Known and Fixed Issues on Prisma Cloud

The following table lists the known and fixed issues on Prisma Cloud.

The list of fixed issues are not cumulative; only the issues that are fixed with the last published release are included here.

Known Issues

col-widths
23,77
ISSUE ID
DESCRIPTION

End of support for AWS SDK for Java v1.x

tt:[26.2.1]

AWS is ending support for AWS SDK for Java v1.x. As a result some customers may experience a temporary warning that AWS SDK for Java v1.x is no longer supported, even if it is not present in their environment. This warning can be disregarded. The SDK is exclusively employed by the Prisma Cloud server and does not introduce any risk to your environment. All SDK-related runtimes are confined to the Prisma Cloud server side. The use of the legacy SDK has no impact your AWS environment.

Prisma Cloud will update to AWS SDK for Java 2.x in a future release.

Azure Permission Removal

tt:[26.2.1]

Azure has deprecated the following permission required to ingest resources. This permission will be removed as a requirement in a future release.

  • Microsoft.Orbital/spacecrafts/read

Ingested Findings Sources

tt:[25.12.1]

If Prisma Cloud Compute is enabled on a specific resource or account and you have configured it to ingest data from third party sources such as Tenable, Qualys or AWS inspector, Prisma will only list findings from Compute and not from third party sources for that particular resource.

Live Status Check Limitation

tt:[25.12.1]

If you have only configured VNet flow logs, the Flow Log component will display a red status (error) during the Live Status Check. This behavior is expected due to current limitations and does not affect account onboarding or flow log ingestion.

Flow Logs Ingestion Limitation

tt:[25.12.1]

MDC configuration ingestion does not currently ingest metadata from Azure Virtual Machine Scale Set that are required for Flow Logs decoration (VPC identification). As a result, you cannot run RQL queries using the Virtual Network filter when the traffic is generated by an Azure Virtual Machine Scale Set. You can still run queries using other filters, such as Source IP and Destination IP.

Vulnerability data for Windows hosts

tt:[34.02.133]

Vulnerability Data Access Issue in Prisma Cloud Enterprise Edition (Windows CSA only)

Issue

Users of Prisma Cloud Enterprise Edition are currently experiencing an issue preventing access to vulnerability details detected by cloud security agents (CSA) on Windows hosts. This data is inaccessible through both the user interface and the API.

Clarification

It is important to note that this issue solely affects the access to vulnerability data. Cloud security agents are successfully detecting and reporting vulnerabilities, and the underlying data remains intact. All historical and newly detected vulnerability data will become available once this access issue is resolved.

Resolution Timeline

Palo Alto Networks is actively working on a fix for this critical issue. A resolution is expected to be deployed and made available to users early next week. Please monitor official communication channels for updates regarding the fix’s availability and implementation steps.

RLP-156679

tt:[25.8.1]

Issues Found Warning during Onboard or Update

You may encounter an Issues Found Warning under Security Capabilities and Permissions > Misconfigurations > Asset configuration when onboarding or updating your AWS cloud accounts. This warning lists the required permissions for various API services.

You can safely ignore this warning message. It is trigerred by the backup:ListRecoveryPointsByBackupVault permission for the aws-backup-recovery-point API. The API is disabled by default.

CWP-63673

tt:[34.01.126]

RedHat Enterprise Linux 10 incompatibility with Defender Agents

RedHat deprecated iptables in RHEL 9 and does not support iptables in RHEL 10.

The WAAS defender agent, when deployed on RHEL10, relies on iptables and is incompatible with RHEL 10 due to this change.

Host details display incorrect Windows version

tt:[34.01.126]

Windows Server 2025 is incorrectly reported as Windows Server 2022 on the Host details panel.
PCSUP-28459
The total count of alerts detected may sometimes increase even if assets in your tenant are not updated. Transient changes with CSP APIs, may sometimes lead to this intermittent issue.
PCSUP-27662
Prisma Cloud Application Security Home > Projects > Repositories has a known limitation where, selecting Repositories All when generating a CSV scan report does not generate a report with a full list of all available repositories. Results are limited to a maximum of 500.
RLP-155997

When entering an RQL query, if the specified conditions are met for the aws-kms-get-key-rotation-status API, rotation and policy data (specifically in the fields keyRotations and keyPolicies in the config JSON) will not be ingested. The conditions include:

  • KeyMetadata.Origin being one of ('EXTERNAL', 'AWS_CLOUDHSM')

  • KeyMetadata.KeyManager being AWS

  • KeyMetadata.Description starting with Default master

As a result of these conditions, the list of related assets for aws-kms-get-key-rotation-status API will not be visible.

RLP-155983

Prisma Cloud uses EventBridge keys to authenticate events in the webhook, and these keys do not support key rotation. If you receive alerts for these keys 365 days after their setup due to the violation of 'AWS Secrets Manager - Ensure unmanaged secrets are rotated at least every 365 days' policy, you will not be able to resolve these alerts by rotating the keys.

Resolution— Alerts must be manually dismissed for each account. You can also perform bulk dismissal to resolve these alerts.

--

Google Cloud Run Functions (Gen2) May Not Be Scanned with Selective Registry Scanning

Google offers serverless functions in two versions: Cloud Functions ("Gen1") and Cloud Run Functions ("Gen2"). Prisma Cloud fully supports vulnerability scanning for Gen1 functions.

For Gen2, when code is uploaded to Google Cloud Run Functions, a container image is created and stored in Google Artifact Registry (GAR) or Google Container Registry (GCR). If Prisma Cloud is set to scan all registries in your GCP account, Gen2 function images will be scanned. To view results, check the relevant registry and refer to Google’s naming conventions for container images here.

If Prisma Cloud is configured to scan only selected repositories, the specific repository used by Cloud Run might not be scanned. We are working to support Gen2 function scanning in this scenario.

CWP-62339

Discrepancies in Vulnerability Scan Results

In rare instances, discrepancies were observed between vulnerability scan results from Defender and twistcli host scans.

For example, certain compliance checks identified by twistcli were not reflected in Defender scan results, and vice versa. Additionally, for some operating systems, twistcli reported a higher number of high-severity findings compared to Defender.

Even though non-System Administrators do not have the permission required to activate subscriptions, the Subscribe button is displayed for various modules under Subscriptions.

Resolution—There is no impact on system behavior since Prisma Cloud runs a check, which prevents non-System Administrators from activating the subscription even if they click Subscribe.

RLP-155193

Prisma Cloud only ingests resources for the Google Vertex AI AIPlatform API (gcloud-vertex-ai-aiplatform-index) API in the following regions where the service is available according to the Cloud Service Provider.

  • asia-east1

  • asia-east2

  • asia-northeast1

  • asia-northeast3

  • asia-south1

  • asia-southeast1

  • asia-southeast2

  • australia-southeast1

  • europe-central2

  • europe-west1

  • europe-west2

  • europe-west3

  • europe-west4

  • europe-west6

  • europe-west9

  • me-west1

  • northamerica-northeast1

  • northamerica-northeast2

  • southamerica-east1

  • us-central1

  • us-east1

  • us-east4

  • us-south1

  • us-west1

  • us-west2

  • us-west3

  • us-west4

Impact— You may encounter the Matching Engine is not supported error in regions that are not used or where the API service is not supported.

RLP-154164
With 24.11.1 release, we updated rule metadata for config policies in the backend. This updated the last modified date of custom policies too. As a result you may see a recent Last Modified date for some custom config policies, even if no changes were made. This does not have any impact on the policy evaluation and does not change the functional behaviour of the policies.
CWP-59515

K8s Defender Crash Loop on RKE2

The K8s defender pods on the RKE2 go into a crash loop if the defender is deployed using the default YAML file options.

Workaround: For Kubernetes defenders on RKE2, create the YAML file with the “SELinux Policy” option. This workaround is applicable to RKE2 only.

RLP-152525
The resource URL on the Alerts Overview page is generated by evaluating the resource metadata present in the alert. In some cases, some of the resource metadata is not available to Prisma Cloud and hence the generated URL may be incorrect.
RLP-153383

Prisma Cloud does not support the ingestion of GCP Storage buckets with the locationType Dual-region.

Impact: You may notice a mismatch between GCP Storage Bucket counts and the total number of GCP Storage Buckets listed in your GCP Project on Prisma Cloud.

RLP-153057
To provide enhanced performance, the Compliance/Asset Inventory trendline has been disabled for some tenants.
RLP-150999

Cloud resources located in disabled regions may trigger policy violations, resulting in false positive alerts. You may notice these misleading alerts associated with specific OOTB policies.

