<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article PAN-OS Exposure to ROBOT Attack in PSIRT Articles</title>
    <link>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/ta-p/192397</link>
    <description>&lt;H2 id="toc-hId--1545100828"&gt;Background&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;ROBOT [1] is an attack that affects the TLS&amp;nbsp;RSA key exchange and could lead to decryption of captured sessions if&amp;nbsp;the TLS&amp;nbsp;server originally serving said captured session is still alive, vulnerable and using&amp;nbsp;the same private key.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Exposure&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;SSL Decryption and GlobalProtect are susceptible to this issue.&amp;nbsp;O&lt;/SPAN&gt;&lt;SPAN&gt;ur engineers&amp;nbsp;are working on&amp;nbsp;a software fix. We recommend customers running &lt;A title="PAN-OS | TechDocs | Palo Alto Networks" href="https://docs.paloaltonetworks.com/pan-os" target="_blank" rel="noopener"&gt;PAN-OS&lt;/A&gt;&amp;nbsp;to upgrade to a fixed version of software or use content update 757, and implement further mitigations through the configuration changes described below under “Mitigations”.&amp;nbsp;PAN-OS impacted releases include&amp;nbsp;6.1.19 and prior, 7.1.14 and prior, 8.0.6-h3 and prior.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Fix and Mitigations&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H3&gt;Software&amp;nbsp;update&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;PAN-OS 6.1.20 and newer, 7.1.15 and newer, &amp;nbsp;and 8.0.7 and newer are fixed. Customers exposed to this vulnerability are invited to &lt;A title="BEST PRACTICES FOR PAN-OS UPGRADE | Palo Alto Networks" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRrCAK" target="_blank" rel="noopener"&gt;upgrade to&amp;nbsp;a&amp;nbsp;corrected version of PAN-OS&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Content Update&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Palo Alto Networks has released content update&amp;nbsp;757, which includes a vulnerability signature (“TLS Network Security Protocol Information Disclosure Vulnerability – ROBOT”, #38407) that can be used as an interim mitigation to protect PAN-OS devices until the software is upgraded. For complete protection, signature&amp;nbsp;#38407 must be applied upstream from any interfaces implementing SSL Decryption, or hosting a GlobalProtect portal or a GlobalProtect gateway.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;SSL Decryption Mitigation&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Customers running PAN-OS 7.1 or later can configure their SSL Decryption profiles to disable RSA.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot of Decryption Profile for PAN-OS" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13068i901CCE232DD92136/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2017-12-21 at 9.52.07 AM.png" alt="Screen Shot 2017-12-21 at 9.52.07 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;GlobalProtect Mitigation&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;If the GlobalProtect server certificate is using RSA, customers running PAN-OS 7.1 or later can opt to replace this certificate with one implementing the Eliptic Curve DSA algorithm as a safer alternative.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;U&gt;Note:&lt;/U&gt; A&amp;nbsp;PAN-OS 7.1 known issue prevents properly formatted ECDSA CSR. As a result, the Global Protect&amp;nbsp;ECDSA&amp;nbsp;certificate&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;could either be generated:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;on appliance by temporarily importing&amp;nbsp;the enterprise Certificate Authority in PAN-OS; or&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;on external enterprise PKI system then imported into PAN-OS along with its&amp;nbsp;private key.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot of PAN-OS Generate Certificate" style="width: 338px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13060i057D56E3DCE523B9/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2017-12-20 at 1.02.01 PM.png" alt="Screen Shot 2017-12-20 at 1.02.01 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;See Also&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A title="PAN-OS | TechDocs | Palo Alto Networks" href="https://docs.paloaltonetworks.com/pan-os" target="_self"&gt;PAN-OS Technical Documentation&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A title="PAN-OS Releases | Palo Alto Networks" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm68CAC" target="_blank" rel="noopener"&gt;Critical Issues Addressed In PAN-OS Releases&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A title="Best Practices For PAN-OS Upgrade | Palo Alto Networks" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRrCAK" target="_blank" rel="noopener"&gt;Best Practices For PAN-OS Upgrade&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Reference&lt;/H2&gt;
&lt;P&gt;[1]&amp;nbsp;&lt;A href="https://robotattack.org/" target="_blank" rel="nofollow noopener noreferrer"&gt;https://robotattack.org/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 01 Nov 2019 17:14:37 GMT</pubDate>
