live.paloaltonetworks.com Open in urlscan Pro
3.160.150.11  Public Scan

URL: https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/ta-p/340184
Submission: On April 30 via api from IN — Scanned from DE

Form analysis 2 forms found in the DOM

Name: formPOST https://live.paloaltonetworks.com/t5/tkb/v2_4/articlepage.searchformv32.form.form

<form enctype="multipart/form-data" class="lia-form lia-form-inline SearchForm" action="https://live.paloaltonetworks.com/t5/tkb/v2_4/articlepage.searchformv32.form.form" method="post" id="form" name="form">
  <div class="t-invisible"><input value="blog-id/GlobalProtect_Articles/article-id/19" name="t:ac" type="hidden"><input value="search/contributions/page" name="t:cp" type="hidden"><input
      value="f95fWS3bISBMohL87cNTon8WbMTXcn2aR-hX5TFii8Yk9O3lhK0F7LOC26XdUWIoZprIdsFZJQNCwfhj9zbowg9DYSWupiqVoSkOlKIjWfZ2E_4g-Dac13n7AlyQoQyjkzlZpNS0Fz2ysl6_9U9jebofkWeM3_WlGb_zZLXWujWZkmJcjXdNM5nGskTnhGoOtGYlbmEz3qaK5qjSQBYovAEzWOxvZYBAKsdUAHeq0sYbO4Kxu2IZTpvtkG23x4kgM-NbRIillRUSaLdE8Z4_ZIdCCZBBXVlZhj8PLel6qnZ-NkHo1csX4HoUDQaE_kihqTlh1YK0hpNZxCh7jNwhXs4nyRSoMvX6mfGATkyxSYlogJ27NUERGUIBtApOmeETXnLlTSgpzyuuJE-7mOgNhlxS9e32SJrtaMmCg_P5ne0_u0gNV5CG1o1TcasMi0jB7efGCTDU49kMjvZPRxB_-9V3LOIA0zYDJU-uVQqd7B8l-mJwZD8ANW6fR0XCV9ifnlNCt3vR3t_pEWrLtbcKuYOjNFChmY27qxGC6cGXwGIW9RNoUmUE2e-z4UoP9yOg90cP6szw1T0vfBVXN7QR93MNhneFSvm5KAMI1cJX7RpMY-QmICkjDXXfUhOvfYzxwj5daKk22H8W_c3BY4yZApQX-Du2d60B9jOG2VD3RDvs9IA6wVS3aYkZm5shAwZymFsk4KTNHXEPxBWYwVJLU5yq82fSSiDzsYIkxmPKJ5g_mkWv3qBWBDNlDJuFpiK_dZDSrdsE0j3ysh0tq8ruCVe6PmnSgYbp0gcHiOFW1KKT7MSbhm9O59X0GQcjsrUmFds9wzoUlCu95SVK36Vus44s05NLeLkgsDSQpUrDrG6CET6j4BuaTZAdn4l_ANJI-7TLq2oFZwKR1Ibpr0ru8RGVMJoZSBhfBQrRPnZmNR8F22bqv0CmHBGpGxWR5mnx8OXnesc0PR6rgra3evb_BpfmWgqFcBL_joLsBOuX1Q8Iv-X1lIh3VDGV6AnIb7TfTYEbZs73qKCBDaUS5Kmz7gXtD357mcSYOecCApYxXKnxdvjMOAr2FDGUdUYYgm39B5mWBuU4LwvrPYPwJp63V2zWUY4dBHiC6n2ujh56Y3a2VUtZ50fzZbFKxs7lqO56EY_XztstFyEZO-PpOYQoWYELRtjouj7k4r2scFcWp4_pEeWRNOi7p-WVcY6cj8t_2WzC-TppIpjZAQwZtHH_7bOz9otB1C9XfWaFQJIUcR4."
      name="lia-form-context" type="hidden"><input value="TkbArticlePage:blog-id/GlobalProtect_Articles/article-id/19:searchformv32.form:" name="liaFormContentKey" type="hidden"><input
      value="5DI9GWMef1Esyz275vuiiOExwpQ=:H4sIAAAAAAAAALVSTU7CQBR+krAixkj0BrptjcpCMSbERGKCSmxcm+kwlGrbqTOvFDYexRMYL8HCnXfwAG5dubDtFKxgYgu4mrzvm3w/M+/pHcphHQ4kI4L2dMo9FLYZoM09qbeJxQ4V0+XC7e/tamqyBPEChwgbh1JAjQtLIz6hPaYh8ZlEMaxplAvm2KZmEsm0hhmBhOKpzZzOlsEw8LevR5W3zZfPEqy0oJIYc+eCuAyh2rolfaI7xLN0I8rjWfWBj7CuzJvf5osmbxRN3hacMimNwHRtKSOr0XNnv/vx+FoCGPjhMRzljhNLYHrEt9kA5T08ACCsKvREoYuqxqLl8BLO84q4UcMITcG49y/QOGs1pYyESl5p6V6qwRW086rinVmoxMZsiZud/zBUTc6gmVc4kExkJafmcYG1GM9+wfIsCkf2OP54hal5EjnG54z8h0XhjfcF7wQUs5Kz0GTjU2rOjc/llTT4Au07pDOcBQAA"
      name="t:formdata" type="hidden"></div>
  <div class="lia-inline-ajax-feedback">
    <div class="AjaxFeedback" id="feedback"></div>
  </div>
  <input value="uRiXX2esX1g9jCY_lqZyTV9CmjBxAwfOEZqCvvUognA." name="lia-action-token" type="hidden">
  <input value="form" id="form_UIDform" name="form_UID" type="hidden">
  <input value="" id="form_instance_keyform" name="form_instance_key" type="hidden">
  <span class="lia-search-granularity-wrapper">
    <select title="Search Granularity" class="lia-search-form-granularity search-granularity" aria-label="Search Granularity" id="searchGranularity" name="searchGranularity">
      <option title="All community" selected="selected" value="twzvq79624|community">All community</option>
      <option title="This category" value="GlobalProtect|category">This category</option>
      <option title="Articles" value="GlobalProtect_Articles|tkb-board">Articles</option>
      <option title="Users" value="user|user">Users</option>
      <option title="Products" value="product|product">Products</option>
    </select>
  </span>
  <span class="lia-search-input-wrapper">
    <span class="lia-search-input-field">
      <span class="lia-button-wrapper lia-button-wrapper-secondary lia-button-wrapper-searchForm-action"><input value="searchForm" name="submitContextX" type="hidden"><input class="lia-button lia-button-secondary lia-button-searchForm-action"
          value="Search" id="submitContext" name="submitContext" type="submit"></span>
      <span class="lia-hidden-aria-visibile" id="autocompleteInstructionsText" role="alert"></span><input placeholder="Search this content" aria-label="Search" title="Search"
        class="lia-form-type-text lia-autocomplete-input search-input lia-search-input-message" value="" id="messageSearchField_0" name="messageSearchField" type="text" aria-autocomplete="both" autocomplete="off">
      <div class="lia-autocomplete-container" style="display: none; position: absolute;">
        <div class="lia-autocomplete-header">Enter a search word</div>
        <div class="lia-autocomplete-content">
          <ul></ul>
        </div>
        <div class="lia-autocomplete-footer">
          <a class="lia-link-navigation lia-autocomplete-toggle-off lia-link-ticket-post-action lia-component-search-action-disable-auto-complete" data-lia-action-token="NNvDMoM1z2LCueOUhkOz7h2FdJ3YznKu8owSq_aElZQ." rel="nofollow" id="disableAutoComplete_6d9c4c3df3a2c9" href="https://live.paloaltonetworks.com/t5/tkb/v2_4/articlepage.disableautocomplete:disableautocomplete?t:ac=blog-id/GlobalProtect_Articles/article-id/19&amp;t:cp=action/contributions/searchactions">Turn off suggestions</a>