Workaround: You must manually dismiss these false positive alerts.

RLP-151696

Some invalid assets related to accounts for which the cloud scan was not completed will be deleted.

Impact: Open alerts on such existing invalid assets, where asset type is Account Aggregate Entity will get resolved.

RLP-152263

In certain cases, a system processing issue is causing deviations in the total, passed, and failed assets count.

Impact: Inaccurate overall asset counts will be displayed on Asset Inventory and Compliance Dashboard for some customers.

RLP-149425

To ingest the gcloud-cloud-domains-registration API, you need the Viewer role or any least permissive built in roles such as Cloud Domains Viewer or Cloud Domains Admin, which includes the permissions domains.registrations.list and domains.registrations.getIamPolicy.

Custom roles cannot be configured to include these permissions, as Google Cloud Platform (GCP) does not permit it. As a result, Prisma Cloud will be unable to ingest the gcloud-cloud-domains-registration API when using a custom role.

Impact: If the Viewer role or domain related built in role is correctly configured, ingestion of the gcloud-cloud-domains-registration API will proceed as expected.

If the Viewer role or domain related built in role is not configured, the API ingestion will fail, and 'Missing Permissions' warning for the above permissions will not be displayed on the account status page.

RLP-146718
In UEBA, the Excessive Login Failures policy is impacted by the use of multithreading for processing audit log events. Due to splitting of events, in rare occurrences there is a possibility that an incident (false negative) may not be detected.
RLP-143404
On some Prisma Cloud stacks, the state of a few alerts generated for Attack Path policies was displayed as Open instead of Resolved. This was caused due to an issue, which is now fixed. However, currently the impacted alerts do not display the correct state.
RLP-128421

When you filter assets associated with the Azure AD B2C tenants in the Europe region, you may notice that assets listed on the Inventory page under Region ID and Region columns incorrectly display as GCP Europe instead of Azure Europe. However, you can safely assume that the assets listed under the Region and Region ID columns are Azure Europe instead of GCP Europe.

Workaround: To verify the correct region, search for the location field in the asset’s JSON.

RLP-133698
If an Azure account being scanned is of account type Tenant, then Prisma cloud excludes AZURE_MONITOR_ACTIVITY_LOG_ALERT, AZURE_MONITOR_LOG_PROFILE, and ACCOUNT_AGGREGATE_ENTITY asset types from the scan.
RLP-129856

While testing integrations with third-party tools such as Jira, Webhook, Splunk, and Microsoft Teams in Prisma Cloud, "Unsecure url protocol" error may be displayed.

Workaround: Update all URLs used during the setup process from HTTP to HTTPS to resolve the error. This update ensures a more secure connection without impacting your existing alert notifications.

If you do not want to update the URLs from HTTP to HTTPS, you can choose to ignore the error. This will not have any impact on your existing alert notifications.

RLP-132750

The following errors may occur when you onboard your OCI tenant to Prisma Cloud:

  • Either tenant ocid or user ocid or home region is incorrect or insufficient permissions.

  • Authentication Failed. Check Account Details.

You can safely ignore these errors. They occur due to the migration of OCI tenants from Oracle Identity Domains (IDCS) to the new OCI IAM on the OCI cloud services, resulting in a significant delay in activating the user API Keys used for OCI Cloud Account Onboarding.

To verify successful onboarding, go to Settings > Providers > Cloud Accounts and ensure your account Status is green after 24 hours.

RLP-123335
When configuring Jira fields in the Prisma Cloud Notification template, it is important to note that the automatic population is limited to fields specifically of types user and labels. Other field types may not be populated as expected during the setup process. This is a known issue.
RLP-104295
Prisma Cloud has fully adopted Microsoft Authentication Library (MSAL) for monitoring Azure instances. However, in very rare cases, you might come across log entries for calls from Prisma Cloud to Active Directory Authentication Library (ADAL) endpoints. These entries can be disregarded. A fix will be implemented to resolve these erroneous entries.
RLP-90184
The behavior of filters on the Alerts Overview page is slightly different from that on the Asset Inventory and Asset Explorer pages. On the Alerts Overview page when you select the Asset Class, Resource Type, and Service Name filters, the alerts displayed are a combination of those three selected filters. Whereas on the Asset Inventory and Asset Explorer pages, the preference is given to Resource Type over Service Name when both those filters are selected due to which the assets for which alerts are displayed on the Asset Inventory and Asset Explorer pages do not match those displayed on the Alerts Overview page.
RLP-78777

The AWS Global Accelerator service returns an Access Denied error with the error assumed-role/PrismaCloudReadOnlyRole/redlock is not authorized to perform: iam:CreateServiceLinkedRole on resource. The issue occurs because the aws-global-accelerator-accelerator` API requires you to enable the service-linked IAM role to ingest metadata. To resolve the error, add the role to include the required permissions.

Workaround: If you do not want to enable the service-linked role, create a support ticket with Palo Alto Networks Technical Support to disable the AWS Global Accelerator service API.

RLP-73807
In Unified Asset Inventory, Compute alerts are not displayed in the Resource Explorer audit trail.
RLP-75376
PCDS Azure only— If you have enabled public access from selected IP addresses on storage account with Prisma Cloud NAT IPs and Azure outbound IPs added to the allow list, ingestion fails with 403 error (permission denied).
RLP-65612
PCDS Azure only— The Inventory page may display 400 error if data is not available.
RLP-65602
PCDS Azure only— During onboarding when you enter the Client ID and Secret, if the Secret exceeds the specified length, a bad request error displays.
RLP-68751
In Unified Asset Inventory, only System Administrators can view the Compute assets and not other users. Compute alerts will not be accessible on Alerts pages for all users except System Administrators.
RLP-65286

When integrating Prisma Cloud with Jira, if the Jira issueType field uses space as a separator between the words, such as Service Request or New Feature , a 500 Internal Server error occurs while configuring Typeahead fields such as Reporter or Assignee, in a Notification Template. You will be unable to create a Notification Template for Jira with the Typeahead fields.

Workaround: Rename the field to remove the space or add an underscore. For example, ServiceRequest or New_Feature. You can then add Typeahead fields in a Notification Template.

RLP-65216
If you have configured multiple flow logs for a VPC and if any of the flow logs are incorrectly configured, the flow log status on Prisma Cloud is reported as a warning (Amber). This status does not impact ingestion for all the correctly configured flow logs.
RLP-62558
The resource name displayed on the Alerts L2 page does not match the name displayed for the same resource on the Asset Explorer page.
RLP-60005
Prisma Cloud may not process some of the delete bucket events, due to which the buckets that you have deleted in the AWS console will be visible in the Prisma Cloud Inventory page.
RLP-55036
When changing the Maximum time before access keys expire value for access keys, it may take up to 15 minutes for the updates to take effect.
RLP-40248
When you create an alert rule and specify target resource tags, Prisma Cloud processes only a single resource tag key/value pair properly. Proper processing of multiple resource tags or resource tags with multiple values is not guaranteed. This behavior exists whether you create the alert rule through the Prisma Cloud console or through the CSPM API.
RLP-27427

Applies to Prisma Cloud Data Security only

Malware report is not available in PDF format.

RLP-25117
Applies to Prisma Cloud Data Security only The Dashboard displays an error when you select an account group that does not contain any accounts.
RLP-19480
The Business Unit Report does not support multi-byte characters used in languages such as Japanese.
RLP-19470
The Business Unit Report csv file lists all enabled policies even when there are no open alerts, because there are no resources to scan.
RLP-14469

When you enable Dataflow compression for a cloud account, the subnetwork creation status may display a failure message on the onboarding status page. This error displays because the time threshold to create the subnetwork and report completion exceeds the response time threshold on Prisma Cloud.

Workaround— Click to the previous page and click next to load the status page again.

RLP-13485
If you have the maximum number of VPCs (5) already created in the project and you then enable flowlog compression, the onboarding fails because Prisma Cloud is unable to add the network needed to enable Dataflow compression. When this happens the remediation steps in the message that displays is incorrect.
RLP-9723
The integration status check for Jira displays as yellow instead of red even if the integration is misconfigured.
Dashboard widgets don’t load for a large data set where the time window is also large.
The aws-ecs-describe-task-definition and aws-emr-describe-cluster APIs now run once every 24 hours to generate alerts. If you have cloud accounts with a significant amount of ECS/EMR resources, the resource status is updated once a day.
The configuration build policies are displayed even if you have not enabled Code Security module.
Currently when you edit default policies in the Code Security module, the policy is duplicated with the updated metadata. Both the unedited policy and the edited policy are then visible on Projects when the Status- Suppressed (for the original policy) and Errors (for the edited policy) are enabled.

