<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Custom Vulnerability Signature to block older versions of Chrome in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/custom-vulnerability-signature-to-block-older-versions-of-chrome/m-p/454081#M101424</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/176192"&gt;@CGirouard&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;There's not a technical reason why your idea wouldn't work in theory. Keeping in mind that your triggering off of the User-Agent, and that this can be changed by a user, you would need to create a new vulnerability signature for each user-agent string you would want to actually block. You could use the pattern match to block older major versions, but you wouldn't likely do this down to a maintenance release.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a suggestion, if you manage these endpoints you could use something like AppLocker to block the execution of outdated versions of Chrome very easily through group policy. This would be a lot less overhead and would't be easy to bypass like a User-Agent pattern match signature would be.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Dec 2021 22:50:57 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2021-12-17T22:50:57Z</dc:date>
    <item>
      <title>Custom Vulnerability Signature to block older versions of Chrome</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-vulnerability-signature-to-block-older-versions-of-chrome/m-p/453939#M101403</link>
      <description>&lt;P&gt;After reviewing this KB article:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSOCA0" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSOCA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It looks like you can create custom vulnerability signatures for named browsers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you also do that to limit browser access via a security policy based on a minimum version number?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example: create a vulnerability signature that identify any traffic via Chrome where it's version is older than v96.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, for this to be effective, we'd to enable SSL decryption since the agent string is encrypted, correct?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Dec 2021 14:21:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-vulnerability-signature-to-block-older-versions-of-chrome/m-p/453939#M101403</guid>
      <dc:creator>CGirouard</dc:creator>
      <dc:date>2021-12-17T14:21:11Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Vulnerability Signature to block older versions of Chrome</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/custom-vulnerability-signature-to-block-older-versions-of-chrome/m-p/454081#M101424</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/176192"&gt;@CGirouard&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;There's not a technical reason why your idea wouldn't work in theory. Keeping in mind that your triggering off of the User-Agent, and that this can be changed by a user, you would need to create a new vulnerability signature for each user-agent string you would want to actually block. You could use the pattern match to block older major versions, but you wouldn't likely do this down to a maintenance release.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a suggestion, if you manage these endpoints you could use something like AppLocker to block the execution of outdated versions of Chrome very easily through group policy. This would be a lot less overhead and would't be easy to bypass like a User-Agent pattern match signature would be.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Dec 2021 22:50:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/custom-vulnerability-signature-to-block-older-versions-of-chrome/m-p/454081#M101424</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-12-17T22:50:57Z</dc:date>
    </item>
  </channel>
</rss>

