<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CloudGuard AppSec Provides Zero-day Protection for MOVEit CVE-2023-36934 in WAF</title>
    <link>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Provides-Zero-day-Protection-for-MOVEit-CVE/m-p/202031#M224</link>
    <description>&lt;DIV class="BL3dva"&gt;
&lt;DIV class="OSxNQL"&gt;
&lt;DIV class="OFA52E"&gt;
&lt;DIV class="cD_92h UitnHM" tabindex="-1" data-hook="post-title"&gt;&lt;SPAN&gt;MOVEit Transfer is a secure file transfer software designed to enable businesses to manage critical file transfers through a centralized platform.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="nLG8d5 Ndelkt" data-hook="post-description"&gt;
&lt;ARTICLE class="blog-post-page-font"&gt;
&lt;DIV class="post-content__body"&gt;
&lt;DIV class="moHCnT"&gt;
&lt;DIV class="moHCnT"&gt;
&lt;DIV class="fTEXDR A2sIZ4 QEEfz0" data-rce-version="9.16.7"&gt;
&lt;DIV class="itVXy dojW8l s6hjqn _8a1b4" dir="ltr" data-id="rich-content-viewer"&gt;
&lt;DIV class="mhGZq BAGeNT"&gt;
&lt;DIV data-hook="rcv-block2"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;During 2023 many new CVE were found in the software, mainly utilizing SQL Injection and XSS technics. Considering the widespread adoption of the software globally, it is nessasery to have sufficient layers of security that can provide prevention during the &lt;A class="TWoY9 itht3" href="https://www.openappsec.io/post/zero-day-attack-prevention" target="_blank" rel="noopener noreferrer noreferrer" data-hook="linkViewer"&gt;&lt;U class="D-jZk"&gt;zero day phase&lt;/U&gt;&lt;/A&gt; (pre-emptive security) – before the vulnerability become known to the public, and the CVE number is assigned.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="d94894_285f46685a61475a919d949bc8ab63c0~mv2.png" style="width: 490px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23895i96DB9B8283E4E0F6/image-size/large?v=v2&amp;amp;px=999" role="button" title="d94894_285f46685a61475a919d949bc8ab63c0~mv2.png" alt="d94894_285f46685a61475a919d949bc8ab63c0~mv2.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 id="viewer-roq6t460" class="qDGi6 Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;STRONG&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;Understanding CVE-2023-36934&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;CVE-2023-36934 was published on 2023-07-05 and assigned with a high CVE Base score of 9.1 (Critical). The Vulnerability allow an unauthenticated attacker to gain unauthorized access to the MOVEit Transfer database. An attacker could submit a crafted payload to a MOVEit Transfer application endpoint that could result in modification and disclosure of MOVEit database content.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;The vulnerability is specifically located in the /human.aspx and machine.aspx endpoints. Publicly available Proof of Concept (POC) examples offer insights into the exploitation of this vulnerability.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;A publicly available POC developed by ProjectDiscovery illustrates the exploitation process through a four-step approach:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="viewer-7lzj8834" class="QHjDE rzoRKE"&gt;
&lt;DIV class="gO6aa y8JqQg y8JqQg"&gt;
&lt;DIV class="Q6a5A" tabindex="0" role="button" data-hook="imageViewer"&gt;
&lt;DIV id="new-image1118" class="vBPBf L9OMM XHhj0"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="d94894_b1841edd0c724a31bda23f4f8d55737e~mv2.png" style="width: 936px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23896i7C4E537D36702EAB/image-size/large?v=v2&amp;amp;px=999" role="button" title="d94894_b1841edd0c724a31bda23f4f8d55737e~mv2.png" alt="d94894_b1841edd0c724a31bda23f4f8d55737e~mv2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Source: &lt;A class="TWoY9 itht3" href="https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-36934.yaml" target="_blank" rel="noopener noreferrer" data-hook="linkViewer"&gt;&lt;U class="D-jZk"&gt;https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-36934.yaml&lt;/U&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="viewer-kkork1099" class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;STRONG&gt;1. First POST Request to /human.aspx:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="public-DraftStyleDefault-ul"&gt;
&lt;LI id="viewer-4jpsg13873" class="bCMSCT Unmlxj s-SEY public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-list-ltr fixed-tab-size public-DraftStyleDefault-reset OZy-3 lnyWN yMZv8w bCMSCT"&gt;
&lt;P class="Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT"&gt;&lt;U class="D-jZk"&gt;Details&lt;/U&gt;: The SQL commands in the URL are designed to insert a new session with the specified session ID ({{session_cookie}}) and update various session attributes such as Username, LoginName, RealName, InstId, IpAddress, LastTouch, DMZInterface, Timeout, ResilNode, and AcctReady&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="viewer-9lyc516375" class="bCMSCT Unmlxj s-SEY public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-list-ltr fixed-tab-size OZy-3 lnyWN yMZv8w bCMSCT"&gt;