    <dc:creator>emoret</dc:creator>
    <dc:date>2019-11-01T17:14:37Z</dc:date>
    <item>
      <title>PAN-OS Exposure to ROBOT Attack</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/ta-p/192397</link>
      <description>&lt;H2 id="toc-hId--1545100828"&gt;Background&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;ROBOT [1] is an attack that affects the TLS&amp;nbsp;RSA key exchange and could lead to decryption of captured sessions if&amp;nbsp;the TLS&amp;nbsp;server originally serving said captured session is still alive, vulnerable and using&amp;nbsp;the same private key.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Exposure&lt;/SPAN&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;SSL Decryption and GlobalProtect are susceptible to this issue.&amp;nbsp;O&lt;/SPAN&gt;&lt;SPAN&gt;ur engineers&amp;nbsp;are working on&amp;nbsp;a software fix. We recommend customers running &lt;A title="PAN-OS | TechDocs | Palo Alto Networks" href="https://docs.paloaltonetworks.com/pan-os" target="_blank" rel="noopener"&gt;PAN-OS&lt;/A&gt;&amp;nbsp;to upgrade to a fixed version of software or use content update 757, and implement further mitigations through the configuration changes described below under “Mitigations”.&amp;nbsp;PAN-OS impacted releases include&amp;nbsp;6.1.19 and prior, 7.1.14 and prior, 8.0.6-h3 and prior.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;&lt;SPAN&gt;Fix and Mitigations&lt;/SPAN&gt;&lt;/H2&gt;
&lt;H3&gt;Software&amp;nbsp;update&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;PAN-OS 6.1.20 and newer, 7.1.15 and newer, &amp;nbsp;and 8.0.7 and newer are fixed. Customers exposed to this vulnerability are invited to &lt;A title="BEST PRACTICES FOR PAN-OS UPGRADE | Palo Alto Networks" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRrCAK" target="_blank" rel="noopener"&gt;upgrade to&amp;nbsp;a&amp;nbsp;corrected version of PAN-OS&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Content Update&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Palo Alto Networks has released content update&amp;nbsp;757, which includes a vulnerability signature (“TLS Network Security Protocol Information Disclosure Vulnerability – ROBOT”, #38407) that can be used as an interim mitigation to protect PAN-OS devices until the software is upgraded. For complete protection, signature&amp;nbsp;#38407 must be applied upstream from any interfaces implementing SSL Decryption, or hosting a GlobalProtect portal or a GlobalProtect gateway.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;SSL Decryption Mitigation&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;Customers running PAN-OS 7.1 or later can configure their SSL Decryption profiles to disable RSA.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot of Decryption Profile for PAN-OS" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13068i901CCE232DD92136/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2017-12-21 at 9.52.07 AM.png" alt="Screen Shot 2017-12-21 at 9.52.07 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;GlobalProtect Mitigation&lt;/H3&gt;
&lt;P&gt;&lt;SPAN&gt;If the GlobalProtect server certificate is using RSA, customers running PAN-OS 7.1 or later can opt to replace this certificate with one implementing the Eliptic Curve DSA algorithm as a safer alternative.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;U&gt;Note:&lt;/U&gt; A&amp;nbsp;PAN-OS 7.1 known issue prevents properly formatted ECDSA CSR. As a result, the Global Protect&amp;nbsp;ECDSA&amp;nbsp;certificate&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;could either be generated:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;on appliance by temporarily importing&amp;nbsp;the enterprise Certificate Authority in PAN-OS; or&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;on external enterprise PKI system then imported into PAN-OS along with its&amp;nbsp;private key.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot of PAN-OS Generate Certificate" style="width: 338px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13060i057D56E3DCE523B9/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2017-12-20 at 1.02.01 PM.png" alt="Screen Shot 2017-12-20 at 1.02.01 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;See Also&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A title="PAN-OS | TechDocs | Palo Alto Networks" href="https://docs.paloaltonetworks.com/pan-os" target="_self"&gt;PAN-OS Technical Documentation&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A title="PAN-OS Releases | Palo Alto Networks" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm68CAC" target="_blank" rel="noopener"&gt;Critical Issues Addressed In PAN-OS Releases&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A title="Best Practices For PAN-OS Upgrade | Palo Alto Networks" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRrCAK" target="_blank" rel="noopener"&gt;Best Practices For PAN-OS Upgrade&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Reference&lt;/H2&gt;