        </div>
      </div>
      <span class="lia-hidden-aria-visibile" id="autocompleteInstructionsText_0" role="alert"></span><input placeholder="Search this content" aria-label="Search" title="Search"
        class="lia-form-type-text lia-autocomplete-input search-input lia-search-input-tkb-article lia-js-hidden" value="" id="messageSearchField_1" name="messageSearchField_0" type="text" aria-autocomplete="both" autocomplete="off">
      <div class="lia-autocomplete-container" style="display: none; position: absolute;">
        <div class="lia-autocomplete-header">Enter a search word</div>
        <div class="lia-autocomplete-content">
          <ul></ul>
        </div>
        <div class="lia-autocomplete-footer">
          <a class="lia-link-navigation lia-autocomplete-toggle-off lia-link-ticket-post-action lia-component-search-action-disable-auto-complete" data-lia-action-token="jZJAR-dVtepZ-lwIvwx34i0m5EZVp9UslM-8bUf7UX8." rel="nofollow" id="disableAutoComplete_6d9c4c3e18d969" href="https://live.paloaltonetworks.com/t5/tkb/v2_4/articlepage.disableautocomplete:disableautocomplete?t:ac=blog-id/GlobalProtect_Articles/article-id/19&amp;t:cp=action/contributions/searchactions">Turn off suggestions</a>
        </div>
      </div>
      <span class="lia-hidden-aria-visibile" id="autocompleteInstructionsText_1" role="alert"></span><input placeholder="Search community members" ng-non-bindable="" title="Enter a user name or rank"
        class="lia-form-type-text UserSearchField lia-search-input-user search-input lia-js-hidden lia-autocomplete-input" aria-label="Enter a user name or rank" value="" id="userSearchField" name="userSearchField" type="text"
        aria-autocomplete="both" autocomplete="off">
      <div class="lia-autocomplete-container" style="display: none; position: absolute;">
        <div class="lia-autocomplete-header">Enter a user name or rank</div>
        <div class="lia-autocomplete-content">
          <ul></ul>
        </div>
        <div class="lia-autocomplete-footer">
          <a class="lia-link-navigation lia-autocomplete-toggle-off lia-link-ticket-post-action lia-component-search-action-disable-auto-complete" data-lia-action-token="L8u3z82MhiUYbfzfbA2NFefiHknooiuEZNSYXIotOpw." rel="nofollow" id="disableAutoComplete_6d9c4c3e32bdf6" href="https://live.paloaltonetworks.com/t5/tkb/v2_4/articlepage.disableautocomplete:disableautocomplete?t:ac=blog-id/GlobalProtect_Articles/article-id/19&amp;t:cp=action/contributions/searchactions">Turn off suggestions</a>
        </div>
      </div>
      <span class="lia-hidden-aria-visibile" id="autocompleteInstructionsText_2" role="alert"></span><input placeholder="Enter a keyword to search within the private messages" title="Enter a search word"
        class="lia-form-type-text NoteSearchField lia-search-input-note search-input lia-js-hidden lia-autocomplete-input" aria-label="Enter a search word" value="" id="noteSearchField_0" name="noteSearchField" type="text" aria-autocomplete="both"
        autocomplete="off">
      <div class="lia-autocomplete-container" style="display: none; position: absolute;">
        <div class="lia-autocomplete-header">Enter a search word</div>
        <div class="lia-autocomplete-content">
          <ul></ul>
        </div>
        <div class="lia-autocomplete-footer">
          <a class="lia-link-navigation lia-autocomplete-toggle-off lia-link-ticket-post-action lia-component-search-action-disable-auto-complete" data-lia-action-token="Ugw4mLBTdr6DK-pSGhEdIL-_tCjNpqHFD6ikWwhg5t0." rel="nofollow" id="disableAutoComplete_6d9c4c3e4e8841" href="https://live.paloaltonetworks.com/t5/tkb/v2_4/articlepage.disableautocomplete:disableautocomplete?t:ac=blog-id/GlobalProtect_Articles/article-id/19&amp;t:cp=action/contributions/searchactions">Turn off suggestions</a>
        </div>
      </div>
      <span class="lia-hidden-aria-visibile" id="autocompleteInstructionsText_3" role="alert"></span><input title="Enter a search word"
        class="lia-form-type-text ProductSearchField lia-search-input-product search-input lia-js-hidden lia-autocomplete-input" aria-label="Enter a search word" value="" id="productSearchField" name="productSearchField" type="text"
        aria-autocomplete="both" autocomplete="off">
      <div class="lia-autocomplete-container" style="display: none; position: absolute;">
        <div class="lia-autocomplete-header">Enter a search word</div>
        <div class="lia-autocomplete-content">
          <ul></ul>
        </div>
        <div class="lia-autocomplete-footer">
          <a class="lia-link-navigation lia-autocomplete-toggle-off lia-link-ticket-post-action lia-component-search-action-disable-auto-complete" data-lia-action-token="OSVYHmpPBnD3AaxrubDi6_CZ2GUU6UWYjPYhycI8iBk." rel="nofollow" id="disableAutoComplete_6d9c4c3e6619af" href="https://live.paloaltonetworks.com/t5/tkb/v2_4/articlepage.disableautocomplete:disableautocomplete?t:ac=blog-id/GlobalProtect_Articles/article-id/19&amp;t:cp=action/contributions/searchactions">Turn off suggestions</a>
        </div>
      </div>
      <input class="lia-as-search-action-id" name="as-search-action-id" type="hidden">
    </span>
  </span>
  <span class="lia-cancel-search">cancel</span>
</form>

