CVSSv3: 7.0 - Important On 8/23/2022, VMware released their initial advisory for a vulnerability in VMware Tools CVE-2022-31676. This is a local privilege escalation vulnerability, and updates have been released to address affected products. The known attack vectors are any malicious actor with local system access to the Guest OS that can run privilege escalation to gain root user access on the virtual machine. Versions Fixed: Windows (v12,v11) 12.1.0 Linux (v12,v11) 12.1.0 Linux (v10) 10.3.25
**Update 8/24/2022- If unable to apply Palo hotfix, ensure packet-based attack protection is configured to mitigate. https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/zone-protection-and-dos-protection/configure-zone-protection-to-increase-network-security/configure-packet-based-attack-protection ** On Monday, CISA added CVE-2022-0028 to its Known Exploited Vulnerabilities Catalog . The CVE is a URL Filtering policy misconfiguration that could allow an unauthenticated external attacker to initiate a reflective DoS (RDOS) attack. Since this misconfiguration is likely applied to most Palo Alto firewalls, network admins should spend a few minutes reviewing their configs or applying zone protections listed as other mitigators from Palo. The easiest is to check any untrust/ingress zones for interfaces with security policies that have URL filtering. Since the URL filtering is outbound, remove this security profile from security policies. https://security.paloaltonetworks.c