AWS CloudTrail in the Osaka region (ap-northeast-3) do not display on the Prisma Cloud administrative console.

This issue requires a fix on AWS. When fixed on AWS, the issue will be automatically resolved on Prisma Cloud.

CWP-62780

When deploying a Fargate Defender alongside an Nginx server, the Nginx server was inaccessible through a browser, despite both the Fargate Defender container and the Nginx server container launching successfully. Additionally, no access logs were generated in the CloudWatch log file.

Workaround: Customize the Nginx container’s error logging behavior by performing the following steps.

#1: Edit the nginx.conf as below.
# Make sure that this file is copied from the official Nginx container, and not newly created.
=
error_log stderr;
=
#2: Use the above custom nginx.conf and the following Dockerfile to build a new Docker image.
=
# Use the official Nginx image as the base
FROM nginx:latest
# Remove existing symlink for error.log if it exists
RUN rm -f /var/log/nginx/error.log
# Copy custom nginx.conf into the container
COPY nginx.conf /etc/nginx/nginx.conf
# Start Nginx
CMD ["nginx", "-g", "daemon off;"]
=
PCSUP-23081
Due to a compatibility issue in Go programming language’s package, the HTTP server is unable to operate with both FIPS mode and TLS 1.3 enabled simultaneously. This limitation is preventing WAAS In-Line from supporting the configuration.
In 31.02.133, the new 81 out-of-box admission control rules in Rego are not available by default. This issue is targeted to be addressed in the next release (32.00.xxx).
AKS clusters with an underscore "_" in the resource group name are detected as vanilla Kubernetes clusters instead of AKS clusters in the host scan results.
PCSUP-11309
The --tarball` option in twistcli does not scan for compliance checks. Currently, only vulnerabilities are detected successfully.
Windows hosts running Defender are reported as unprotected. This issue occurs when Defender is installed on Windows hosts in AWS and Cloud Discovery is configured to scan your environment for protected hosts.
If you have the same custom compliance rule in use in a host policy (effect: alert) and a container policy (effect: block), the rules will enforce your policy (as expected), but the audit message for a blocked container will incorrectly refer to the host policy and host rule name.
On the Radar > Containers, K3s clusters are not displayed when a Defender is deployed with an empty cluster name. You can view the containers within these clusters under Non-cluster containers.
A 404 Not Found error is displayed when performing a sandbox image analysis using older version of twistcli, such as v22.06, with the 22.12 console.
PCSUP-22448
DNS audit does not work on AWS app-embedded Fargate Defender. Also, DNS audit works only Alpine image and not on any other OS, such as Ubuntu, Debian, and Redhat.
PCSUP-12197

For an application that originates from an OS package, the vulnerability data for CVEs is sourced from the relevant feed for the OS package. In some cases, like with Amazon Linux and Photon OS, this CVE information is provided in security advisories such as Amazon Linux Security Advisories (ALAS) for Amazon, and PHSA for Photon. In such cases, the correlation for the relevant vulnerabilities is limited.

As an example, when the application “python” is sourced from an Amazon Python package, CVEs found for the python application (as a binary) will not be correlated with the relevant Amazon CVEs from the ALAS.

-
Compliance check 6361 fails for hosts running RedHat Enterprise Linux (RHEL) 9. The check to ensure the iptables package is installed fails because iptables was deprecated in RHEL 9 and replaced with the nftables package.
-

In Inventory > Compute Workloads, for users logged in with a role other than the built in system admin role, currently only data about cloud provider managed registry images and VM instances can be viewed. In particular, for such roles currently data about the following types of assets is not displayed:

  • Run stage images

  • Private registry images

  • Build stage images

  • On-premises hosts/hosts managed by cloud providers unsupported by Compute

CWP-58896
  • With the support for ACI in cloud discovery, here are the two issues:

    • Status: The status field currently utilizes Properties > ProvisioningState, which does not reflect the container status. For more information, refer to Azure Container Instances states.

    • Defend: The Defend functionality does not support Azure Container Instances (ACI). The Defend functionality is enabled across all accounts and services, and when selected, it redirects to Images > Registry Settings.

CWP-58709

Duplicate Admission Rules

Six admission rules released in Version 32, Update 2 were found to be duplicates of older existing rules. If you need the functionality provided by these rules, we recommend disabling the old rules and using the new corresponding rules, as the older rules will be removed in an upcoming release.

The old rules and their corresponding new rules are as follows:

  • Old rule: Twistlock Labs - CIS - Pod created in host process ID namespace. New rule: Twistlock Labs - PSS - Baseline - Pod with containers that share host process ID (hostPID) namespace

  • Old rule: Twistlock Labs - CIS - Pod created on host IPC namespace. New rule: Twistlock Labs - PSS - Baseline - Pod with containers that share host IPC namespace

  • Old rule: Twistlock Labs - CIS - Pod created on host network. New rule: Twistlock Labs - PSS - Baseline - Pod that allows containers to share the host network namespace

  • Old rule: Twistlock Labs - Pod created with sensitive host file system mount. New rule: Twistlock Labs - PSS - Baseline - Pod created with sensitive host file system mount

  • Old rule: Twistlock Labs - CIS - Privileged pod created. New rule: Twistlock Labs - PSS - Baseline - Pod should not run privileged containers

  • Old rule: Twistlock Labs - CIS - Privilege escalation pod created. New rule: Twistlock Labs - PSS - Restricted - Pod that allows container privilege escalation

Note: Even though both the new and old rules are enabled by default, you will not receive duplicate alerts as only the first encountered rule is enforced.

CWP-58350

CVE Exclusions Update

The following CVEs that are included in the Intelligence Stream feed are ignored: CVE-2022-29583 - GitHub Advisory Database as it is a disputed vulnerability. CVE-2024-3154 - Arbitrary Systemd Property Injection as Defender does not directly use this package.

CWP-52710
While upgrading consoles from the 30.03 release to a 32.xx release, the error log failed to retrieve "size" specification option value during the migration doesn’t impact the migration process and can be ignored.
CWP-62297

Twistlock console unable to list image tags from remote repo

If defender and remote repository are in different subnet, the image tag pulling using podman search --list -tags is not supported with the same access token issued by registry.twistlock.com.

Fixed Issues

col-widths
23,77
ISSUE ID
DESCRIPTION

CWP-64581

tt:[Secure the Runtime]

tt:[34.04.145]

Resolved rare kernel panic in runtime monitoring

Fixed a race condition in fsmon that could lead to a kernel panic.

CWP-64543

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed WAAS rule forcing defender memory to 4GB

WAAS rule no longer forces defender max memory to 4GB when enabled on a cluster.

CWP-64542

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed defender memory settings preservation

Defender memory settings are now preserved correctly and no longer decrease unexpectedly.

CWP-64538

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed SSH host activity detection on Debian 13

SSH host activity is now properly detected on Debian 13 systems.

CWP-64513

tt:[Secure the Runtime]

tt:[34.04.145]

Improved version detection accuracy for vulnerability assessment

Defender and twistcli now correctly use OS package version when an app is correlated but its version is missing.

CWP-64494

tt:[Secure the Runtime]

tt:[34.04.145]

Reduced false positive CVEs from RPM Epoch detection

Fixed possible false positive CVE-2023-47038 due to RPM Epoch detection issues.

CWP-64486

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed container data display in image tab for agentless scans

Container data now displays correctly in the image tab when using agentless scanning.

CWP-64467

tt:[Secure the Runtime]

tt:[34.04.145]

Resolved yum hang during agentless scanning

Fixed an issue where the yum command would get stuck during agentless scanning.

CWP-64464

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed OCI agentless connectivity in Ashburn region

Resolved agentless connectivity issues for OCI in the Ashburn region.

CWP-64458

tt:[Secure the Runtime]

tt:[34.04.145]

Improved busybox version detection in agentless scans

Agentless scanning now correctly detects the full busybox version on hosts.

CWP-64454

tt:[Secure the Runtime]

tt:[34.04.145]

Multiple defender stability improvements

Backlog bug fixes for defender stability in Quinn Update 4.

CWP-64425

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed app-embedded defender exit on DNS resolution failures

App-embedded defender no longer exits when handleGetAddrInfoEvent fails.

CWP-64402

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed 502 bad gateway error in Runtime Security Module

Resolved a Runtime Security connectivity issue.

CWP-64398

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed image cleanup skipping images with empty hosts

Image cleanup logic no longer skips images when the hosts field is empty.

