Ensuring Security: How to Verify Threat IDs 95187, 95189, and 95191 are Reset in Palo Alto Using Postman

Recently, CVE-2024-3400 has emerged as a significant vulnerability affecting Palo Alto devices, raising concerns about the integrity of network security. In response, it’s crucial to not only address the vulnerability but also ensure the effective reset of associated threat IDs. In this blog post, we’ll delve into how to verify the reset of Threat IDs 95187, 95189, and 95191 in Palo Alto devices using Postman, bolstering your network’s defenses against potential exploits....

2 min · Adil

Increasing Wireless Network Security with Radius and RadSec in Meraki Dashboard

Centralised Authentication, Authorization, and Accounting (AAA) in networks is facilitated by the RADIUS (Remote Authentication Dial-In User Service) protocol, which is extensively utilised for VPNs and Wi-Fi. But there is no security when using UDP with standard RADIUS. Using TCP and creating secure TLS (Transport Layer Security) connections, RadSec (RADIUS Security) improves RADIUS. User credentials are shielded from interception and manipulation by this encrypted and secure transmission method. For today’s sophisticated networks, RadSec is perfect since it not only increases security but also dependability and scalability....

2 min · Adil

Zero Day CVE-2024-3400 - How to verify if the Threat ID 95187 is applied?

What is Zero Day CVE-2024-3400? A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Fixes for PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 are in development and are expected to be released by April 14, 2024. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability....

2 min · Adil