<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Multiple High/Critical Alert Detected via Port 18264 | Possible FP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-high-critical-alert-detected-via-port-18264-possible-fp/m-p/1245780#M125850</link>
    <description>&lt;P&gt;Hi ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i would like to seek clarification&amp;nbsp;clarification regarding a threat detection observed on our Palo Alto firewall, which we believe may be a false positive. During our review of the threat log, we noticed that the detection from below source and destination via port 18264 references several filenames as win.ini, fake.cgi, note.txt, jhjr60x8.kspx&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;These filenames do not appear to relevant in the context of the environment, as the traffic was observed between Check Point devices communicating with each other over TCP port 18264, which is believed to be used for Check Point proprietary internal services (e.g. update, synchronization, or certificate-related communication). Upon further review on the traffic under application found “incomplete”, “checkpoint-cpd” and “web-browsing”.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;=======================================================&lt;/P&gt;
&lt;P&gt;URL/Filename&lt;/P&gt;
&lt;P&gt;win.ini&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat/Content Name&lt;/P&gt;
&lt;P&gt;Microsoft Windows win.ini Access Attempt Detected(30851)&lt;/P&gt;
&lt;P&gt;YAWS Unauthenticated Remote File Disclosure Vulnerability(58618)&lt;/P&gt;
&lt;P&gt;-------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;URL/Filename&lt;/P&gt;
&lt;P&gt;fake.cgi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat/Content Name&lt;/P&gt;
&lt;P&gt;Microsoft Windows win.ini Access Attempt Detected(30851)&lt;/P&gt;
&lt;P&gt;--------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;URL/Filename&lt;/P&gt;
&lt;P&gt;note.txt&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat/Content Name&lt;/P&gt;
&lt;P&gt;Microsoft Windows win.ini Access Attempt Detected(30851)&lt;/P&gt;
&lt;P&gt;-----------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;URL/Filename&lt;/P&gt;
&lt;P&gt;jhjr60x8.kspx&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat/Content Name&lt;/P&gt;
&lt;P&gt;Generic Cross-Site Scripting Vulnerability(94328)&lt;/P&gt;
&lt;P&gt;=============================================================&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any advise?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 16 Jan 2026 09:42:13 GMT</pubDate>
    <dc:creator>Fariq_Zaidi</dc:creator>
    <dc:date>2026-01-16T09:42:13Z</dc:date>
    <item>
      <title>Multiple High/Critical Alert Detected via Port 18264 | Possible FP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-high-critical-alert-detected-via-port-18264-possible-fp/m-p/1245780#M125850</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i would like to seek clarification&amp;nbsp;clarification regarding a threat detection observed on our Palo Alto firewall, which we believe may be a false positive. During our review of the threat log, we noticed that the detection from below source and destination via port 18264 references several filenames as win.ini, fake.cgi, note.txt, jhjr60x8.kspx&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;These filenames do not appear to relevant in the context of the environment, as the traffic was observed between Check Point devices communicating with each other over TCP port 18264, which is believed to be used for Check Point proprietary internal services (e.g. update, synchronization, or certificate-related communication). Upon further review on the traffic under application found “incomplete”, “checkpoint-cpd” and “web-browsing”.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;=======================================================&lt;/P&gt;
&lt;P&gt;URL/Filename&lt;/P&gt;
&lt;P&gt;win.ini&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat/Content Name&lt;/P&gt;
&lt;P&gt;Microsoft Windows win.ini Access Attempt Detected(30851)&lt;/P&gt;
&lt;P&gt;YAWS Unauthenticated Remote File Disclosure Vulnerability(58618)&lt;/P&gt;
&lt;P&gt;-------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;URL/Filename&lt;/P&gt;
&lt;P&gt;fake.cgi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat/Content Name&lt;/P&gt;
&lt;P&gt;Microsoft Windows win.ini Access Attempt Detected(30851)&lt;/P&gt;
&lt;P&gt;--------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;URL/Filename&lt;/P&gt;
&lt;P&gt;note.txt&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat/Content Name&lt;/P&gt;
&lt;P&gt;Microsoft Windows win.ini Access Attempt Detected(30851)&lt;/P&gt;
&lt;P&gt;-----------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;URL/Filename&lt;/P&gt;
&lt;P&gt;jhjr60x8.kspx&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat/Content Name&lt;/P&gt;
&lt;P&gt;Generic Cross-Site Scripting Vulnerability(94328)&lt;/P&gt;
&lt;P&gt;=============================================================&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any advise?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2026 09:42:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-high-critical-alert-detected-via-port-18264-possible-fp/m-p/1245780#M125850</guid>
      <dc:creator>Fariq_Zaidi</dc:creator>
      <dc:date>2026-01-16T09:42:13Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple High/Critical Alert Detected via Port 18264 | Possible FP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-high-critical-alert-detected-via-port-18264-possible-fp/m-p/1245789#M125852</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/225107"&gt;@Fariq_Zaidi&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's highly plausible that you're looking at a false positive. Check Point devices talking to each other often looks like malicious noise to a firewall that isn't expecting those proprietary strings.&lt;/P&gt;
&lt;P data-path-to-node="17"&gt;If this traffic is strictly between your management server and gateways (internal only), the risk is near zero and you could add&amp;nbsp;Threat Exceptions for those IPs.&lt;/P&gt;
&lt;P data-path-to-node="17"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="17"&gt;If you have enabled PCAP on your threat logs you can see exactly what the data looks like. If it's a bunch of binary/hex that just &lt;I data-path-to-node="13,1,2,0" data-index-in-node="86"&gt;happens&lt;/I&gt; to have "win" in it, you have your proof.&lt;/P&gt;
&lt;P data-path-to-node="17"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="17"&gt;Kind regards,&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2026 10:29:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-high-critical-alert-detected-via-port-18264-possible-fp/m-p/1245789#M125852</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2026-01-16T10:29:40Z</dc:date>
    </item>
  </channel>
</rss>

