<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MS Autodiscover Flaw - Vulnerability in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ms-autodiscover-flaw-vulnerability/m-p/437148#M97396</link>
    <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;I would test to see if some of the URL's are already in PAN's URL or DNS filters. My opinion of vendors is that they need to update their signatures quickly to help protect their customers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can always open a support case and see if they have already added the signatures.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Tue, 28 Sep 2021 15:49:28 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2021-09-28T15:49:28Z</dc:date>
    <item>
      <title>MS Autodiscover Flaw - Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ms-autodiscover-flaw-vulnerability/m-p/436710#M97387</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;A design issue in the Microsoft Exchange Autodiscover feature can cause Outlook and other third-party Exchange client applications to leak plaintext Windows domain credentials to external servers&lt;/P&gt;
&lt;P&gt;Domains that we need to block are listed here: &lt;A href="https://github.com/guardicore/labs_campaigns/blob/84d8423335bf72ea078b5286db647580fb7f6a58/Autodiscover/autodiscover-tlds.txt" target="_blank"&gt;https://github.com/guardicore/labs_campaigns/blob/84d8423335bf72ea078b5286db647580fb7f6a58/Autodiscover/autodiscover-tlds.txt&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;However , this list has over 9100 domains and some are not illegal chars.&lt;/P&gt;
&lt;P&gt;Does any one find a way to edit/modify this list so it can be successfully imported into Palo FW?&lt;/P&gt;
&lt;P&gt;Any suggestions are much appreciated.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;QLe&lt;/P&gt;</description>
      <pubDate>Sun, 26 Sep 2021 23:41:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ms-autodiscover-flaw-vulnerability/m-p/436710#M97387</guid>
      <dc:creator>Qui</dc:creator>
      <dc:date>2021-09-26T23:41:24Z</dc:date>
    </item>
    <item>
      <title>Re: MS Autodiscover Flaw - Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ms-autodiscover-flaw-vulnerability/m-p/437131#M97394</link>
      <description>&lt;P&gt;If you have URL filtering on your firewall, why not create a custom URL category with an entry of: autodiscover.* with an explicit deny rule at the top of your security policy hierarchy? Way quicker than reformatting and importing an EDL.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2021 13:34:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ms-autodiscover-flaw-vulnerability/m-p/437131#M97394</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2021-09-28T13:34:56Z</dc:date>
    </item>
    <item>
      <title>Re: MS Autodiscover Flaw - Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ms-autodiscover-flaw-vulnerability/m-p/437148#M97396</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;I would test to see if some of the URL's are already in PAN's URL or DNS filters. My opinion of vendors is that they need to update their signatures quickly to help protect their customers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can always open a support case and see if they have already added the signatures.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2021 15:49:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ms-autodiscover-flaw-vulnerability/m-p/437148#M97396</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-09-28T15:49:28Z</dc:date>
    </item>
    <item>
      <title>Re: MS Autodiscover Flaw - Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ms-autodiscover-flaw-vulnerability/m-p/437150#M97397</link>
      <description>&lt;P&gt;You are also able to log into the support portal and check our threat database for signatures associated with the CVE number.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2021 16:17:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ms-autodiscover-flaw-vulnerability/m-p/437150#M97397</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2021-09-28T16:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: MS Autodiscover Flaw - Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ms-autodiscover-flaw-vulnerability/m-p/437238#M97405</link>
      <description>&lt;P&gt;I previously checked the threat db for signatures associated with the CVE number but found none.&lt;/P&gt;&lt;P&gt;Maybe the threat is not that catastrophic.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Sep 2021 03:58:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ms-autodiscover-flaw-vulnerability/m-p/437238#M97405</guid>
      <dc:creator>Qui</dc:creator>
      <dc:date>2021-09-29T03:58:42Z</dc:date>
    </item>
  </channel>
</rss>

