<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CVE-2022-27255 - when do we get a signature ? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2022-27255-when-do-we-get-a-signature/m-p/155118#M55263</link>
    <description>&lt;P&gt;Gents,&lt;/P&gt;&lt;P&gt;after DEFCON,&amp;nbsp;&lt;SPAN&gt;CVE-2022-27255 is creating a bit of a panic - and for good reasons, a quick "look" at my own corporate network shows me &amp;gt;100 devices affected usind the Realtek SDK in question.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As this is "simple" fixable with looking at the malformed SIP packages, can we get a signature update to the thread protection asap please ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"It looks for&amp;nbsp;"&lt;/SPAN&gt;&lt;EM&gt;INVITE&lt;/EM&gt;&lt;SPAN&gt;" messages with the string "&lt;/SPAN&gt;&lt;EM&gt;m=audio&lt;/EM&gt;&lt;SPAN&gt;" and triggers when there are more than&amp;nbsp;128 bytes&amp;nbsp;(size of the allocated buffer by the Realtek SDK) and if none of them is a carriage return." (Source: bleepingcomputer)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thx&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;MG&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Details:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/exploit-out-for-critical-realtek-flaw-affecting-many-networking-devices/" target="_blank" rel="noopener"&gt;https://www.bleepingcomputer.com/news/security/exploit-out-for-critical-realtek-flaw-affecting-many-networking-devices/&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Aug 2022 09:58:16 GMT</pubDate>
    <dc:creator>MaxGutberletRM</dc:creator>
    <dc:date>2022-08-17T09:58:16Z</dc:date>
    <item>
      <title>CVE-2022-27255 - when do we get a signature ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2022-27255-when-do-we-get-a-signature/m-p/155118#M55263</link>
      <description>&lt;P&gt;Gents,&lt;/P&gt;&lt;P&gt;after DEFCON,&amp;nbsp;&lt;SPAN&gt;CVE-2022-27255 is creating a bit of a panic - and for good reasons, a quick "look" at my own corporate network shows me &amp;gt;100 devices affected usind the Realtek SDK in question.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As this is "simple" fixable with looking at the malformed SIP packages, can we get a signature update to the thread protection asap please ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"It looks for&amp;nbsp;"&lt;/SPAN&gt;&lt;EM&gt;INVITE&lt;/EM&gt;&lt;SPAN&gt;" messages with the string "&lt;/SPAN&gt;&lt;EM&gt;m=audio&lt;/EM&gt;&lt;SPAN&gt;" and triggers when there are more than&amp;nbsp;128 bytes&amp;nbsp;(size of the allocated buffer by the Realtek SDK) and if none of them is a carriage return." (Source: bleepingcomputer)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thx&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;MG&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Details:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/exploit-out-for-critical-realtek-flaw-affecting-many-networking-devices/" target="_blank" rel="noopener"&gt;https://www.bleepingcomputer.com/news/security/exploit-out-for-critical-realtek-flaw-affecting-many-networking-devices/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Aug 2022 09:58:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2022-27255-when-do-we-get-a-signature/m-p/155118#M55263</guid>
      <dc:creator>MaxGutberletRM</dc:creator>
      <dc:date>2022-08-17T09:58:16Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-27255 - when do we get a signature ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2022-27255-when-do-we-get-a-signature/m-p/155120#M55264</link>
      <description>&lt;P&gt;If not already please raise it with TAC and follow-up with your SE accordingly to track the request.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note we also support importing SNORT signatures, perhaps useful as an interim measure.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Aug 2022 11:20:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2022-27255-when-do-we-get-a-signature/m-p/155120#M55264</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-08-17T11:20:11Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-27255 - when do we get a signature ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2022-27255-when-do-we-get-a-signature/m-p/155132#M55265</link>
      <description>&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98937&amp;amp;partition=Basic&amp;amp;product=IPS" target="_self"&gt;How quick are turn-around times for IPS signature updates addressing newly found vulnerabilities&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.checkpoint.com/advisories/" target="_self"&gt;CVE Advisories&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This information might help. You can also subscribe to the 2nd one.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Aug 2022 14:08:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2022-27255-when-do-we-get-a-signature/m-p/155132#M55265</guid>
      <dc:creator>CE_SE</dc:creator>
      <dc:date>2022-08-17T14:08:57Z</dc:date>
    </item>
  </channel>
</rss>