<form id="any_0" class="lia-rating-control-type-star">
  <meta>
  <meta>
  <div class="ui-stars-star ui-stars-star-on ui-stars-star-disabled" style="width: 8px;"><a title="" style="margin-left: 0px;">0.5</a></div>
  <div class="ui-stars-star ui-stars-star-on ui-stars-star-disabled" style="width: 8px;"><a title="" style="margin-left: -8px;">1.0</a></div>
  <div class="ui-stars-star ui-stars-star-on ui-stars-star-disabled" style="width: 8px;"><a title="" style="margin-left: 0px;">1.5</a></div>
  <div class="ui-stars-star ui-stars-star-on ui-stars-star-disabled" style="width: 8px;"><a title="" style="margin-left: -8px;">2.0</a></div>
  <div class="ui-stars-star ui-stars-star-disabled" style="width: 8px;"><a title="" style="margin-left: 0px;">2.5</a></div>
  <div class="ui-stars-star ui-stars-star-disabled" style="width: 8px;"><a title="" style="margin-left: -8px;">3.0</a></div>
  <div class="ui-stars-star ui-stars-star-disabled" style="width: 8px;"><a title="" style="margin-left: 0px;">3.5</a></div>
  <div class="ui-stars-star ui-stars-star-disabled" style="width: 8px;"><a title="" style="margin-left: -8px;">4.0</a></div>
  <div class="ui-stars-star ui-stars-star-disabled" style="width: 8px;"><a title="" style="margin-left: 0px;">4.5</a></div>
  <div class="ui-stars-star ui-stars-star-disabled" style="width: 8px;"><a title="" style="margin-left: -8px;">5.0</a></div><input type="hidden" name="" value="2.0" disabled="">
</form>

Text Content

This website uses Cookies. By clicking Accept, you agree to the storing of
cookies on your device to enhance your community experience. Read our Privacy
Policy.
Click Preferences to customize your cookie settings.

