<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Intel MDS Attack in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/intel-mds-attack/m-p/261509#M74136</link>
    <description>&lt;P&gt;Can anyone help to provide more information if below CVE are impacted in Palo Alto product line?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Intel Microarchitectural Data Sampling Vulnerabilities (Fallout, RIDL, Zombieload) (CVE-2018-12126 , CVE-2018-12127, CVE-2018-12130, CVE-2019-11091)&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 17 May 2019 13:52:00 GMT</pubDate>
    <dc:creator>Riponmedhi</dc:creator>
    <dc:date>2019-05-17T13:52:00Z</dc:date>
    <item>
      <title>Intel MDS Attack</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/intel-mds-attack/m-p/261509#M74136</link>
      <description>&lt;P&gt;Can anyone help to provide more information if below CVE are impacted in Palo Alto product line?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Intel Microarchitectural Data Sampling Vulnerabilities (Fallout, RIDL, Zombieload) (CVE-2018-12126 , CVE-2018-12127, CVE-2018-12130, CVE-2019-11091)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2019 13:52:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/intel-mds-attack/m-p/261509#M74136</guid>
      <dc:creator>Riponmedhi</dc:creator>
      <dc:date>2019-05-17T13:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: Intel MDS Attack</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/intel-mds-attack/m-p/261555#M74153</link>
      <description>&lt;P&gt;You can search for any covered vulnerabilities by CVE on Threat Vault:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://threatvault.paloaltonetworks.com/" target="_blank"&gt;https://threatvault.paloaltonetworks.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you don't get a result, then there is no coverage. A lot of times new vulns are announced that are theoretical (like the Zombieload vuln) and it's impossible to cover those without a Proof of Concept.&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2019 21:31:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/intel-mds-attack/m-p/261555#M74153</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-05-17T21:31:21Z</dc:date>
    </item>
    <item>
      <title>Re: Intel MDS Attack</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/intel-mds-attack/m-p/261556#M74154</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113866"&gt;@Riponmedhi&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;SO to start out thee only product I'm aware of in the lineup that utilizes Intel processors is the WF-500 appliance (and obviously the VM-Series depending on what you run it on).&amp;nbsp;&lt;/P&gt;&lt;P&gt;The more offical answer is that to exploit any of the CPU exploits you would need to compromise the PAN-OS operating system in a way to gain root access and actually be able to execute code directly on the underlying system. Any such vulnerabilities are patched as soon as possible and thus the risk of someone being able to perform one of these attacks is extremely low if you are on a current PAN-OS release.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2019 21:31:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/intel-mds-attack/m-p/261556#M74154</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-05-17T21:31:31Z</dc:date>
    </item>
  </channel>
</rss>