CWP-64382

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed RHEL 10 defender false iptables error logging

Host defender using nftables on RHEL 10 no longer logs errors about missing iptables.

CWP-64380

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed Cloud Run functions appearing in Radar when feature flag is off

Functions created with gcloud run are no longer listed in Radar view when the feature flag is disabled.

CWP-64367

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed ServiceNow alert integration reliability

Resolved issues with alerts failing to send to ServiceNow.

CWP-64359

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed CNNS container summary count mismatch

CNNS for containers now correctly sums up to match its detail counts.

CWP-64358

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed incident audit CSV serial number column

The twistlock_incidents_audit CSV file serial number column now increments correctly instead of showing constant #0.

CWP-64319

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed registry scan handling of long image tags

Registry scan image cleanup no longer fails when tag exceeds 128-character limit.

CWP-64237

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed consistent WAAS protection for Istio traffic

Istio traffic is now consistently protected by defender when using WAAS.

CWP-64233

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed registry scanner error message formatting

Registry scanner log now shows proper image pull error messages instead of %!s(MISSING).

CWP-64167

tt:[Secure the Runtime]

tt:[34.04.145]

Resolved log flooding from missing container images

Fixed "Failed to find image for container" messages flooding the log.

CWP-64117

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed ECS EXTERNAL launch type handling

Cloud Discovery now correctly handles ECS EXTERNAL launch type.

CWP-64116

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed auto-defend rules custom role filtering

Host and serverless auto-defend rules are now properly filtered by custom role.

CWP-64068

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed agentless scan status persistence after refresh

Agentless last scan field no longer disappears on page refresh.

CWP-64402

tt:[Secure the Runtime]

tt:[34.04.145]

Fixed 502 bad gateway error in Runtime Security Module

Resolved a Runtime Security connectivity issue.

CWP-64398

tt:[Secure the Runtime]

tt:[34.04.145]

Image cleanup logic skips images when hosts field is empty

Fixed an issue where images that have been deleted from their namespaces are still being shown in the console.

CWP-64117

tt:[Secure the Runtime]

tt:[34.04.145]

Cloud Discovery limitation resolved

ECS task definition containers with launchType: External that are listed in the Inventory are not present in the Prisma Cloud Console ( Runtime Security > Radar). This issue is now fixed.

CWP-63717

tt:[Secure the Runtime]

tt:[34.04.145]

Filepaths of secrets found by scanners other than agentless contain prefix of scan directory

Resolved an issue with the Vulnerability scan report for registry images showing vulnerabilities that are tagged to an image path which does not actually exist on the image.

CWP-64258

tt:[Secure the Runtime]

tt:[34.04.145]

Cloud Radar resource reporting

Fixed an issue with the inaccurate reporting for Defended resources.

CWP-64116

tt:[Secure the Runtime]

tt:[34.04.145]

Console - host and serverless auto-defend rules are not filtered by custom role

Resolved an issue with a custom role user not being able to access certain specifications when working with Defender Auto-Deploy rules.

CWP-64265

tt:[Secure the Runtime]

tt:[34.04.145]

Macro fields not populated

Fixed an issue with some macro fields not being populated, when a Compliance trigger is set up to forward alerts via Webhook to Service Now.

CWP-64459

tt:[Secure the Runtime]

tt:[34.04.145]

NF table support

Following the addition of NF tables support in WAAS, NF tables support is also now available for Defender (CNNF and Runtime Policy).

Note: Open issues relating to the Compliance scan flow, will be addressed in a subsequent release.

CWP-64543

tt:[Secure the Runtime]

tt:[34.04.145]

Defender Memory Settings

This fix prevents memory decrease if it is already set.

CWP-63255

tt:[Secure the Runtime]

tt:[34.04.145]

Unused Defender packages

Removed multiple unused packages to reduce exposure to CVEs.

PCSUP-29054

tt:[Secure the Runtime]

tt:[34.03.138]

Standardized Non-Privileged User ID for Defender CLI

To enhance security across all supported operating systems, the Defender component will now use the standardized, non-privileged User ID (1100) when executing Command Line Interface (CLI) commands.

CWP-63569

tt:[Secure the Runtime]

tt:[34.03.138]

Account-level reporting of scan date and time

The scan start and end date and time were earlier reported at the region level and weren’t precise in some situations. This fix ensures accurate reporting of scan start and end date and time at the individual account level.

CWP-63632

tt:[Secure the Runtime]

tt:[34.03.138]

Release name for Windows Server 2025 doesn’t resolve correctly

This issue is fixed now. The release name for Windows Server 2025 displays correctly.

CWP-64185

tt:[Secure the Runtime]

tt:[34.03.138]

Improved defender stability with Read-only 'runc' paths

Previously, in crio environments, if the paths to runc were located in read-only directories, the defender would delegate the calls to the first runtime it found, increasing the risk of node instability.

This issue has now been resolved, and defender will use the default runtime. To properly deploy the newer version containing this fix, follow these steps:

  1. Remove the existing defender daemonset.

  2. Ensure that no ZZ-twistlock.conf file is present in /etc/crio/crio.conf.d. If it exists, delete it.

  3. Restart the affected node.

  4. Deploy the new defender.

CWP-64196

tt:[Secure the Runtime]

tt:[34.03.138]

App-embedded Defender crashes on thread termination

The App-embedded defender crashes if the application it is protecting, or a thread of the application, terminates while it is connecting to the app-embedded defender.

CWP-61530

tt:[Secure the Runtime]

tt:[34.02.133]

False positives for Oracle images and hosts

The issue with CVE matching for Oracle images and hosts, which caused false positives due to missing Oracle module information, is fixed now.

CWP-63043

tt:[Secure the Runtime]

tt:[34.02.133]

False positives for OpenShift images

False positives were reported for OpenShift images due to incorrect parsing of the release label.

This issue is fixed now.

CWP-63194

tt:[Secure the Runtime]

tt:[34.02.133]

False positives due to incorrect Red Hat version comparison

Added support for the epoch prefix in Red Hat images. Previously, the epoch was omitted during image scanning, causing version comparisons to ignore it and resulting in false positives. This fix ensures the epoch value is included, allowing accurate version comparisons and preventing incorrect vulnerability matches.

CWP-63341

tt:[Secure the Runtime]

tt:[34.02.133]

Defender periodic scans are not disabled when the scan interval is set to 0

Even when the scan interval for images, containers and hosts is set to 0 on the Manage > System > Scan page in the UI, the defender continues to execute periodic scans every 24 hours.

This issue is fixed now.

CWP-63479

tt:[Secure the Runtime]

tt:[34.02.133]

Incorrect value in the CaaS containers column

The value in the CaaS containers column in the Registry images table on the Monitor > Vulnerabilities > Image > Registries page was not updated if the Fargate task was no longer available in Prisma Cloud.

This issue is fixed now.

CWP-63695

tt:[Secure the Runtime]

tt:[34.02.133]

Serverless scanning of Python packages in the requirements.txt file

Previously, dependencies in the requirements.txt file were not considered during vulnerability and compliance scans of Azure serverless functions and GCP Cloud Run functions for Python. Now, packages specified in requirements.txt are also included in the scan.

Note that for packages in the file to be taken into consideration, specific package versions need to be specified using "==". For example: docopt == 0.6.1

CWP-63711

tt:[Secure the Runtime]

tt:[34.02.133]

URLs for RHEL repos

The issue with CVE matching that caused false positives when relative URLs for Red Hat repositories are used is fixed now.

CWP-63808

tt:[Secure the Runtime]

tt:[34.02.133]

Gateway timeout while loading feeds

Feed changed notifications to Defenders are now batched and spread to prevent 504 Gateway Timeout errors from concurrent downloads. Defenders also use Exponential Backoff with Jitter for retries.

CWP-63880

tt:[Secure the Runtime]

tt:[34.02.133]

Base image history tagging

Scanning over 50 digests under one rule caused older base image digests to be deleted, removing base image links. The Base Image tag incorrectly remained under the Layers tab for these images. This has been fixed: the Base Image tag is now correctly removed from the Layers tab for images whose original base images were overridden.

CWP-63887

tt:[Secure the Runtime]

tt:[34.02.133]

False positives for Amazon ALAS CVE advisories

False positives were generated because of the change in the URL for the Amazon ALAS CVE advisory file. The underlying cause for these false positives is fixed now.

CWP-63924

tt:[Secure the Runtime]

tt:[34.02.133]

Node crashes on OpenShift 4.18 clusters

Node crashes may happen on OpenShift 4.18 clusters in case the defender is configured with a block policy.

This happens because OpenShift 4.18 has changed the default runtime implementation from runc to crun, and the defender didn’t handle that change correctly.