Accept

Reject
Preferences
 * Register
 * ·
 * Sign In
 * ·
 * FAQs

(English) USA
(English) USA
(简体中文) China
(日本語) Japan
(한국어) Korea
(繁體中文) Taiwan

 * Get Started
   News & Events
   Events
   Ignite Conference
   News
   Welcome Guide
   LIVEcommunity Support Info
   FAQ
 * Discussions
   Network Security
   Next-Generation Firewall Discussions
   VM-Series in the Public Cloud
   VM-Series in the Private Cloud
   CN-Series Discussions
   AIOps for NGFW Discussions
   Panorama Discussions
   GlobalProtect Discussions
   Cloud NGFW Discussions
   Cloud Delivered Security Services
   Threat & Vulnerability Discussions
   Endpoint (Traps) Discussions
   Enterprise Data Loss Prevention Discussions
   Next-Generation CASB Discussions
   IoT Security Discussions
   Secure Access Service Edge
   Prisma Access Discussions
   Prisma Access Insights Discussions
   Prisma Access for MSPs and Distributed Enterprises Discussions
   Prisma Access Cloud Management Discussions
   Prisma SD-WAN Discussions
   Prisma SD-WAN CloudBlades Discussions
   Prisma SD-WAN AIOps Discussions
   Autonomous DEM Discussions
   Cloud Native Application Protection
   Prisma Cloud Discussions
   Cloud Identity Engine Discussions
   Security Operations
   Cortex XDR Discussions
   Cortex XSOAR Discussions
   Cortex Xpanse Discussions
   Cortex XSIAM Discussions
   General Topics
   Custom Signatures
   VirusTotal
 * Blogs
   Community Blogs
   Engineering Blogs
 * Articles
 * Products
   Network Security
   GlobalProtect
   Next-Generation Firewall
   Cloud NGFW for AWS
   Cloud NGFW for Azure
   AIOps for NGFW
   Strata Cloud Manager
   Strata Logging Service
   Getting Started With VM-series
   Private Cloud
   Oracle Cloud Infrastructure
   Alibaba Cloud
   AWS
   GCP
   Azure
   CN-Series
   Panorama
   Threat Prevention Services
   SSL Decryption
   App-ID
   Content-ID
   User-ID
   5G
   Cloud Delivered Security Services
   Next-Generation CASB
   IoT Security
   Enterprise Data Loss Prevention
   Secure Access Service Edge
   Prisma Access
   Prisma Access Insights
   Autonomous Digital Experience Management
   Prisma Access Cloud Management
   Prisma Access for MSPs and Distributed Enterprises
   Prisma SD-WAN
   Prisma SD-WAN CloudBlades
   Prisma SD-WAN AIOps
   Cloud Native Application Protection
   Prisma Cloud
   Cloud Identity Engine
   Security Operations
   Cortex XDR
   Cortex XSOAR
   Cortex Xpanse
   Cortex XSIAM
   Hub
   
 * Tools
   Integration Resources
   App for QRadar
   Cloud Integration
   Expedition
   HTTP Log Forwarding
   Maltego for AutoFocus
   
 * Education Services
   Certification
   Instructor-Led Training
   Digital Learning
   Education Services Help Center
   Education Services Upcoming Events
   Education Services Articles
   
   
 * Member Recognition
   Spotlight News
   Member Spotlights
   Member Testimonials
   Cyber Elite Program
 * Podcasts
   PANCast™
   PANCast™ Episodes
   PANCast™: Episode Ideas Submission
   Threat Vector
 * * Customer
   * Partner
   * Employee

UNLOCK YOUR FULL COMMUNITY EXPERIENCE!

 * Access exclusive content
 * Connect with peers
 * Share your expertise
 * Find support resources

Sign In- or -RegisterNeed Login Assistance?



APPLYING VULNERABILITY PROTECTION TO GLOBALPROTECT INTERFACES



All communityThis categoryArticlesUsersProducts
Enter a search word

Turn off suggestions
Enter a search word

Turn off suggestions
Enter a user name or rank

Turn off suggestions
Enter a search word

Turn off suggestions
Enter a search word

Turn off suggestions
cancel
Turn on suggestions
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer
Advisories area.

 * LIVEcommunity
 * 
 * Products
 * 
 * Network Security
 * 
 * GlobalProtect
 * 
 * GlobalProtect Articles
 * 
 * Applying Vulnerability Protection to GlobalProtect Interfaces

Options
 * Subscribe to RSS Feed
 * 
 * Mark as New
 * Mark as Read
 * 
 * Printer Friendly Page




APPLYING VULNERABILITY PROTECTION TO GLOBALPROTECT INTERFACES


maurisy
L4 Transporter
Options
 * Mark as New
 * 
 * Subscribe to RSS Feed
 * 
 * Permalink
 * Print

on ‎07-22-2020 03:59 PM - edited on ‎04-24-2024 10:11 AM by JayGolf

73% helpful (8/11)

Summary

This document discusses the configuration steps for applying a vulnerability
protection security profile to GlobalProtect interface, in order to protect the
GlobalProtect services from attacks using published product security
vulnerabilities.