&lt;P class="Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT"&gt;&lt;U class="D-jZk"&gt;Goal&lt;/U&gt;: The goal is to create a new session in the database with elevated privileges and specific attributes, effectively positioning the session as a legitimate and authorized user.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;STRONG&gt;2. Second POST Request to /human.aspx with ep Parameter:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="public-DraftStyleDefault-ul"&gt;
&lt;LI id="viewer-rkha518922" class="bCMSCT Unmlxj s-SEY public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-list-ltr fixed-tab-size public-DraftStyleDefault-reset OZy-3 lnyWN yMZv8w bCMSCT"&gt;
&lt;P class="Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT"&gt;&lt;U class="D-jZk"&gt;Details&lt;/U&gt;: The transaction is set to passchangerequest.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="viewer-iv09059014" class="bCMSCT Unmlxj s-SEY public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-list-ltr fixed-tab-size OZy-3 lnyWN yMZv8w bCMSCT"&gt;
&lt;P class="Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT"&gt;&lt;U class="D-jZk"&gt;Goal&lt;/U&gt;: Setting the parameter passchangerequest that triggers the corresponding vulnerable function which can run the SQL Injection code&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;STRONG&gt;3. Third POST Request to /machine.aspx&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="public-DraftStyleDefault-ul"&gt;
&lt;LI id="viewer-w7xuu21356" class="bCMSCT Unmlxj s-SEY public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-list-ltr fixed-tab-size public-DraftStyleDefault-reset OZy-3 lnyWN yMZv8w bCMSCT"&gt;
&lt;P class="Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT"&gt;&lt;U class="D-jZk"&gt;Details&lt;/U&gt;: It includes a cookie with the session information (&lt;A class="TWoY9 itht3" href="http://asp.net/" target="_blank" rel="noopener noreferrer" data-hook="linkViewer"&gt;ASP.NET&lt;/A&gt;_SessionId={{session}}), using the manipulated session from the previous steps.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="viewer-bzqno22982" class="bCMSCT Unmlxj s-SEY public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-list-ltr fixed-tab-size OZy-3 lnyWN yMZv8w bCMSCT"&gt;
&lt;P class="Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT"&gt;&lt;U class="D-jZk"&gt;Goal&lt;/U&gt;: To execute the SQL injection using the previously manipulated session variables.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;STRONG&gt;4. Fourth POST Request to /api/v1/auth/token&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="public-DraftStyleDefault-ul"&gt;
&lt;LI id="viewer-olqf924382" class="bCMSCT Unmlxj s-SEY public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-list-ltr fixed-tab-size public-DraftStyleDefault-reset OZy-3 lnyWN yMZv8w bCMSCT"&gt;
&lt;P class="Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT"&gt;&lt;U class="D-jZk"&gt;Details&lt;/U&gt;: The request targets an API endpoint, using credentials and the session cookie to request an access token.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="viewer-xgppt26339" class="bCMSCT Unmlxj s-SEY public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-list-ltr fixed-tab-size OZy-3 lnyWN yMZv8w bCMSCT"&gt;
&lt;P class="Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT"&gt;&lt;U class="D-jZk"&gt;Goal&lt;/U&gt;: To acquire an access token for authenticated access within the application, leveraging the privileges obtained through the SQL injection&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="viewer-2g4t733458" class="qDGi6 Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;STRONG&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;WAF Pre-emptive protection&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;DIV id="viewer-imfcd34111" class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;It is crucial to minimize the 'Vulnerability Window' - the period between the initial discovery of a vulnerability (the zero-day phase) and the implementation of remediation measures, such as software updates or WAF signature rule updates.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Among the four steps outlined in the CVE-2023-36934 exploit, only the first one exhibits clear indicators of a SQL Injection (SQLi) attack, making it the primary target for preemptive detection and blocking.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block36"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="viewer-p7bs033636" class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;To evaluate this, an AppSec Agent was deployed in a test environment. We deactivated the IPS rule model and replicated the attack using the POC reference. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block39"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Our findings revealed that both open-appsec and CloudGuard AppSec effectively provide preemptive protection against CVE-2023-36934, demonstrating their capability to secure systems before vulnerabilities are widely known, exploited, or any remediation actions become available.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="viewer-bv9pr38351" class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bc6682_c9f8394f1254476f9b12f948be103949~mv2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23897i4686A36E4084760E/image-size/large?v=v2&amp;amp;px=999" role="button" title="bc6682_c9f8394f1254476f9b12f948be103949~mv2.png" alt="bc6682_c9f8394f1254476f9b12f948be103949~mv2.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H2 id="viewer-w65h738547" class="qDGi6 Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;STRONG&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;Summary&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;This blog examined CVE-2023-36934, a critical vulnerability in MOVEit Transfer software. We detailed the vulnerability's exploitation mechanism and the importance of closing the 'Vulnerability Window', the period between vulnerability discovery and remediation. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;A test was conducted with open-appsec/CloudGuard AppSec, revealing their ability to offer preemptive protection against this vulnerability, even before widespread awareness or remediation actions. This underscores the crucial role of advanced security systems in defending against zero-day threats.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;STRONG&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;This post was written by Boris Rozenfeld and published on&amp;nbsp;&lt;A href="https://www.openappsec.io/post/zero-day-protection-for-moveit-cve-2023-36934" target="_blank" rel="noopener"&gt;https://www.openappsec.io/post/zero-day-protection-for-moveit-cve-2023-36934&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/ARTICLE&gt;
&lt;/DIV&gt;</description>
    <pubDate>Wed, 03 Jan 2024 09:50:11 GMT</pubDate>
    <dc:creator>yuvalmamka</dc:creator>
    <dc:date>2024-01-03T09:50:11Z</dc:date>
    <item>
      <title>CloudGuard AppSec Provides Zero-day Protection for MOVEit CVE-2023-36934</title>
      <link>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Provides-Zero-day-Protection-for-MOVEit-CVE/m-p/202031#M224</link>
      <description>&lt;DIV class="BL3dva"&gt;
&lt;DIV class="OSxNQL"&gt;
&lt;DIV class="OFA52E"&gt;
&lt;DIV class="cD_92h UitnHM" tabindex="-1" data-hook="post-title"&gt;&lt;SPAN&gt;MOVEit Transfer is a secure file transfer software designed to enable businesses to manage critical file transfers through a centralized platform.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="nLG8d5 Ndelkt" data-hook="post-description"&gt;
&lt;ARTICLE class="blog-post-page-font"&gt;
&lt;DIV class="post-content__body"&gt;
&lt;DIV class="moHCnT"&gt;
&lt;DIV class="moHCnT"&gt;
&lt;DIV class="fTEXDR A2sIZ4 QEEfz0" data-rce-version="9.16.7"&gt;
&lt;DIV class="itVXy dojW8l s6hjqn _8a1b4" dir="ltr" data-id="rich-content-viewer"&gt;
&lt;DIV class="mhGZq BAGeNT"&gt;
&lt;DIV data-hook="rcv-block2"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;During 2023 many new CVE were found in the software, mainly utilizing SQL Injection and XSS technics. Considering the widespread adoption of the software globally, it is nessasery to have sufficient layers of security that can provide prevention during the &lt;A class="TWoY9 itht3" href="https://www.openappsec.io/post/zero-day-attack-prevention" target="_blank" rel="noopener noreferrer noreferrer" data-hook="linkViewer"&gt;&lt;U class="D-jZk"&gt;zero day phase&lt;/U&gt;&lt;/A&gt; (pre-emptive security) – before the vulnerability become known to the public, and the CVE number is assigned.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="d94894_285f46685a61475a919d949bc8ab63c0~mv2.png" style="width: 490px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23895i96DB9B8283E4E0F6/image-size/large?v=v2&amp;amp;px=999" role="button" title="d94894_285f46685a61475a919d949bc8ab63c0~mv2.png" alt="d94894_285f46685a61475a919d949bc8ab63c0~mv2.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2 id="viewer-roq6t460" class="qDGi6 Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;STRONG&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;Understanding CVE-2023-36934&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;CVE-2023-36934 was published on 2023-07-05 and assigned with a high CVE Base score of 9.1 (Critical). The Vulnerability allow an unauthenticated attacker to gain unauthorized access to the MOVEit Transfer database. An attacker could submit a crafted payload to a MOVEit Transfer application endpoint that could result in modification and disclosure of MOVEit database content.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;The vulnerability is specifically located in the /human.aspx and machine.aspx endpoints. Publicly available Proof of Concept (POC) examples offer insights into the exploitation of this vulnerability.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;A publicly available POC developed by ProjectDiscovery illustrates the exploitation process through a four-step approach:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="viewer-7lzj8834" class="QHjDE rzoRKE"&gt;