The issue is fixed now.

CWP-63935

tt:[Secure the Runtime]

tt:[34.02.133]

JWT tokens with Japanese characters fail to authenticate

Prisma Cloud roles with names that included Japanese characters caused an error.

This issue has been fixed.

CWP-63688

tt:[34.01.132]

tt:[Secure the Runtime]

No default outbound access for Azure Agentless Scanning

Microsoft Azure is retiring the facility to provide default outbound access. See the Microsoft announcement for more details.

This change will adversely impact Prisma Cloud’s ability to perform Agentless Scanning. To mitigate this issue, Prisma Cloud agentless scanners will employ Network Address Translation (NAT) gateway to access the console.

To enable Prisma Cloud agentless scanners to use the NAT gateway, the following additional permissions have been added to the onboarding Terraform template:

  • Microsoft.Network/publicIPAddresses/read

  • Microsoft.Network/publicIPAddresses/write

  • Microsoft.Network/publicIPAddresses/delete

  • Microsoft.Network/natGateways/read

  • Microsoft.Network/natGateways/write

  • Microsoft.Network/natGateways/delete

This fix ensures that Prisma Cloud Compute uses NAT gateway for agentless scanning.

CWP-63687

tt:[34.01.132]

tt:[Secure the Runtime]

Enhanced AWS resource-level permissions for copying Amazon EBS snapshots

Amazon AWS has announced enhanced resource-level permissions for copying Amazon EBS snapshots. Please see the Amazon announcement for more details. This change impacts Prisma Cloud agentless scanning of AWS compute instances.

To avoid issues that can arise from this change, the following statement has been replaced in the onboarding CFT:

"Condition": {
   "StringEquals": {
    "aws:RequestTag/created-by": "prismacloud-agentless-scan"
    }
   },
   "Action": [
    "ec2:CopySnapshot"
   ],
   "Resource": [
    "arn:aws:ec2:*::snapshot/*"
   ],
   "Effect": "Allow",
   "Sid": "PrismaCloudPrismaCloudAgentlessCopySnapshot8"
  }

With this statement:

{
   "Condition": {
    "StringEquals": {
     "aws:RequestTag/created-by": "prismacloud-agentless-scan"
    }
   },
   "Action": [
    "ec2:CopySnapshot"
   ],
   "Resource": [
    "arn:aws:ec2:*::snapshot/${*}"
   ],
   "Effect": "Allow",
   "Sid": "PrismaCloudPrismaCloudAgentlessCopySnapshot8"
  },
  {
   "Condition": {
    "StringEquals": {
     "aws:ResourceTag/created-by": "prismacloud-agentless-scan"
    }
   },
   "Action": [
    "ec2:CopySnapshot"
   ],
   "Resource": [
    "arn:aws:ec2:*::snapshot/snap-*"
   ],
   "Effect": "Allow",
   "Sid": "PrismaCloudPrismaCloudAgentlessCopySnapshot9"
  }

This change ensures that Prisma Cloud uses the enhanced resource-level permissions announced by Amazon AWS.

The statement changes won’t be shown in the status message as the status check is performed only on the action parameter in the statement; not the other parameters.

RLP-155307

tt:[Fixed in 25.6.1]

Previously, the Prisma Cloud Chronicles email was not sent to all System Administrators. With this fix, now every System Administrator will receive the Chronicles email and if they do not wish to receive it, they have an option to unsubscribe.

CWP-63359

tt:[34.01.126]

#IngressNightmare vulnerabilities

An enhanced mechanism for identification of packages helps in improved detection of vulnerabilities, such as the #ingressnightmare vulnerability issue.

This enhancement allows for earlier detection and remediation, proactively mitigating potential exploits.

CWP-63421

tt:[34.01.126]

The "defended" status for ECS task definitions inocorrectly set to false

ECS task definition entities discovered as part of cloud discovery have a "defended" status. This "defended" status field is set to true if a Fargate defender is detected as installed in one of the containers in the task definition. This "defended" status field was incorrectly set to false even when a Fargate defender was installed in one of the containers.

This issue is fixed now.

RLP-154631

tt:[Fixed in 25.3.1]

Agentless Module Impacts Credit Consumption

Resolved an issue with Agentless Scanning worker Virtual Machines (VMs) being counted towards Prisma Cloud credit consumption. Previously, credit computation incorrectly included credits attributed to worker VMs. While, the impact to overall credit consumption was negligible, the Cloud Security Posture Management (CSPM) module now identifies worker VMs spun up by the Agentless module. Consequently, credits attributed to Agentless Scanning worker VMs are no longer included in the credit consumption data that is reported.

CWP-59903

tt:[Fixed in 34.00.137]

Cleanup of system resources after registry scanning

A new scanner tag is generated when an image is pulled for scanning. In certain cases, this tag was not properly removed after the scan completed.

This issue is fixed now. Improvements to the registry scan mechanism ensure a proper cleanup of system resources after scanning.

CWP-62590

tt:[Fixed in 34.00.137]

Prisma Cloud reported incorrect fix dates for RedHat vulnerabilities

This issue occurred for vulnerabilities reported as fixed through RedHat feeds in the VEX format. This issue is fixed now.

CWP-60416

tt:[Fixed in 34.00.137]

Incorrect parsing of Ruby advisories that use RC versions

Incorrect parsing of Ruby advisories that use RC versions (such as '3.0.0-rc.1') caused false positive CVE reporting.

This issue is fixed now.

CWP-61862

tt:[Fixed in 34.00.137]

An incorrect fix date is reported for CVEs that did not provide a fix date initially

An incorrect fix date is reported for CVEs that did not provide a fix date initially and were then reopened and fixed (again) with a fix date that is later than the date when the issue was first reported as fixed. Prisma Cloud reported the date when the issue was first reported as fixed and did not update the fix date after the issue was reopened and fixed with a different date.

This issue is fixed now.

CWP-62128

tt:[Fixed in 34.00.137]

Changes in the Ubuntu feed caused false positives in some situations

Changes in the Ubuntu feed format added an asterisk in the condition for some CVE entries. This was not parsed correctly and led to false positives.

This issue is fixed now.

CWP-62193

tt:[Fixed in 34.00.137]

Incorrect fixed version reported for some CVEs reported in NVD

An issue with the parsing of NVD data led to an incorrect fixed version being reported in some cases.

This issue is fixed now.

CWP-62290

tt:[Fixed in 34.00.137]

Fixed Debian issues that have a CVE with the "nodsa\_reason" property set to "ignored" are reported as a vulnerability

Debian CVEs that have an Urgency of "unimportant" or a "nodsa\_reason" setting of "ignored" in the Debian feed were not reported as vulnerabilities when detected by Prisma Cloud Compute.

This issue is fixed now. Now, such CVEs will be reported as vulnerabilities with the status 'will not fix' by Prisma Cloud Compute.

CWP-62394

tt:[Fixed in 34.00.137]

In a few situations serverless credits were consumed even after disabling the serverless functionality

In setups/tenants that had a particular (core-serverless-scan-concurrent-flow-enabled) setting enabled, serverless scan results were not deleted. This caused some serverless credits to be consumed even after the serverless feature was disabled in the tenant.

This issue is fixed now.

CWP-62552

tt:[Fixed in 34.00.137]

Defender is unable to identify the OpenShift installation on the OpenShift nodes

The OpenShift version is not available in the RELEASE\_VERSION environment variable in the running 'openshift-tuned' process due to a change in OpenShift. It has now been replaced by a new process called cluster-node-tuning-operator that receives 'openshift-tuned' via command line args. Defenders were unable to detect the OpenShift installation due to this change.

This issue is fixed now.

CWP-62562

tt:[Fixed in 34.00.137]

Fixed RHEL issues are incorrectly flagged as unresolved due to an issue in mapping CPEs to RHEL repositories

After Redhat switched to the new VEX format for reporting CVEs and fixes, some fixed RHEL issues were incorrectly flagged as unresolved due to an issue in mapping CPEs to RHEL repositories.

This issue is fixed now.

CWP-62570

tt:[Fixed in 34.00.137]

Base images when scanned separately, displayed vulnerabilities that were not present

The scan results for some base images that were scanned separately incorrectly displayed vulnerabilities–even though no vulnerabilities were present in those base images. Whereas, images using those base images reported the vulnerabilities correctly and did not display any vulnerabilities for the underlying base images.

This issue is fixed now.

CWP-62575

tt:[Fixed in 34.00.137]

False positives observed for vulnerabilities reported in the RedHat VEX format without specific distro-release information

Vulnerabilities reported in the RedHat VEX format without specific distro-release information generated false positives.