 

Background

In customer deployments that use GlobalProtect for remote access, customers
often configure and apply security profiles such as vulnerability protection to
network traffic between VPN clients and internal network zones. 

 

There are also certain circumstances where a customer may want to apply a
vulnerability protection profile to traffic hitting the GlobalProtect portal and
gateway services, which are served by the firewall and not just traffic going
through the firewall into the network. For example, there may be situations
where a customer wants to block attempted attacks before they are able to
upgrade PAN-OS to a patched version. This can be accomplished by applying a
properly configured vulnerability protection profile to a firewall rule that is
configured to apply to traffic hitting the GlobalProtect portal and gateway
services hosted by the firewall.

 

Note 1: 4/14/2024: A hotfix for each of the PAN-OS versions (10.2, 11.0, 11.1)
affected by CVE-2024-3400 is now available in the Customer Support Portal (CSP)
and inside PAN-OS (both NGFWs and Panorama). An ETA for other commonly deployed
versions of PAN-OS is available on the product security advisory for
CVE-2024-3400. It is recommended to apply this hotfix and also complete the
mitigations recommended in the advisory. 

 

Note 2: This document uses CVE-2024-3400 as an example in this how-to guide,
where vulnerability protection signature #95187 was released in content version
8833-8682, released on 4/11/2024 to detect and prevent attempted attacks. The
vulnerability affected GlobalProtect portal and gateway services. This document
assumes that the firewall is already configured and used as a GlobalProtect
portal and/or gateway service.

 

 

Configuration Steps:

 

Step 1: Ensure that you have the latest content update installed that includes
the relevant threat protection

 * Make sure the content version that you are running includes the threat
   signature(s) that need to be applied to the GlobalProtect interfaces in order
   to block the attack.
 * In the example used in this document, the minimum content version required is
   8833-8682, which was released on 4/11/2024.

 

Step 2: Determine the correct zone for GP portal and GP gateway

 * If a GP Portal is configured, go to Network > GlobalProtect > Portals and
   find the portal and associated interface. In the example below, you will see
   we are using GP-Auto-Portal1 as an example. The interface that the portal
   connects to is shown to be ethernet1/1.

 



 

 * Determine the associated zone for the GlobalProtect portal that includes the
   interface found in the previous step.
   Go to Network > Interfaces > Ethernet. In the example below, we can see that
   interface ethernet1/1 is in GP-untrust zone.

 



 

 * If a GlobalProtect gateway is configured, go to Network > GlobalProtect >
   Gateways and find the gateway and associated interface. In the example below,
   you will see we are using GP-GW1 as an example. The interface is loopback.1.

 



 

 * Determine the zone associated with the GlobalProtect gateway. Go to Network >
   Interfaces > Loopback. We can see that interface loopback.1 is also in
   GP-untrust zone. Now we know the zone for the portal and gateway, which we
   need to protect with a vulnerability protection profile.

 





 

Step 3: Modify or Create a New Vulnerability Protection Profile 

Configure a new or existing vulnerability profile that is specifically
configured to block the relevant threat impacting the GlobalProtect services. Go
to Objects > Security Profiles > Vulnerability Protection. We recommend as a
best practice to simply set the blocking action of “reset-server” for all
critical severity signature triggers.

 



 

 * Alternatively, you can add an exception specifically for the relevant
   signature (#95187 in this case) to configure the reset-server action for this
   signature when it triggers (see below).

 



 

 

Step 4: Modify or create a firewall security rule

After modifying or creating a new vulnerability protection object, verify what
security policies were in place to protect GlobalProtect services, and add newly
created Vulnerability Protection Profile. If you already have a customized /
Best Practices Profile attached to your security policy, please go back to Step
3 and amend your existing Vulnerability Protection Profile instead of creating a
new one.

 



If you did not have an existing security policy and rule in place, then go ahead
and create a security rule to apply the vulnerability protection profile to. Go
to Policies > Security. Create a new policy. In this example, we name it
“block_gp_vulnerability.” The source zone should be “any” and the destination
zone is the GlobalProtect gateway and/or GlobalProtect portal zones we found in
step 1. Assign to this rule the Vulnerability Protection Profile you modified or
created in step 3. Please make sure that the rest of the the applied policy and
security policies follow our best practices guides.

 

 



 

 

Step 5: Commit

Commit the changes to apply the new Vulnerability Protection Profile to the
Security Rule protecting the GP Portal and/or Gateway.  Any attempted attacks
against the GlobalProtect services that attempt to use this specific
vulnerability will be blocked and logged in the threat log.

 


FAQ:

 

Is GlobalProtect enabled?
 * You can verify by checking for entries in your firewall web interface
   (Network > GlobalProtect)

 

Am I compromised?
 * You can upload a technical support file (TSF) to Customer Support Portal
   (CSP) after opening a case to determine if your firewall device(s) match(es)
   known indicators of compromise (IoC).