&lt;P&gt;[1]&amp;nbsp;&lt;A href="https://robotattack.org/" target="_blank" rel="nofollow noopener noreferrer"&gt;https://robotattack.org/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Nov 2019 17:14:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/ta-p/192397</guid>
      <dc:creator>emoret</dc:creator>
      <dc:date>2019-11-01T17:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS exposure to ROBOT attack</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/193805#M17</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi, if we consider only&lt;STRONG&gt; inboud SSL&lt;/STRONG&gt; inspection we know that PA works transparently and doesn't functioning as a proxy if RSA key exchange is used. Is right that we consider PA not vulnerable for ROBOT attack for inbound SSL inspection?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2018 10:56:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/193805#M17</guid>
      <dc:creator>helpdesk</dc:creator>
      <dc:date>2018-01-04T10:56:25Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS exposure to ROBOT attack</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/193879#M18</link>
      <description>&lt;P&gt;Inbound SSL Inspection processing&amp;nbsp;is not actively taking part in the client to server communication, it&amp;nbsp;merely uses the uploaded server's certificate to parallelly decrypt sessions destined to the end server. If the later is itself vulnerable to ROBOT, an attacker could mount an attack and decrypt a pre-captured TLS session. In that regard we could say that PAN-OS is not vulnerable to the ROBOT attack when&amp;nbsp;inbound SSL inspection is configured.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2018 20:23:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/193879#M18</guid>
      <dc:creator>emoret</dc:creator>
      <dc:date>2018-01-04T20:23:57Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS exposure to ROBOT attack</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/193894#M19</link>
      <description>&lt;P&gt;We generated an ECDSA cert on a PA3020 running PANOS 7.1.11 to mitigate the vulnerability found on a portal using an RSA certificate. The CSR did not check out clean - results show a signature algorithm of SHA1, therefore the certificate cannot be signed by a CA which requires a minimum of SHA256 for a signature on a ECDSA CSR. The mitigation below did not work. Will the maintenance release resolve this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;GlobalProtect Mitigation&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If the GlobalProtect server certificate is using RSA, customers running PAN-OS 7.1 or later can opt to replace this certificate with one implementing the Eliptic Curve DSA algorithm as a safer alternative.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2018 23:05:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/193894#M19</guid>
      <dc:creator>scottyfresh</dc:creator>
      <dc:date>2018-01-04T23:05:42Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS exposure to ROBOT attack</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/193924#M20</link>
      <description>&lt;P&gt;The article was just updated to include&amp;nbsp;the PAN-OS 7.1 CSR known issue.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 02:14:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/193924#M20</guid>
      <dc:creator>emoret</dc:creator>
      <dc:date>2018-01-05T02:14:02Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS exposure to ROBOT attack</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/193953#M21</link>
      <description>&lt;P&gt;Hi to all. Seems that IPS signature (Unique Threat ID: 38407) doesn’t work if SSL inbound inspection is enabled.&lt;BR /&gt;You can see this link for better explanation: &lt;A href="https://live.paloaltonetworks.com/t5/Threat-Vulnerability-Articles/SSL-Vulnerability-Non-Detection-Behavior-is-Seen-when-Inbound/ta-p/52014" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Threat-Vulnerability-Articles/SSL-Vulnerability-Non-Detection-Behavior-is-Seen-when-Inbound/ta-p/52014&lt;/A&gt;&lt;BR /&gt;In other word, seems that we cannot protect inside network with IPS signature regarding SSL (handshake phase) if ssl inbound is configured.Is this confirmed also for you?&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 09:31:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/193953#M21</guid>
      <dc:creator>helpdesk</dc:creator>
      <dc:date>2018-01-05T09:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS exposure to ROBOT attack</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/194049#M22</link>
      <description>&lt;P&gt;Signature 38407 needs to be applied upstream of the protected services as documented above. This applies to SSL/Decryption as well as GlobalProtect.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 19:26:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/194049#M22</guid>
      <dc:creator>emoret</dc:creator>
      <dc:date>2018-01-05T19:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS exposure to ROBOT attack</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/194050#M23</link>