&lt;DIV class="gO6aa y8JqQg y8JqQg"&gt;
&lt;DIV class="Q6a5A" tabindex="0" role="button" data-hook="imageViewer"&gt;
&lt;DIV id="new-image1118" class="vBPBf L9OMM XHhj0"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="d94894_b1841edd0c724a31bda23f4f8d55737e~mv2.png" style="width: 936px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23896i7C4E537D36702EAB/image-size/large?v=v2&amp;amp;px=999" role="button" title="d94894_b1841edd0c724a31bda23f4f8d55737e~mv2.png" alt="d94894_b1841edd0c724a31bda23f4f8d55737e~mv2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Source: &lt;A class="TWoY9 itht3" href="https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-36934.yaml" target="_blank" rel="noopener noreferrer" data-hook="linkViewer"&gt;&lt;U class="D-jZk"&gt;https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-36934.yaml&lt;/U&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="viewer-kkork1099" class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;STRONG&gt;1. First POST Request to /human.aspx:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="public-DraftStyleDefault-ul"&gt;
&lt;LI id="viewer-4jpsg13873" class="bCMSCT Unmlxj s-SEY public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-list-ltr fixed-tab-size public-DraftStyleDefault-reset OZy-3 lnyWN yMZv8w bCMSCT"&gt;
&lt;P class="Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT"&gt;&lt;U class="D-jZk"&gt;Details&lt;/U&gt;: The SQL commands in the URL are designed to insert a new session with the specified session ID ({{session_cookie}}) and update various session attributes such as Username, LoginName, RealName, InstId, IpAddress, LastTouch, DMZInterface, Timeout, ResilNode, and AcctReady&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="viewer-9lyc516375" class="bCMSCT Unmlxj s-SEY public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-list-ltr fixed-tab-size OZy-3 lnyWN yMZv8w bCMSCT"&gt;
&lt;P class="Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT"&gt;&lt;U class="D-jZk"&gt;Goal&lt;/U&gt;: The goal is to create a new session in the database with elevated privileges and specific attributes, effectively positioning the session as a legitimate and authorized user.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;STRONG&gt;2. Second POST Request to /human.aspx with ep Parameter:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="public-DraftStyleDefault-ul"&gt;
&lt;LI id="viewer-rkha518922" class="bCMSCT Unmlxj s-SEY public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-list-ltr fixed-tab-size public-DraftStyleDefault-reset OZy-3 lnyWN yMZv8w bCMSCT"&gt;
&lt;P class="Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT"&gt;&lt;U class="D-jZk"&gt;Details&lt;/U&gt;: The transaction is set to passchangerequest.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="viewer-iv09059014" class="bCMSCT Unmlxj s-SEY public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-list-ltr fixed-tab-size OZy-3 lnyWN yMZv8w bCMSCT"&gt;
&lt;P class="Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT"&gt;&lt;U class="D-jZk"&gt;Goal&lt;/U&gt;: Setting the parameter passchangerequest that triggers the corresponding vulnerable function which can run the SQL Injection code&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;STRONG&gt;3. Third POST Request to /machine.aspx&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="public-DraftStyleDefault-ul"&gt;
&lt;LI id="viewer-w7xuu21356" class="bCMSCT Unmlxj s-SEY public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-list-ltr fixed-tab-size public-DraftStyleDefault-reset OZy-3 lnyWN yMZv8w bCMSCT"&gt;
&lt;P class="Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT"&gt;&lt;U class="D-jZk"&gt;Details&lt;/U&gt;: It includes a cookie with the session information (&lt;A class="TWoY9 itht3" href="http://asp.net/" target="_blank" rel="noopener noreferrer" data-hook="linkViewer"&gt;ASP.NET&lt;/A&gt;_SessionId={{session}}), using the manipulated session from the previous steps.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="viewer-bzqno22982" class="bCMSCT Unmlxj s-SEY public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-list-ltr fixed-tab-size OZy-3 lnyWN yMZv8w bCMSCT"&gt;