This issue is fixed now.

CWP-62609

tt:[Fixed in 34.00.137]

Including packages of a Go application that are part of the main module in the scan results

Previously, Prisma Cloud scan results did not include Go packages that were part of the main module, resulting in the omission of these packages and their associated vulnerabilities in the console.

This issue has now been resolved.

CWP-62668

tt:[Fixed in 34.00.137]

Compliance check 598 always fails for Kubernetes containers running Redis if the container was created without using –requirepass parameter

Compliance check 598 fails and shows the error “App uses weak or default password” for Kubernetes containers running redis even though the container uses a strong password. This issue occurs if the container was created without using –requirepass parameter.

This issue is fixed now.

CWP-62883

tt:[Fixed in 34.00.137]

The 'fix status' column in the vulnerability report is blank for a few CVEs

The 'fix status' column in the vulnerability report is blank for a few CVEs due to missing information in the NVD vulnerability feed.

This issue is fixed now. The required information is now gathered using a separate NVD function.

CWP-62884

tt:[Fixed in 34.00.137]

Stale unpaired cloud security agents (CSAs) are not deleted

This issue is fixed now.

CWP-62994

tt:[Fixed in 34.00.137]

Container protected by an App embedded defender with File System monitoring enabled crashes when an SSH connection is made to it

Container protected by an App embedded defender with File System monitoring enabled crashes when an SSH connection is made to it.

This issue is fixed now.

CWP-63032

tt:[Fixed in 34.00.137]

Support Jenkins LTS CVEs detection

Prisma Cloud now extracts software edition information from CVEs and utilizes it for scanning. This enables Prisma Cloud scanners to differentiate software editions, such as Jenkins LTS releases from regular Jenkins releases, and accurately identify vulnerabilities.

CWP-63033

tt:[Fixed in 34.00.137]

Improved Vulnerability Reporting for Mirrored RHEL Repositories

Repository identifiers often change when repositories are mirrored from Red Hat’s Content Delivery Network (CDN) to alternative cloud environments, like AWS. This may result in inaccurate vulnerability reporting.

The issue has now been resolved by extracting the relative URLs of repositories from the image and comparing them with the corresponding relative URLs provided in the repository-to-CPE mapping file for CVE matching.

CWP-63110

tt:[Fixed in 34.00.137]

Incorrect data is returned when Prisma Cloud roles that have read only access to Windows hosts try to access and retrieve data from those Windows hosts

Incorrect data is returned when Prisma Cloud roles that have read only access to Windows hosts try to access and retrieve cloud metadata from those Windows hosts.

This issue is fixed now.

PCSUP-26234

tt:[Fixed in 33.03.138]

Storage issues during the Defender shutdown process

The Defender shutdown process in versions 32.02 through 32.05 (inclusive) shut down the storage component using a third-party package. This package used a flag to force storage to unmount during the shutdown, which lead to storage corruption in some cases. This issue was resolved in 32.06 by modifying the shutdown process to perform a non-forced unmount.

For any Defender instance from the affected versions that has already been shut down, upgrade the defender to a non-affected version (32.06 or later) and then reboot the node to clean up any storage corruption.

CWP-62576

tt:[Fixed in 33.03.138]

Resolving Severity Scores and CVE Links for GO Vulnerabilities in OSV Feed

When processing CVEs sourced from both the GO and GitHub Security Advisories (GHSA) formats in the Open Source Vulnerability (OSV) feed, incorrect severity scores and CVE links were assigned.

This issue is resolved. The fix ensures that the severity scores, CVSS values, and CVE links for GO vulnerabilities are accurate and aligned with the official OSV GO feed.

CWP-62313

tt:[Fixed in 33.02.134]

Improved Status Filter for Cloud Security Agent Page

The "Status" filter under Prisma UI > Manage > Defenders > Cloud Security Agent was displaying only the statuses present in the table, instead of all possible statuses.

This issue has been resolved. The CSA status filter now shows a list of all available statuses: Connected, Disconnected, and Lost. This ensures users can filter the table by any status.

CWP-35710

tt:[Fixed in 33.02.134]

Removing Namespaces After Resource Deletion

In some cases, namespaces remained visible even after all resources within them had been deleted. This led to incorrect vulnerability assessments as the namespaces were not properly removed from the results. This issue is now resolved.

CWP-62296

tt:[Fixed in 33.02.134]

Consistent Vulnerability Data for Red Hat-Sourced Packages

Certain vulnerabilities for Red Hat packages showed a Red Hat severity but CVSS scores from NVD.

This mismatch is now resolved. The fix ensures that both the severity and CVSS score now align with Red Hat’s data, eliminating inconsistencies.

CWP-62084

tt:[Fixed in 33.01.137]

Updating the list of binaries exposed to a vulnerability after rerunning a scan

Rerunning a scan didn’t update the binary packages exposed to a vulnerability. This issue is fixed now.

CWP-61947

tt:[Fixed in 33.01.137]

Boot volume encryption in agentless scanning

Fixed an issue with the agentless scanner boot volume default encryption.

CWP-61606

tt:[Fixed in 33.01.137]

CSV Export Compatibility with Excel

The exported CSV file from the Monitor > Vulnerabilities > Images > Deployed page could not be opened in Excel when the Hosts field exceeded the maximum character limit of 32,768 per column.

This issue is resolved. The fix ensures that the CSV now lists all the hostnames running the same image. However, if the total length exceeds 32,757 characters, the list is truncated, and the number of truncated hostnames is indicated in the CSV.

CWP-59281

tt:[Fixed in 33.01.137]

Improved vulnerability reporting for Debian images

When scanning Debian images, Prisma Cloud occasionally missed some CVEs related to specific package versions. This issue is fixed.

The fix prioritizes CVE matches from the security repository and Prisma Cloud now reports all previously missing CVEs for packages in Debian images.

CWP-58952

tt:[Fixed in 33.01.137]

Improved vulnerability detection for multiple Python versions

In previous versions of Defender, vulnerabilities were only detected and reported for a single Python installation on a host, even if multiple Python versions were installed. This resulted in False Negatives (FN), where vulnerabilities in other Python versions were missed.

The issue is fixed. Prisma Cloud will now scan and report vulnerabilities for each installed Python version on a host.

CWP-59654

tt:[Fixed in 33.01.137]

Support for Amazon Linux CVEs

Previously, Prisma Cloud reported several false positive vulnerabilities for Amazon Linux CVEs that were marked as "not affected" by Amazon.

Prisma Cloud now fully supports CVEs classified as “not affected” by Amazon, improving the accuracy of vulnerability reporting for Amazon products and resolving the false positive issue. The supported Amazon Linux distributions include Amazon Linux, Amazon Linux 2, and Amazon Linux 2023.

Prisma Cloud does not support CVEs labeled as "pending fix" or "no fix planned," as Amazon does not provide the required package version details for precise CVE status reporting.

tt:[Fixed in 33.00.169]

Improvements in Amazon Linux Vulnerability Reporting

Vulnerability information for many Amazon Linux CVEs lacked consistency across different Intelligence Stream updates, including changes in severity levels and fixed status versions. To address this, several key improvements were made, including enhanced consistency across scans, improved handling of duplicated CVEs, accurate ALAS to CVE conversion, and refined kernel package rules. These changes ensure more reliable and actionable vulnerability information for all Amazon distributions and kernel packages.

tt:[Fixed in 33.00.169]

Standardizing Java Versioning for Accurate Vulnerability Mapping

Inconsistent version numbering for Java products led to several false positives in Prisma Cloud security scans. To ensure accurate mapping of vulnerabilities to Java versions, all Java product versions will be normalized to the standard 1.x format. For example, in the CVE-2023-21930 entry on the National Vulnerability Database (NVD), OpenJDK 8 will map to Java 1.8.

tt:[Fixed in 33.00.169]

Enhanced Detection for Minor Versions in Alpine Packages

Alpine’s security database shows vulnerabilities for each Alpine package, including fixed versions and associated CVEs. However, when the CVE does not include a fixed version, the rule misses vulnerabilities in minor versions, leading to incomplete vulnerability coverage. This issue has been fixed. The updated vulnerability rules ensure that minor versions are included, even when no specific fixed version is available.

tt:[Fixed in 33.00.169]

CVEs Resolved in Release 33.00

While alerts were generated for CVE-2024-6104 and CVE-2024-29018, Prisma Cloud was not directly vulnerable and remained safe to use. The alerts have been resolved in Prisma Cloud release 33.00.

tt:[Fixed in 33.00.169]

Customers could pass invalid data to the v1/alert-profile and collections APIs. To address this issue, the following validations have been added:

  • For v1/alert-profiles APIs:

    • The name parameter must be less than 50 characters.