 

What do I need to do?
 * Review the output of technical support file (TSF) analysis (see above
   question) to understand the level of attempted exploitation and remediation
   steps provided in the Unit 42 Threat Brief for CVE-2024-3400.
 * As a best practice, we strongly recommend all customers apply the Threat
   Prevention signature with Threat ID 95187 and 95189 (available in
   Applications and Threats content version 8835-8689 and later), and
   apply vulnerability protection to their GlobalProtect interface.
 * After completing above steps we strongly recommend installing the hotfix
   listed in the advisory for your impacted PAN-OS devices.

 

Is Prisma Access or Cloud NGFW impacted by this vulnerability?
 * Prisma Access and Cloud NGFW are not impacted by this vulnerability.

 

What PAN-OS versions are affected?
 * This affects PAN-OS versions 10.2 and greater.
 * Hotfixes are released for PAN-OS 10.2, 11.0 and 11.1 branches. Please refer
   to the security advisory for more information.

 

Is disabling telemetry an effective mitigation strategy?
 * In earlier versions of the advisory, disabling device telemetry was listed as
   a secondary mitigation action. Disabling device telemetry is no longer an
   effective mitigation. Device telemetry does not need to be enabled for PAN-OS
   firewalls to be exposed to attacks related to this vulnerability.

 

How can I look for IoCs and research a potential compromise?
 * Please refer to the Unit42 Threat Brief
   (https://unit42.paloaltonetworks.com/cve-2024-3400/) and the Volexity blog
   post
   (https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execut...)
   for the latest information.

 

I applied the hotfix; how can I confirm I’m now “clean”?
 * Before rebooting into the hotfix it is recommended that you take a TSF and
   upload for analysis on any level of compromise and take the recommended
   remediation actions if appropriate
 * After remediating if needed, upgrading and booting into the hotfix, you can
   verify that you are running the fixed version of code by running the “show
   system info” CLI command and checking the sw-version field against what
   is published as fixed in the CVE.
 * You can upload the new TSF for analysis and confirmation that no further
   indicators of compromise are seen from the upgraded device.

 

Additional Resources on CVE-2024-3400:
 * Security Advisory Page
 * Knowledge Base Article
 * UNIT42 on CVE-2024-3400
 * More on CVE-2024-3400

Labels:
 * GlobalProtect
 * GlobalProtect-COVID19
 * GlobalProtect-Resources
 * NGFW Configuration

 * globalprotect
   
 * GlobalProtect-Resources
   
 * gp
   
 * strata
   
 * threat prevention
   
 * Threat Protection
   
 * vulnerability
   
 * vulnerability protection
   


Rate this article:
0.5
1.0
1.5
2.0
2.5
3.0
3.5
4.0
4.5
5.0
(4)
4 Likes Likes



 * Back to Articles
 * Next

Comments
BYUNGKWON-LEE
L1 Bithead
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 12:51 AM

I upgraded to version 8833, but signature ID 95187 is not visible.




cciwa-admin
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 01:06 AM

Yep, it was not there.




ipohlschneider
L1 Bithead
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 01:14 AM

Same here




SomeSuch
L1 Bithead
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 01:16 AM

I confirm, ThreatID 95187 not present in content update 8833-8682




B.Yeung
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 01:17 AM

upgraded to 8833-8682, cannot find 95187




michelealbrigo
L3 Networker
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 01:21 AM

95187 is in the release notes, but searching for it in the profile editing
section yields no results.




RyanMinty
L1 Bithead
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 01:24 AM

Same issue as the above users 95187 is missing.




BYUNGKWON-LEE
L1 Bithead
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 01:30 AM
app only shows the signature. However, the signature for app+threat is not
visible.



hien.vo
L1 Bithead
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 02:09 AM

Same issue there is no 95187 in PAN-OS content update 8833-8682




chagberg
L1 Bithead
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 02:19 AM

it is visible in CLI, but not gui

show threat id 95187


This signature detects malicious payload in HTTPS request.

critical
Unknown
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention




Gustor
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 02:19 AM

Apparently none of the new vulnerability signatures added to content
release 8833 are visible, not only signature ID 95187.

Is everybody experiencing this same issue?




Gustor
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 02:32 AM

I found the following article about missing threat ID's:

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008U27CAE




B.Yeung
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 02:38 AM

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008U27CAE

I follow this article to use cli to add, although after added gui still not seen
95187, but total exceptions increase one.




Gurminder_Birdee
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 02:43 AM

anyone know why threat id 95187 is showing threat name 'Malicious HTTPS Request
Detection' and not related to the actual command injection vulnerability ? 




BYUNGKWON-LEE
L1 Bithead
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 02:48 AM

I reverted the app and deleted 8833, then downloaded the app again and
reinstalled it to solve the problem.




bachtiar.adiguna
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 02:50 AM

Yeah, I think we all have same problem here, after updating the threat & apps,
we couldn't find the Threat ID 95187, it's strange, pls let me know if there's
an update




GarethBulleyGarethBulley
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 03:21 AM

same issue with 95187 not showing




chagberg
L1 Bithead
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 03:32 AM

did the same as @BYUNGKWON-LEE, and it now shows up in GUI.