&lt;P class="Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT"&gt;&lt;U class="D-jZk"&gt;Goal&lt;/U&gt;: To execute the SQL injection using the previously manipulated session variables.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;STRONG&gt;4. Fourth POST Request to /api/v1/auth/token&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="public-DraftStyleDefault-ul"&gt;
&lt;LI id="viewer-olqf924382" class="bCMSCT Unmlxj s-SEY public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-list-ltr fixed-tab-size public-DraftStyleDefault-reset OZy-3 lnyWN yMZv8w bCMSCT"&gt;
&lt;P class="Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT"&gt;&lt;U class="D-jZk"&gt;Details&lt;/U&gt;: The request targets an API endpoint, using credentials and the session cookie to request an access token.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI id="viewer-xgppt26339" class="bCMSCT Unmlxj s-SEY public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-list-ltr fixed-tab-size OZy-3 lnyWN yMZv8w bCMSCT"&gt;
&lt;P class="Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT"&gt;&lt;U class="D-jZk"&gt;Goal&lt;/U&gt;: To acquire an access token for authenticated access within the application, leveraging the privileges obtained through the SQL injection&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id="viewer-2g4t733458" class="qDGi6 Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;STRONG&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;WAF Pre-emptive protection&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;DIV id="viewer-imfcd34111" class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;It is crucial to minimize the 'Vulnerability Window' - the period between the initial discovery of a vulnerability (the zero-day phase) and the implementation of remediation measures, such as software updates or WAF signature rule updates.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Among the four steps outlined in the CVE-2023-36934 exploit, only the first one exhibits clear indicators of a SQL Injection (SQLi) attack, making it the primary target for preemptive detection and blocking.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block36"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="viewer-p7bs033636" class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;To evaluate this, an AppSec Agent was deployed in a test environment. We deactivated the IPS rule model and replicated the attack using the POC reference. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV data-hook="rcv-block39"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Our findings revealed that both open-appsec and CloudGuard AppSec effectively provide preemptive protection against CVE-2023-36934, demonstrating their capability to secure systems before vulnerabilities are widely known, exploited, or any remediation actions become available.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="viewer-bv9pr38351" class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bc6682_c9f8394f1254476f9b12f948be103949~mv2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23897i4686A36E4084760E/image-size/large?v=v2&amp;amp;px=999" role="button" title="bc6682_c9f8394f1254476f9b12f948be103949~mv2.png" alt="bc6682_c9f8394f1254476f9b12f948be103949~mv2.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H2 id="viewer-w65h738547" class="qDGi6 Y9Dpf OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;STRONG&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;Summary&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;This blog examined CVE-2023-36934, a critical vulnerability in MOVEit Transfer software. We detailed the vulnerability's exploitation mechanism and the importance of closing the 'Vulnerability Window', the period between vulnerability discovery and remediation. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;A test was conducted with open-appsec/CloudGuard AppSec, revealing their ability to offer preemptive protection against this vulnerability, even before widespread awareness or remediation actions. This underscores the crucial role of advanced security systems in defending against zero-day threats.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="xVISr Y9Dpf bCMSCT OZy-3 lnyWN yMZv8w bCMSCT public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr"&gt;&lt;STRONG&gt;&lt;SPAN class="B2EFF public-DraftStyleDefault-ltr"&gt;This post was written by Boris Rozenfeld and published on&amp;nbsp;&lt;A href="https://www.openappsec.io/post/zero-day-protection-for-moveit-cve-2023-36934" target="_blank" rel="noopener"&gt;https://www.openappsec.io/post/zero-day-protection-for-moveit-cve-2023-36934&lt;/A&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/ARTICLE&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 03 Jan 2024 09:50:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/CloudGuard-AppSec-Provides-Zero-day-Protection-for-MOVEit-CVE/m-p/202031#M224</guid>
      <dc:creator>yuvalmamka</dc:creator>
      <dc:date>2024-01-03T09:50:11Z</dc:date>
    </item>
  </channel>
</rss>