    • The email address must be valid.

    • The port parameter must not be less than 1.

    • The recipient’s email address must be valid.

  • For Collections:

    • The name parameter must be less than 50 characters.

    • The description parameter must be less than 200 characters.

tt:[Fixed in 33.00.169]

Improved Image Scanning

If the Defender disconnects while scanning an image that has the same tag, registry, repository, and credentials, it can lead to multiple scan requests of the same image. In addition, a race condition could sometimes prevent the image from being properly removed from the host container registry after scanning. This fix ensures that only one scan is performed per image, even if multiple scan requests are triggered by disconnections. This reduces the load on the Defender.

The fix also addresses the race condition. However, not all possible race conditions are addressed:

  • If the same image is scanned in different repositories or registries, race conditions are not addressed by this fix.

  • If the same image is scanned in the same repository and registry but with different tags, the fix does not handle potential race conditions.

tt:[Fixed in 33.00.169]
Previously, users experienced intermittent timeouts in a shorter timeframe than the default inactivity period, which was set to 300 minutes under Settings > Enterprise Settings > User Idle Timeout > CX. This issue has now been resolved, and all Prisma Cloud tabs log out only after 300 minutes of inactivity.
tt:[Fixed in 33.00.169]

Agentless Scanning - Support for OCI root compartment scans

OCI instances deployed in the root compartment were not scanned during Agentless scans. Instances in child compartments were scanned as expected, but root compartment instances were excluded without error. This issue is fixed-all compartments, including the root, are now scanned successfully.

tt:[Fixed in 33.00.169]

Compliance IDs 440/441 in Lamba Scans

Compliance IDs 440/441 triggered false positives during a serverless Lambda scan for kms permissions. This issue is fixed.

tt:[Fixed in 33.00.169]

Improved Clarity in Incident Log Messages

In certain cases, the command that triggered an incident was missing from the incident capture flow. This caused the messages in the Incident Explorer to occasionally lack clarity, leading to incomplete logs. The fix ensures that executed commands are now included in audit reports when available. Additionally, it prevents the generation of incomplete reports if the command is missing

tt:[Fixed in 33.00.169]

Reduced Registry Scan Duration

Prisma Cloud sometimes experienced extended registry scan times due to certain images not being correctly recognized. This led to the registry scan missing cached images, resulting in longer scan durations. The cache miss happened because the image ID hash from the Container Runtime API was missing the sha256 prefix. The issue has now been fixed by using the hash from the registry scan request sent by the Console, when available. This ensures cache hits and enhances scan performance.

tt:[Fixed in 33.00.169]
Exporting discovered APIs to OpenAPI CSV files from the Runtime > Monitor > WAAS > API discovery > Export CSV page failed if the API had unsupported methods such as PURGE. This issue is fixed.
tt:[Fixed in 33.00.169]
Previously, a "buffer full" error was reported with an HTTP 500 status code, when the same port was reused in a specific order across multiple apps in a single WAAS rule. This issue is fixed now.
tt:[Fixed in 33.00.169]
Fixed an issue where compliance alerts for malware (Compliance ID 455) did not appear in daily email reports despite failed resources being detected. This fix ensures accurate reporting for agentless scans.
tt:[Fixed in 33.00.169]

Agentless Scanning - Resource Group Creation in Target Azure Account during Hub Scan Mode

Fixed an issue where resource groups were created in the target account during Azure agentless Hub scan mode. Now, resource groups are no longer created in the target account when a hub account is defined on it.

tt:[Fixed in 32.07]
The issue related to interruption in the communication between a defender and the console—​that was introduced by the newly introduced fail-safe mechanism aimed to prevent any impact to customer traffic or downtime—​is resolved. The fix requires you to upgrade the Console and the Defenders to version 33.00.
tt:[Fixed in 32.07]

For some GO package CVEs, Prisma Cloud did not completely report all the affected versions, particularly when multiple version ranges were involved, resulting in occasional false negatives.

This issue is fixed. Prisma Cloud now reports all the affected versions for GO package CVEs.

tt:[Fixed in 32.07]

Add collections filtering behavior

Previously, image scan filtering by collection restricted the collections listed in the Collections column to the collection selected in the filter. This issue is fixed now. Now, for each image, all related collections of the filtered images are displayed, even when a specific collection filter is applied.

tt:[Fixed in 32.07]

When a JAR file with a group ID is used as a dependency in other JAR files within the same image, Prisma Cloud might fail to properly identify or match CVEs to those JAR files.

This issue is resolved. Prisma Cloud now correctly handles group IDs in both the Defender and the Console, improving the ability to identify CVEs accurately for such JAR files.

tt:[Fixed in 32.07]
A new optional query parameter includeLabels is added to the Download Container Scan Results API. This change will add all the labels corresponding to each container in the API response.
tt:[Fixed in 32.07]
Previously, Prisma Cloud did not handle cases involving unaffected and patched Ruby version ranges correctly. Additionally, cases, where patched Ruby version ranges, were included within unaffected Ruby versions using the pessimistic version constraint (~>), those cases were also not handled correctly. This issue has been resolved.
tt:[Fixed in 32.07]
Addressed the issue of false positives during vulnerability assessment due discrepancies between RPM package names and third-party package names where the same CVE may be listed under different names. For example, urllib3 for Python versus python3-urllib3 for RPM. This inconsistency led to potential false positives or missed vulnerabilities. In order to validate if the third-party package should be reported, Prisma Cloud now also assesses the origin package name.
tt:[Fixed in 32.07]
Corrected parsing of Jenkins security information in affected versions and fix versions due to a scheme change. For example, the Jenkins Security Advisory 2021-10-06 did not produce fixed versions, showing all versions as vulnerable despite CVE-2014-3577 being fixed up to and including version 2.314.
tt:[Fixed in 32.07]
Addressed an issue with Openshift cluster where incorrect image names were fetched for non RPM container images due to the cluster having a generic name for example, openshift-release-dev/ocp-v4.0-art-dev To resolve this. The mapping extracts the release and version from image labels and adjusts the name by combining registry, origin name, release, and version to be the image name. For example <registry>/<image_name>:<version>-<release>.
tt:[Fixed in 32.07]

Previously, Prisma Cloud skipped scanning Federal Information Processing Standards (FIPS)-enabled OpenSSL packages to avoid overriding older releases, and instead matched against non-FIPS versions. This led to inaccurate vulnerability reporting.

This issue has been fixed. Prisma Cloud now fully supports scanning FIPS-enabled OpenSSL versions, ensuring correct vulnerability detection and eliminating false positives.

tt:[Fixed in 32.07]

Previously, errors encountered during image scans by Defender were not added to the console log.

This issue has been fixed. Now, when Defender scans images, error messages are printed to the console log along with the image ID and the name of the Defender.

tt:[Fixed in 32.05]
Resolved issue causing containerized scans to fail due to long scan data, particularly when encountering large Java dependency lists. You can now conduct scans without encountering this issue.
tt:[Fixed in 32.05]
With the transition to the CVE 5.0 dataset, NVD has updated the format of rejected CVE descriptions. Prisma Cloud now seamlessly identifies 'Rejected' and 'Disputed' statuses of CVEs. In NVD the status is now labeled as 'Rejected reason', while CVEs tagged as 'Disputed' are identified using cve.org data source, ensuring accurate vulnerability assessment.
tt:[Fixed in 32.05]
Previously, if modifications were done to a TAS application (such as renaming it), Defender failed to re-scan the application and update the results in the Console. This issue has been resolved. Defender now re-scans the TAS applications whenever changes are made to them.
tt:[Fixed in 32.05]
Fix an issue where “risk factor” field was missed on Function and Host CSV results.
tt:[Fixed in 32.05]
CVE-2023-6992 impacts the Cloudflare version of the zlib library. However, the zlib library included in Alpine Linux is not affected by this vulnerability. A formal request has been made to Alpine Linux to classify this CVE as a non-vulnerability for their zlib version. The necessary patch has been merged, and we anticipate its inclusion in the Alpine Linux Security Database soon.
tt:[Fixed in 32.05]

Resolved parsing issues in vulnerable package versions.

The fix resolves the following issues related to detection of vulnerable package versions:

  • Correct parsing of vulnerable package versions.

  • Parsing of version ranges with different prefixes.