JonasBeckerSOM
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 03:54 AM

same here, 95187 not showing




itassetbenilde
L1 Bithead
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 03:57 AM

same




MikeGeo
L1 Bithead
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 04:25 AM

Same issue here. Signatures from this release not showing in GUI. Even though
content version confirmed installed. Even tried to revert delete download and
install again with the same result. Come on Palo!!




Stefan.s
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 04:39 AM

@chagberg or @BYUNGKWON-LEE  can you please share more in detail what you did? I
tried it, but must have missed something, didn't work for me..




tarapitha
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 04:40 AM

ID 95187 was not there right after applying 8833-8682, it took couple of minutes
for it to appear in the list.




chagberg
L1 Bithead
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 04:44 AM

I pushed first from Panorama.

It did not appear in the list but was visible in CLI.

 

Reverted to the previous one, and deleted 8833 on the FW.

Installed 8833 through CLI after running a "request content upgrade check" by
running "request content upgrade download latest " and then "request content
upgrade install latest "

 

It now appeared in GUI immediately.




chagberg
L1 Bithead
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 04:46 AM

just got this from support

"If you are following TID protection based approach, please be aware of the
following:
You may not see the TID when you check from the vulnerability profile in GUI due
to a PAN-OS issue."




Stefan.s
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 04:49 AM

@chagberg Thanks.




MikeGeo
L1 Bithead
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 05:04 AM

@chagberg Thanks!!! This worked for me!!!

 

For others… downgrading, deleting, downloading again, installing again didn’t
fix this signature not displaying in GUI but the CLI steps provided did!!




RLANG_2019
L1 Bithead
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 05:20 AM

They are there you have to go to the exceptions tab and check "show all
signatures". You will then be able to see it.

 



 




HSDTechs
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 05:30 AM

Signature is not visible in the GUI




PANcake
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 05:32 AM

After installing the content update, the ID didn't show up on the GUI. Later I
checked if it's shown on the CLI, show threat id 95187, and there it was. After
CLI checkup it was also visible on the GUI. I don't know if CLI check populated
it to the GUI, or if it came visible on GUI by itself, since there was few hours
between update install and the moment I checked later.




SomeGuy1000
L1 Bithead
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 05:41 AM

I guess I am not super clear here, isn't this creating an any any rule and
allowing traffic? would setting the action to drop and applying the profile
achieve the same thing? Or at least specifying the globalprotect portal IP in
the destination?




Hsingh
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 05:49 AM

Hi Everyone,

 

If threat ID 95187 is still not showing after installing the Applications and
Threats content version 8833-8682, please try logging out and logging back in,
opening incognito mode, or restarting your management server.

 

How to Restart the Management server "mgmtsrvr" Process

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClaGCAS

 

Regards,

Harpreet Singh




Gustor
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 05:57 AM

i just waited a few hours and now the threat ID 95187 is showing up in the
vulnerability protection profile under exceptions with "show all signatures".

i did use the CLI command earlier to show the threat ID but that didn't have any
effect in the webUI as far as i know.

So patience is the key here?

 

PS.

It would be nice if PaloAlto Networks moderated or monitored this community and
provided help and feedback on issues like this.

 




JonasBeckerSOM
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 06:04 AM

log off and login worked for me to get 95187 visible




HSDTechs
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 06:06 AM

@hsingh Thanks... should have thought to do this.




KuehnAnd
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 06:08 AM

I don´t see this threat ID 95187 in the gui of PANOS version 10.2.8 but i can
see it in version 10.1.12. 
But when i use the cli command: show threat id 95187, i can see that this threat
id is known by version 10.2.8 also.




CedricLeclere
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 06:39 AM

same issue here, we can find it on our Palo but can't apply by Panorama. but we
can see it on CLI....

 

Palo wake up please




pmauretti
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 06:51 AM

@Gustor 

Do you think Palo Alto can afford to pay someone to moderate?  They are just a
small $90B company (top 100 in the US) after all.  

 

Content is showing update here.  Make sure you are showing all signatures and
search by threat ID:



 




n230fs
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 06:57 AM

@chagberg I had to follow that same process to get it to work. Thanks!




jpage386
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 07:26 AM

Hi,  

I found I had to close out of all browser windows and re-launch the GUI and then
the app was there.  Must have been some sort of caching issue.




Claw4609
L4 Transporter
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 07:30 AM

Since I think it should be added here. Heres whats listed on the support
portal: 

 

Threat ID not seen after upgrading to the latest content version - 8833-8682 to
remediate CVE-2024-3400.
 

This is due to the PANOS issue impacting all PANOS above 10.2.X.

 

The workaround is to use the below CLI command from config mode to check the
Threat ID -

>config

# show predefined threats vulnerability 95187
95187 {
  threatname "Malicious HTTPS Request Detection";
}

To configure the vulnerability profile, use severity "Critical" in the
vulnerability profile from GUI, which will include TID 95187.




ddenayer
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 07:31 AM

Anyone that follows step 4 is probably going to make things worse as it will
remove any protections already in the Firewall policy. If you are already
following the best practices and have your firewalls grabbing content updates
regularly this is a non-issue.




