<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Global protect gateway is reusing cached HIP reports by default if no HIP report is received at login in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-gateway-is-reusing-cached-hip-reports-by-default/m-p/1232012#M6850</link>
    <description>&lt;P&gt;Dear all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We experienced a strange issue recently where a client of ours reported a connectivity issue (not related to HIP, but related to a firewall rule). When we tried to find the client in the recent HIP logs we noticed its last HIP report was from a few months earlier.&lt;/P&gt;
&lt;P&gt;In the security logs the client was visible as connected that day. &amp;nbsp;We created a TAC case for this trough our Palo Alto supplier and we learned from TAC that by default a Global Protect gateway “reuses” the last known cached HIP report at initial login if it for some reason can’t receive a new fresh HIP report from the client. In this case the client had something installed that interfered with HTTPS traffic. After cleaning this client all worked fine for that client.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But the fact that the Global Protect gateway by default “recycles” an old cached HIP report if it does not receive a fresh copy at initial login got us “spooked” of cause. (Because a malicious actor could also prevent a client from sending in the latest HIP report by “messing up” the HTTPS connection). We discussed this case further with TAC but their final verdict is that the function of reusing of the last available HIP report is “by design” for stability / availability reasons and that this can’t be manually altered. Only mitigation is to set a log-expiration and disk-quota setting on the HIP reports to 1 day (which is the minimum allowed value). This of cause mitigates the risk a bit for us (narrowing the “attack window”) . But does not solve the problem fully. Because with a setting of 1 day a “compromised” client can still “pass” the HIP check falsely with a cached report if it connected “healthy” before on that same day. According to TAC we can only open a feature request to get an option to disable this default HIP report “recycle” behavior. Which our supplier did in our name. But we don’t know if or when this feature request would be handled. We are of cause not verry happy with this case outcome. We implemented HIP checks (and bought the Global Protect license) to keep possibly compromised clients “out”, and now we learned this check can be “bypassed” if a report is not sent at all by the client (by accident or maliciously).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did anybody else experience this problem before? If so, are there any other mitigations / solutions we and TAC might have missed?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;STRONG&gt;&lt;BR /&gt;Mark Theeuwes&lt;/STRONG&gt;&lt;BR /&gt;IT Architect/Network Engineer&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;SHIMANO EUROPE B.V.&lt;/STRONG&gt;&lt;BR /&gt;High Tech Campus 92&lt;BR /&gt;5656 AG Eindhoven (NL)&lt;BR /&gt;&lt;A href="mailto:mark.theeuwes@shimano-eu.com" target="_blank"&gt;mark.theeuwes@shimano-eu.com&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.shimano.com/" target="_blank"&gt;http://www.shimano.com&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 18 Jun 2025 09:25:51 GMT</pubDate>
    <dc:creator>M.Theeuwes</dc:creator>
    <dc:date>2025-06-18T09:25:51Z</dc:date>
    <item>
      <title>Global protect gateway is reusing cached HIP reports by default if no HIP report is received at login</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-gateway-is-reusing-cached-hip-reports-by-default/m-p/1232012#M6850</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We experienced a strange issue recently where a client of ours reported a connectivity issue (not related to HIP, but related to a firewall rule). When we tried to find the client in the recent HIP logs we noticed its last HIP report was from a few months earlier.&lt;/P&gt;
&lt;P&gt;In the security logs the client was visible as connected that day. &amp;nbsp;We created a TAC case for this trough our Palo Alto supplier and we learned from TAC that by default a Global Protect gateway “reuses” the last known cached HIP report at initial login if it for some reason can’t receive a new fresh HIP report from the client. In this case the client had something installed that interfered with HTTPS traffic. After cleaning this client all worked fine for that client.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But the fact that the Global Protect gateway by default “recycles” an old cached HIP report if it does not receive a fresh copy at initial login got us “spooked” of cause. (Because a malicious actor could also prevent a client from sending in the latest HIP report by “messing up” the HTTPS connection). We discussed this case further with TAC but their final verdict is that the function of reusing of the last available HIP report is “by design” for stability / availability reasons and that this can’t be manually altered. Only mitigation is to set a log-expiration and disk-quota setting on the HIP reports to 1 day (which is the minimum allowed value). This of cause mitigates the risk a bit for us (narrowing the “attack window”) . But does not solve the problem fully. Because with a setting of 1 day a “compromised” client can still “pass” the HIP check falsely with a cached report if it connected “healthy” before on that same day. According to TAC we can only open a feature request to get an option to disable this default HIP report “recycle” behavior. Which our supplier did in our name. But we don’t know if or when this feature request would be handled. We are of cause not verry happy with this case outcome. We implemented HIP checks (and bought the Global Protect license) to keep possibly compromised clients “out”, and now we learned this check can be “bypassed” if a report is not sent at all by the client (by accident or maliciously).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did anybody else experience this problem before? If so, are there any other mitigations / solutions we and TAC might have missed?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;STRONG&gt;&lt;BR /&gt;Mark Theeuwes&lt;/STRONG&gt;&lt;BR /&gt;IT Architect/Network Engineer&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;SHIMANO EUROPE B.V.&lt;/STRONG&gt;&lt;BR /&gt;High Tech Campus 92&lt;BR /&gt;5656 AG Eindhoven (NL)&lt;BR /&gt;&lt;A href="mailto:mark.theeuwes@shimano-eu.com" target="_blank"&gt;mark.theeuwes@shimano-eu.com&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.shimano.com/" target="_blank"&gt;http://www.shimano.com&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2025 09:25:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-gateway-is-reusing-cached-hip-reports-by-default/m-p/1232012#M6850</guid>
      <dc:creator>M.Theeuwes</dc:creator>
      <dc:date>2025-06-18T09:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect gateway is reusing cached HIP reports by default if no HIP report is received at login</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-gateway-is-reusing-cached-hip-reports-by-default/m-p/1232066#M6856</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/904644189"&gt;@M.Theeuwes&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Sadly there's not a lot of good solutions for this outside of custom monitoring being built out. You can get an active client list through the API and validate that they have a HIP report on the firewall active within a provided timeframe. It's a tacky solution to something that shouldn't need to be monitored, but that's what I've found to be the best middle ground.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2025 18:01:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-gateway-is-reusing-cached-hip-reports-by-default/m-p/1232066#M6856</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-06-18T18:01:45Z</dc:date>
    </item>
  </channel>
</rss>