  • Handling of conditions for multiple versions to ensure they are added to the Intelligence feed. This resolves both false negative and false positive alerts.

tt:[Fixed in 32.04]
Vulnerabilities identified as GHSA-xm99-6pv5-q363, also known as CVE-2022-29583, are now suppressed in Defender and Console images since they are disputed.
tt:[Fixed in 32.04]
Fixed the error that blocked downloading of the serverless defender bundle for Azure C# functions.
tt:[Fixed in 32.04]
Added the incidentTime macro for webhook alerts. The macro shows the time the incident occurred. For example, Jan 21, 2018 UTC. Go to Alerts Webhook to learn more about the macro.
tt:[Fixed in 32.04]
Previously, node count was not appearing for EKS clusters on Manage > Cloud accounts as a part of Discovery report. This is now addressed, and the accurate node count is displayed both on the Prisma Cloud console and in API Cloud Discovery scan results.
tt:[Fixed in 32.04]
Resolved the issue where container images scanned with twistcli did not appear on the Runtime Security > Inventory > Assets and the Cloud Security > Inventory > Compute Workloads pages. Note: Use the --build and --job flags to include the build number and the job name to help identify the image as a build image that will be presented in the above screens.
tt:[Fixed in 32.03]
Improved accuracy of information leakage detection that resolves some false positives.
tt:[Fixed in 32.03]
Fixed twistcli tarball scan failing on hardlinks to symlinks without target files.
tt:[Fixed in 32.03]
Fixed an issue with inconsistent CVE type and set the type to be “OS” and “Application”.
tt:[Fixed in 32.03]
Fixed a filtering issue that excluded Ruby’s app and OS vulnerabilities during evaluation.
tt:[Fixed in 32.03]
Fixed an issue that resulted in duplicate CVE records because of inconsistencies in the CPE list that is included in the RHEL feeds.
tt:[Fixed in 32.03]
Fixed an issue that caused previous scan results of a failed registry scan to be removed.
tt:[Fixed in 32.03]
The agentless scanner boot volume now enforces encryption by default.
tt:[Fixed in 32.02]
Agentless scanning now supports scanning of Podman container images deployed to hosts with the default storage driver.
tt:[Fixed in 32.02]
Fixed an issue where scanning scripts that contain binary data caused memory consumption issues.
tt:[Fixed in 32.02]
Improved the detection of vulnerabilities on supported Windows OS workloads to fix false negative and false positive alerts related to Windows feeds.
tt:[Fixed in 32.02]
Fixed an issue causing some TAS blobstore controllers not to be listed.
tt:[Fixed in 32.02]
Fixed an issue found during configuration of the Tanzu blobstore scanner. The configuration didn’t filter the scanners from the selected cloud controller correctly. Now, when you provide a cloud controller in the Tanzu blobstore scan configuration, only the suitable scanners are available in the scanner dropdown.
tt:[Fixed in 32.02]
Fixed an issue where users could not see credentials stored in the Runtime Security credential store, when creating a new System Admin role while specifying cloud accounts only onboarded under Runtime Security.
tt:[Fixed in 32.02]
Added support for installing serverless defender on AWS with NodeJS runtime, using layer based deployment type and ES modules type.
tt:[Fixed in 32.01]
Container Support: Bump github.com/containers/storage to v1.42.0 (or later).
tt:[Fixed in 32.01]
Documentation: Updated the inconsistent icons in the documentation of the trusted images compliance under Monitor > Compliance > Trusted images.
tt:[Fixed in 32.01]
Serverless: Fixed confusion around the serverless function defended status.
tt:[Fixed in 32.01]
Operating System Support: Fixed false positives caused by CVE-2016-9063 in hosts running RHEL.
tt:[Fixed in 32.01]
Operating System Support: Improve parsing of Debian feed for CVEs with status open to include only the vulnerable versions.
tt:[Fixed in 32.01]
Cloud Service Providers - Azure: Fixed an issue where the cluster name of Azure AKS clusters was incorrectly resolved by Defenders as vanilla Kubernetes cluster instead of AKS cluster, if the resource group name of the cluster contained the suffix _group.
tt:[Fixed in 32.01]
Image Scanning: Fixed an issue where system administrators could see all the clusters in the Image Vulnerability scan reports.
tt:[Fixed in 32.01]
Collections added using the Add a New Collection endpoint: Fixed the issue with collections that were added by invoking the Add a New Collection endpoint with one or more empty fields: such collections did not display in the Console. The Add a New Collection endpoint is updated to fix this issue. Now, all request body fields of this endpoint, except name, are optional. Any optional field that is not provided will default to the wildcard value '*'.
tt:[Fixed in 32.01]
Logging: Fixed an issue causing errors in logs after upgrading from v30.00.140 to v31.00.129.
tt:[Fixed in 32.01]
Registry Scanning: Fixed an issue that caused a scanning failure for Google artifactory registry using credentials imported from the Prisma Cloud platform.
tt:[Fixed in 32.00]
Fixed an issue with agentless scanning that in some conditions failed scanning encrypted volumes when using hub mode in AWS.
tt:[Fixed in 32.00]
In v31.02.133, the new 81 out-of-box admission control rules in Rego were not available by default. This is now fixed. With the v32.00 Console, you now get all the 81 OOB admission control rules.
tt:[Fixed in 32.00]
Fixed an issue where "sourceType" field was missing for Splunk alert meesages. User can now add "sourceType" field to the custom alert JSON of Splunk and prisma cloud will define the external field based on the custom one.
tt:[Fixed in 32.00]
Fixed an issue where the progress bar while scanning deployed images was not reported correctly.
tt:[Fixed in 32.00]
Fixed an issue where Nuget vulnerabilities of same package with difference path appear with the same path.
tt:[Fixed in 32.00]
Fixed an issue that stopped the registry scan due to an invalid credentials error. The registry scan now completes on credential fetch errors.
tt:[Fixed in 32.00]
Custom rule names are now populated for runtime custom rule incidents. Also, labels are reported for when the incident occurred in a Kubernetes cluster.
tt:[Fixed in 31.03.103]
Fixed an issue wherein the alerts were pending in the immediate alerts queue and causing logging errors.
tt:[Fixed in 31.03.103]
Fixed an issue with a broken Jenkins CI link that incorrectly pointed to the Console with filter “true” and no relevant results. The Jenkins output log link now correctly shows the relevant filter for the Jenkins job under Monitor > Vulnerabilities > Images > CI.
tt:[Fixed in 31.03.103]
Fixed an issue wherein the Tanzu apps were missing under Monitor > Vulnerabilities scan results for the deployed images on the Diego cells and the image scanning for TAS applications mounted on the external system took extremely long. To fix this issue, the Defender scan now ignores scanning the images of TAS applications mounted on the external file system.
tt:[Fixed in 31.03.103]
Fixed a bug for AWS accounts configured to scan in hub mode. The bug caused a permissions error to appear in the UI during the cleanup stage, while no actual permissions issues were present and the scan was completed successfully.
tt:[Fixed in 31.02.133]
Fixed issue in RHEL clusters running NodeOS where compliance checks didn’t show any non-compliant alerts.
tt:[Fixed in 31.02.133]
Fixed an issue where Defender failed to block containers when containers were restarted frequently and generated too many audit events. This was fixed by decreasing the number of requests sent to the Console.
tt:[Fixed in 31.02.133]
Fixed an issue where REST API requests triggered rate limiting after 23 requests in a 30 second interval. With this fix, the rate limit for Prisma Cloud Compute REST APIs is increased to 30 requests in 30 seconds.
tt:[Fixed in 31.01.123]
Fixed an error in deploying and upgrading the Host Defenders on Windows Server 2019 installed on AWS.
tt:[Fixed in 31.01.123]
Fixed an issue where node count was missing for EKS clusters under Manage > Cloud accounts cloud Discovery report. The correct node count is now displayed on the Console and in API Cloud Discovery scan results.
tt:[Fixed in 31.00.129]
Fixed an issue limiting the support of Prisma Cloud Compute as a pluggable scanner in Harbor. The support is now extended to instances where the Defenders operate in a CRI environment.
tt:[Fixed in 31.00.129]
Fixed an issue that caused missing version detection for jar packages when the version name included a date, for example, 20171018.
tt:[Fixed in 31.00.129]
Fixed an issue preventing agentless scanning of onboarded Azure government accounts
tt:[Fixed in 31.00.129]
Fixed an issue caused when listing container details of containers on hosts using Docker as the CRI. The issue led to agentless scanning not discovering containers on the specified host. The fix improves the scan process tolerance to errors during the retrieval of containers metadata.
tt:[Fixed in 31.00.129]
Added missing OS labels, both osDistro and osVersion, to hosts scanned by agentless scanning.