Caveman
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 08:16 AM

@SomeGuy1000 I had the same thoughts... It ultimately needs to apply to whatever
rule you're allowing GP access I think. I have a zero trust for my WAN so I have
to allow globalprotect explicitly, I will be adding the vulnerability profile
here. Which I should have been from the start anyway.




AJS_Justin
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 08:45 AM

Seeing lots of comments where new threat isnt visible, I had the same problem,
logout did not resolve it. I ran the content update again via CLI and it did
come through finally.

 

request content upgrade install sync-to-peer yes commit yes version latest




jocelynsloan
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 11:10 AM

Do we configure step 4 as an Allow rule because the malicious traffic gets
blocked by the security profile settings?

I'm a little confused why it is not a Deny rule (I don't want to block all my GP
traffic, just the malicious stuff).

 




ddenayer
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 11:11 AM

@SomeGuy1000 Security Profiles are only applicable to allow rules. Security
Profiles have no bearing on what traffic hits the actual firewall policy, just
what additional inspection the firewall does with the traffic once it matches a
policy. What you should already have is a Firewall policy that allows traffic to
the GlobalProtect interface or IP specifically and that policy should have a
Security Profile Already associated with it that correlated to the Best
Practices provided by Palo Alto. If that is being done (as it already should be)
and you are doing content updates (dynamic updates) on a regular schedule, also
provided through Best Practices. Then this vulnerability will have already been
mitigated.




ddenayer
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 11:16 AM

@jocelynsloan Security Profiles are what the firewall does with traffic after it
takes the policy action of allow. Refer to my previous comment for what the best
actions for this specific vulnerability are in a live environment. Palo Alto's
guidance is good, but talk about this vulnerability in a vacuum, whereas the
solution in a live environment is going to be very different for Step 4. Really
all of this guidance only complicates the tasks for anyone that needs the
guidance.




Matheus_Doria
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 11:26 AM

I did the update in GUI and the ID 95187 didn't appear.
So I installed it again from CLI (without uninstalling):
command: request content upgrade install file panupv2-all-contents-8833-8682.tgz
Then 95187 appeared in the GUI.





JimWeston
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 12:18 PM

@SomeGuy1000 That is what I was thinking as well. The wording of this guide is
really bad and why are they using version 9.x screenshots??? Come on Palo Alto,
this is poor.




DevalS
L0 Member
 * Mark as Read
 * Mark as New
 * 
 * Permalink
 * Print

‎04-12-2024 12:35 PM

All,

I am trying to go through this document, I am stuck on Step2. While creating the
Vulnerability protection profile how does this applies to GlobalProtect
Interface? I could not find that piece here. Can someone please explain?

TIA.




 * Previous
 * * 1
   * 2
 * Next


 * 127476 Views
 * 74 comments
 * 4 Likes


Related Content

 * GlobalProtect App Log Collection and Troubleshooting FAQ in GlobalProtect
   Articles 03-03-2021
 * Troubleshooting GlobalProtect MTU Issues in GlobalProtect Articles 02-17-2021
 * GlobalProtect: Initial Set Up in GlobalProtect Articles 04-10-2020
 * GlobalProtect: Implement Split Tunnel Domain and Applications in
   GlobalProtect Articles 03-17-2020


Recommendations


 * BETREFF: APPLYING VULNERABILITY PROTECTION TO GLOBALPROTECT INTERFACES


 * VULNERABILITY PROTECTION


 * VULNERABILITY PROTECTION STRICT PROFILE BPA CHECKS


 * VULNERABILITY PROTECTION LOW INFORMATIONAL BPA CHECKS


 * APPLYING DIFFERENT HIP CHECKS TO DIFFERENT GLOBAL PROTECT APP GROUPS


 * STEPS TO APPLY MICROSOFT PATCH TO ADDRESSED MELTDOWN AND SPECTRE
   VULNERABILITY ON TRAPS AGENTS


 * VIEWING HOST VULNERABILITIES IN AZURE KUBERNETES SERVICE CLUSTERS


Contributors

 * maurisy
 * JayGolf
 * kiwi
 * jennaqualls


Labels

 * ESXi 1
 * GlobalProtect 16
 * GlobalProtect App 1
 * GlobalProtect-COVID19 12
 * GlobalProtect-Resources 9
 * Layer 3 1
 * NGFW Configuration 11
 * Prisma Access 1
 * PrismaAccess-COVID19 1
 * VM-Series 1


Article Dashboard

 * Article History


Version history

Last Updated:
‎04-24-2024 10:11 AM
Updated by:
JayGolf




COMPANY
 * About Palo Alto Networks
   

LEGAL NOTICES
 * Privacy Policy
   
 * Terms of Use
   

RESOURCES
 * Community Blogs
   
 * Community Help
   
 * Beacon
   
 * Knowledge Base
   
 * Techdocs
   




Copyright 2007 - 2024 - Palo Alto Networks

Auto-suggest helps you quickly narrow down your search results by suggesting
possible matches as you type.