<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability Protection for CVE-2024-3400 in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/vulnerability-protection-for-cve-2024-3400/m-p/587752#M5381</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/127749"&gt;@mb_equate&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As always thanks for your insights !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
    <pubDate>Thu, 23 May 2024 09:51:35 GMT</pubDate>
    <dc:creator>kiwi</dc:creator>
    <dc:date>2024-05-23T09:51:35Z</dc:date>
    <item>
      <title>Vulnerability Protection for CVE-2024-3400</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/vulnerability-protection-for-cve-2024-3400/m-p/587727#M5380</link>
      <description>&lt;P&gt;TL;DR: ensure you are applying Vulnerability Protection to&amp;nbsp;&lt;EM&gt;web-browsing&amp;nbsp;&lt;/EM&gt;traffic hitting your GP portal interface, if you rely on the intrazone-default allow&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was responding to another case of this flu. Even though the best-practice &lt;EM&gt;strict&lt;/EM&gt; VP profile was attached to the rule allowing access to the GlobalProtect interface, a test for the vuln (curl -kH "Cookie: SESSID=/../TESTVULN" https://&amp;lt;target&amp;gt;/global-protect/login.esp) yielded positive results.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What The Firewall? Turns out exploit traffic does not match the required apps in the GP rule (panos-global-protect, ssl) and instead matches web-browsing.&amp;nbsp;Thanks to the default, intrazone-default rule, this traffic was permitted without Threat Prevention being applied.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The fix? Multiple. In order of effectiveness...&lt;/P&gt;
&lt;P&gt;1. Change your intrazone-default rule to&amp;nbsp;&lt;STRONG&gt;Deny&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; a. This is by no means a simple change, and should not be done without analysis and required policy adjustments&lt;/P&gt;
&lt;P&gt;&amp;nbsp; b. Why? See&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/next-generation-firewall/should-i-override-the-intrazone-default-to-deny/m-p/581801" target="_blank" rel="noopener"&gt;LIVEcommunity - Should I override the intrazone-default to deny? - LIVEcommunity - 581801 (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;2. Override the intrazone-default rule and enable Threat Prevention&lt;/P&gt;
&lt;P&gt;&amp;nbsp; a. Even better, create a security profile group based on best practices, call it&amp;nbsp;&lt;EM&gt;default&amp;nbsp;&lt;/EM&gt;(lower case d) and use it everywhere&lt;/P&gt;
&lt;P&gt;3. Add web-browsing to the rule that provides access to GP portal&lt;/P&gt;
&lt;P&gt;&amp;nbsp;a. Ideally you should not be permitting web-browsing to your GP interface, either explicitly or through intrazone-default. BUT if you must, do this.&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2024 06:21:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/vulnerability-protection-for-cve-2024-3400/m-p/587727#M5380</guid>
      <dc:creator>mb_equate</dc:creator>
      <dc:date>2024-05-23T06:21:57Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Protection for CVE-2024-3400</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/vulnerability-protection-for-cve-2024-3400/m-p/587752#M5381</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/127749"&gt;@mb_equate&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As always thanks for your insights !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2024 09:51:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/vulnerability-protection-for-cve-2024-3400/m-p/587752#M5381</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2024-05-23T09:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Protection for CVE-2024-3400</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/vulnerability-protection-for-cve-2024-3400/m-p/588497#M5405</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would also add another layer of security, which came to mind after this **bleep** CVE.&lt;/P&gt;
&lt;P&gt;Use a wildcard certificate as SSL cert. (by the way even Let's encrypt proposes wildcards).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Generate a random hostname for the GP hostname.&amp;nbsp;Example : GP-123456.mydomain.com&lt;/P&gt;
&lt;P&gt;Create a Custom URL category with only that FQDN (&lt;A href="https://GP-123456.mydomain.com" target="_blank"&gt;https://GP-123456.mydomain.com&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;Add the URL category to your incoming rule policy for GP.&lt;/P&gt;
&lt;P&gt;Add another rule below it, with the dest GP IP and action as Drop (silently)&lt;/P&gt;
&lt;P&gt;This means, if a scanner or anybody uses not the correct FQDN, the communication will be dropped.&lt;/P&gt;
&lt;P&gt;And by using a wildcard, it is not possible to guess the hostname&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 12:58:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/vulnerability-protection-for-cve-2024-3400/m-p/588497#M5405</guid>
      <dc:creator>Frank-Bussink</dc:creator>
      <dc:date>2024-05-31T12:58:07Z</dc:date>
    </item>
  </channel>
</rss>

