IP software library in PAN-OS.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Are there any mitigations (Threat-Protections Signatures, Configurations) for these risks, that can be implemented on NGFWs?&lt;/P&gt;
&lt;P&gt;Answer:&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;Currently PAN-OS can't see the layer-4 packets traffic detail in the IPS content engine but a new feature have been proposed&amp;nbsp;in the future release to expose the layer-3/layer-4 traffic to the IPS content engine in order to have visibility to enforced mitigation action for such similar vulnerabilities.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hoped this addresses your concern.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ed&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 06:35:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ripple20-vulnerability-group/m-p/336640#M891</guid>
      <dc:creator>edliang</dc:creator>
      <dc:date>2020-07-06T06:35:59Z</dc:date>
    </item>
    <item>
      <title>Re: Ripple20 Vulnerability Group</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ripple20-vulnerability-group/m-p/337131#M896</link>
      <description>&lt;P&gt;Hello Edilang&lt;/P&gt;&lt;P&gt;Thanks for your reply. Especially the first one helps to easy an administrators mind.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I understand your answer to the second question, this is more a thing of the future. Nevertheless I ask myself if it would not be possible to identify i.e. the crafted DNS answer-packets as a Threat-Protection Signature: CVE-2020-11901&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks, regards&lt;BR /&gt;Andreas&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jul 2020 09:37:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ripple20-vulnerability-group/m-p/337131#M896</guid>
      <dc:creator>AndreasTrautmann</dc:creator>
      <dc:date>2020-07-08T09:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: Ripple20 Vulnerability Group</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ripple20-vulnerability-group/m-p/337321#M897</link>
      <description>&lt;P&gt;Hi Andreas,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A PANW security advisory regarding Ripple20 has been published at&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2020-0007" target="_blank"&gt;https://security.paloaltonetworks.com/PAN-SA-2020-0007&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding&amp;nbsp;&lt;SPAN&gt;CVE-2020-11901 we are still awaiting a report on this to be released at this year's Black Hat conference regarding the details of the invalid DNS response before we can determine if we can mitigate this vulnerability.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cheers,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ed&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2020 02:34:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/ripple20-vulnerability-group/m-p/337321#M897</guid>
      <dc:creator>edliang</dc:creator>
      <dc:date>2020-07-09T02:34:22Z</dc:date>
    </item>
  </channel>
</rss>

