<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Investigation of possible threats in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/investigation-of-possible-threats/m-p/125337#M46422</link>
    <description>&lt;P&gt;Bump. &amp;nbsp;What I am wondering is if this report is telling us there are comprimised hosts or if it is just seeing vulnerabilties that may be on some of the internal hosts and that if we patch those vulnerabilities that it would disappear. &amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 09 Nov 2016 18:01:59 GMT</pubDate>
    <dc:creator>phxcpv</dc:creator>
    <dc:date>2016-11-09T18:01:59Z</dc:date>
    <item>
      <title>Investigation of possible threats</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/investigation-of-possible-threats/m-p/124329#M46297</link>
      <description>&lt;P&gt;My company has a&amp;nbsp;PA3050. &amp;nbsp;I am new to this device. &amp;nbsp;It is currently setup to mirror/monitor port on current Cisco firewall. &amp;nbsp;The device is reporting that it is finding suspicous files and various other vulnerabilities. &amp;nbsp;There is concern that this is showing that there is active hacker activity on the network. &amp;nbsp;Is there a way to tell the difference between this being active hacker activity or if this is just logging possible vulnerabilities on the network? &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Nov 2016 14:42:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/investigation-of-possible-threats/m-p/124329#M46297</guid>
      <dc:creator>phxcpv</dc:creator>
      <dc:date>2016-11-05T14:42:59Z</dc:date>
    </item>
    <item>
      <title>Re: Investigation of possible threats</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/investigation-of-possible-threats/m-p/124581#M46328</link>
      <description>&lt;P&gt;there a way for you to share logs so we can get a feel for what you are looking at ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the threat logs are oriented so they try to identify the 'attacker'. there is a magnifying glass at the very left of the log that shows you more details about the underlying session (traffic log + threat log correlation) which should give you an idea of where the session is coming from and where the threat is coming from (session could be client to server-http, threat could be server-http to client, which is a traditional 'download')&lt;/P&gt;</description>
      <pubDate>Mon, 07 Nov 2016 10:39:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/investigation-of-possible-threats/m-p/124581#M46328</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-11-07T10:39:02Z</dc:date>
    </item>
    <item>
      <title>Re: Investigation of possible threats</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/investigation-of-possible-threats/m-p/124679#M46354</link>
      <description>&lt;P&gt;Attached is one of the screenshots from our security team. &amp;nbsp;There are others showing suspicious files or other vulnerabilities.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="pa3050.jpg" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6326iF851DC4C3FAD858D/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="pa3050.jpg" alt="pa3050.jpg" /&gt;&lt;/span&gt;﻿&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Nov 2016 16:17:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/investigation-of-possible-threats/m-p/124679#M46354</guid>
      <dc:creator>phxcpv</dc:creator>
      <dc:date>2016-11-07T16:17:02Z</dc:date>
    </item>
    <item>
      <title>Re: Investigation of possible threats</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/investigation-of-possible-threats/m-p/125337#M46422</link>
      <description>&lt;P&gt;Bump. &amp;nbsp;What I am wondering is if this report is telling us there are comprimised hosts or if it is just seeing vulnerabilties that may be on some of the internal hosts and that if we patch those vulnerabilities that it would disappear. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 18:01:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/investigation-of-possible-threats/m-p/125337#M46422</guid>
      <dc:creator>phxcpv</dc:creator>
      <dc:date>2016-11-09T18:01:59Z</dc:date>
    </item>
    <item>
      <title>Re: Investigation of possible threats</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/investigation-of-possible-threats/m-p/125362#M46424</link>
      <description>&lt;P&gt;I'm not sure if everybody else is having the same issue but I can't actually view your image without it getting really distorted to the point I can't actually read anything.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2016 19:53:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/investigation-of-possible-threats/m-p/125362#M46424</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-11-09T19:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: Investigation of possible threats</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/investigation-of-possible-threats/m-p/125487#M46433</link>
      <description>&lt;P&gt;Yes, pic is very distorted. But I think we are talking about this signature:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Name:&lt;/TD&gt;&lt;TD&gt;OpenSSL AES-NI CBC Information Disclosure Vulnerability&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;ID:&lt;/TD&gt;&lt;TD&gt;39257&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Description:&lt;/TD&gt;&lt;TD&gt;OpenSSL is prone to a information leak vulnerability while parsing certain crafted SSL requests. The vulnerability is due to the implementation of AES-NI. An attacker could exploit the vulnerability by using a padding oracle attack to decrypt traffic. A successful attack could lead to leak of the server sensitive information.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Severity:&lt;/TD&gt;&lt;TD&gt;&lt;IMG src="https://ip1.i.lithium.com/6620c4b15533221c08f7af2a33af68062d120954/68747470733a2f2f70612e61737465632e6c6f63616c2f696d616765732f7468726561745f696e666f726d6174696f6e616c2e676966" border="0" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;CVE:&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;CVE-2016-2107&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The description is a bit unclear whether this signature actually detects a request&amp;nbsp;which could exploit this vulnerability or just notifies of use AES-NI instruction set in OpenSSL. As the severity is informational I'd assume it's just use of vulnerable instuction set.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Nov 2016 07:55:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/investigation-of-possible-threats/m-p/125487#M46433</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2016-11-10T07:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: Investigation of possible threats</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/investigation-of-possible-threats/m-p/125676#M46449</link>
      <description>&lt;P&gt;I was actually seeing that alert quite a bit a couple months ago; I've since stopped but I was told that it wasn't that the servers were still vulnerable to it so I imagine that it actually identifies a potential attack. Ask whoever is managing your servers if they have updated them since May, I'm guessing that they have.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Nov 2016 21:52:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/investigation-of-possible-threats/m-p/125676#M46449</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-11-10T21:52:40Z</dc:date>
    </item>
  </channel>
</rss>

