<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Question about CVE-2022-0028 PAN-OS: Reflected Amplification Denial-of-Service (DoS) Vulnerability in URL Filtering (Severity: HIGH) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/question-about-cve-2022-0028-pan-os-reflected-amplification/m-p/511552#M106346</link>
    <description>&lt;P&gt;Dear all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN-OS&lt;/P&gt;
&lt;P&gt;CVE-2022-0028 PAN-OS: Reflected Amplification Denial-of-Service (DoS) Vulnerability in URL Filtering (Severity: HIGH)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cas5-0-urlprotect.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fu574567.ct.sendgrid.net%2fls%2fclick%3fupn%3dReeupQovtn9qzrP0JirXZqhUhfb1cGqCNeJoFr0WZAsR%2d2FboazpXso%2d2FliFVn0pWEWuNFwPeYCPcfU6oFngDVIQg%2d3D%2d3DFRjo%5fKTkL9svpRIK8YLWKJT%2d2BA%2d2Bgy21E5%2d2FbIvFbX8pYlymAYAYvuXiGqINhFNtGxu9RpF%2d2BfBlT1%2d2BG281owdF8ZA3oeFJXt6pZdFA4hrf1Mz3XrCgI6EK5uVIMKZOL8S0hHm5i3vrKIPNJdXNpc88M5ZZt17Ck1QjGKloWMjIlkWvp6MlqhlJiNPPsTegO6BxsFmtafC9hIUhWpztdfrqQkTkrPAUNHhDiFhzwGysxghP%2d2BYvh4%2d3D&amp;amp;umid=74b08c23-1913-11ed-8159-00224857ce14&amp;amp;auth=2e73f39359200e6efb200c879745627d7eabdd10-c10bf21b668c6d70daf0c0b7cc61b7132dad1019" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2022-0028&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;About CVE-2022-0028 on Palo Alto vulnerability. If we have policy that config source with any because we use shared policy for all vsys. If we config source address with internal customer ip. It will have any effect from this vulnerability because if internet ip come to policy it will not match and go to deny policy.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your answer.&lt;/P&gt;</description>
    <pubDate>Thu, 11 Aug 2022 10:55:37 GMT</pubDate>
    <dc:creator>thanawat_l</dc:creator>
    <dc:date>2022-08-11T10:55:37Z</dc:date>
    <item>
      <title>Question about CVE-2022-0028 PAN-OS: Reflected Amplification Denial-of-Service (DoS) Vulnerability in URL Filtering (Severity: HIGH)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-about-cve-2022-0028-pan-os-reflected-amplification/m-p/511552#M106346</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN-OS&lt;/P&gt;
&lt;P&gt;CVE-2022-0028 PAN-OS: Reflected Amplification Denial-of-Service (DoS) Vulnerability in URL Filtering (Severity: HIGH)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cas5-0-urlprotect.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fu574567.ct.sendgrid.net%2fls%2fclick%3fupn%3dReeupQovtn9qzrP0JirXZqhUhfb1cGqCNeJoFr0WZAsR%2d2FboazpXso%2d2FliFVn0pWEWuNFwPeYCPcfU6oFngDVIQg%2d3D%2d3DFRjo%5fKTkL9svpRIK8YLWKJT%2d2BA%2d2Bgy21E5%2d2FbIvFbX8pYlymAYAYvuXiGqINhFNtGxu9RpF%2d2BfBlT1%2d2BG281owdF8ZA3oeFJXt6pZdFA4hrf1Mz3XrCgI6EK5uVIMKZOL8S0hHm5i3vrKIPNJdXNpc88M5ZZt17Ck1QjGKloWMjIlkWvp6MlqhlJiNPPsTegO6BxsFmtafC9hIUhWpztdfrqQkTkrPAUNHhDiFhzwGysxghP%2d2BYvh4%2d3D&amp;amp;umid=74b08c23-1913-11ed-8159-00224857ce14&amp;amp;auth=2e73f39359200e6efb200c879745627d7eabdd10-c10bf21b668c6d70daf0c0b7cc61b7132dad1019" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2022-0028&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;About CVE-2022-0028 on Palo Alto vulnerability. If we have policy that config source with any because we use shared policy for all vsys. If we config source address with internal customer ip. It will have any effect from this vulnerability because if internet ip come to policy it will not match and go to deny policy.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your answer.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Aug 2022 10:55:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-about-cve-2022-0028-pan-os-reflected-amplification/m-p/511552#M106346</guid>
      <dc:creator>thanawat_l</dc:creator>
      <dc:date>2022-08-11T10:55:37Z</dc:date>
    </item>
    <item>
      <title>Re: Question about CVE-2022-0028 PAN-OS: Reflected Amplification Denial-of-Service (DoS) Vulnerability in URL Filtering (Severity: HIGH)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/question-about-cve-2022-0028-pan-os-reflected-amplification/m-p/511867#M106388</link>
      <description>&lt;P&gt;Hello there&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Security profiles are interpreted AFTER a security policy.&lt;BR /&gt;Why not create your rule with the internal IP BEFORE your current rule.&lt;/P&gt;
&lt;P&gt;This way, your internal rule is matched first, and the remaining users will continue to hit the rule you currently have.&lt;BR /&gt;I guess I am thinking that you want a way to "whitelist" the internal IP.&amp;nbsp; This is one way.&lt;BR /&gt;You can also white list the IP inside of the Vulnerability Profile itself, finding the ID number of the vulnerability and creating an Exception.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2022 15:49:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/question-about-cve-2022-0028-pan-os-reflected-amplification/m-p/511867#M106388</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2022-08-15T15:49:31Z</dc:date>
    </item>
  </channel>
</rss>

