<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Remote Command Execution Vulnerability in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/remote-command-execution-vulnerability/m-p/586554#M117063</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We have detected so may critical vulnerability in our firewall . i have attached the screenshots.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1.is there a way to avoid these kind of traffic?&lt;/P&gt;
&lt;P&gt;2.where can i find more about how to block these kind of traffic?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 14 May 2024 05:10:06 GMT</pubDate>
    <dc:creator>pyrainath</dc:creator>
    <dc:date>2024-05-14T05:10:06Z</dc:date>
    <item>
      <title>Remote Command Execution Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-command-execution-vulnerability/m-p/586554#M117063</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We have detected so may critical vulnerability in our firewall . i have attached the screenshots.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1.is there a way to avoid these kind of traffic?&lt;/P&gt;
&lt;P&gt;2.where can i find more about how to block these kind of traffic?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 05:10:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-command-execution-vulnerability/m-p/586554#M117063</guid>
      <dc:creator>pyrainath</dc:creator>
      <dc:date>2024-05-14T05:10:06Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Command Execution Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-command-execution-vulnerability/m-p/586575#M117065</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1278486673"&gt;@pyrainath&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Using TID 58474 as an example.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you can see you will find this TID in a vulnerability profile:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kiwi_0-1715665663426.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59657iD95DAFB089569402/image-size/large?v=v2&amp;amp;px=999" role="button" title="kiwi_0-1715665663426.png" alt="kiwi_0-1715665663426.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this case the default action is "Reset-Both" but you can change it to whatever action you would like to configure:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kiwi_1-1715665741505.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59658i474838AE4114877A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="kiwi_1-1715665741505.png" alt="kiwi_1-1715665741505.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Don't forget that you need to assign the vulnerability profile to your security rules so that the appropriate actions apply:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="kiwi_2-1715666047745.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59659iEB703C7A3788757C/image-size/large?v=v2&amp;amp;px=999" role="button" title="kiwi_2-1715666047745.png" alt="kiwi_2-1715666047745.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With the appropriate security profiles in place you're already better protected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The following DOC is a good resource to create best practice security profiles:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://docs.paloaltonetworks.com/best-practices/internet-gateway-best-practices/best-practice-internet-gateway-security-policy/create-best-practice-security-profiles" target="_blank" rel="noopener"&gt;Create Best Practice Security Profiles&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 06:02:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-command-execution-vulnerability/m-p/586575#M117065</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2024-05-14T06:02:29Z</dc:date>
    </item>
  </channel>
</rss>