      <description>&lt;P&gt;Regarding the PanOS7.1 note, does this mean ECDSA certs have to be self-signed? Are we able to use a trusted CA?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Note:&lt;/U&gt;&lt;SPAN&gt;&amp;nbsp;A&amp;nbsp;PAN-OS 7.1 known issue prevents properly formatted Eliptic Curve DSA Certificates Signing Requests. As a result, such&amp;nbsp;certificates have to be locally generated. If the required signing CA or Sub-CA is missing from PAN-OS, the firewall operator may need to import&amp;nbsp;it to PAN-OS&amp;nbsp;temporarily.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 19:35:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/194050#M23</guid>
      <dc:creator>scottyfresh</dc:creator>
      <dc:date>2018-01-05T19:35:42Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS exposure to ROBOT attack</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/194057#M24</link>
      <description>&lt;P&gt;Hi Emoret. If you enable signature 38407 on upstream PA, the service are protected BUT if you also enable ssl inbloud inspection (on PA) and try a test for ROBOT attack you will see that the same service is not protected anymore even if signature is enable. This is what I can see from my lab&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 19:47:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/194057#M24</guid>
      <dc:creator>helpdesk</dc:creator>
      <dc:date>2018-01-05T19:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS exposure to ROBOT attack</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/194058#M25</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/26920"&gt;@emoret&lt;/a&gt;Do you mean this CSR has to generated on an external system?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Note:&lt;/U&gt;&lt;SPAN&gt;&amp;nbsp;A&amp;nbsp;PAN-OS 7.1 known issue prevents properly formatted Eliptic Curve DSA Certificates Signing Requests. As a result, such&amp;nbsp;certificates have to be &lt;STRONG&gt;locally generated.&lt;/STRONG&gt; If the required signing CA or Sub-CA is missing from PAN-OS, the firewall operator may need to import&amp;nbsp;it to PAN-OS&amp;nbsp;temporarily.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 19:51:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/194058#M25</guid>
      <dc:creator>scottyfresh</dc:creator>
      <dc:date>2018-01-05T19:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS exposure to ROBOT attack</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/195793#M26</link>
      <description>&lt;P&gt;Will the 7.1.15 maintenance release remediate the ROBOT finding on GlobalProtect portals using an RSA certificate?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2018 18:29:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/195793#M26</guid>
      <dc:creator>scottyfresh</dc:creator>
      <dc:date>2018-01-18T18:29:05Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS exposure to ROBOT attack</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/195794#M27</link>
      <description>&lt;P&gt;As documented in this article, PAN-OS 7.1.15 includes the&amp;nbsp;fix for ROBOT.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2018 18:32:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/195794#M27</guid>
      <dc:creator>emoret</dc:creator>
      <dc:date>2018-01-18T18:32:32Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS exposure to ROBOT attack</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/196749#M28</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;signature&amp;nbsp;#38407 must be applied &lt;/SPAN&gt;&lt;EM&gt;upstream&lt;/EM&gt;&lt;SPAN&gt; from any interfaces implementing SSL Decryption, or hosting a GlobalProtect portal or a GlobalProtect gateway."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;How can you ensure IPS is applied on the Global Protect interface? There are no manual created security policies required for access to that AFIK? I can't even see access to the portal page in the traffic logs i.e. if I browse to the portal page from external and then check the logs filtering for that public IP there is nothing there. I can see actual VPN traffic in the logs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is IPS etc. just inherently on for Global Protect portal access?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 22:41:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/196749#M28</guid>
      <dc:creator>Dan-Bowen</dc:creator>
      <dc:date>2018-01-24T22:41:48Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS exposure to ROBOT attack</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/196751#M29</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/14349"&gt;@Dan-Bowen&lt;/a&gt;, to protect GP traffic you need to implement the policy on an upstream&amp;nbsp;device. This could be a separate hardware platform or virtual machine running signature #&lt;SPAN&gt;38407. Traffic would first hit the upstream device, be sanitized then reach the separate downstream GP gateway.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 22:57:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/196751#M29</guid>
      <dc:creator>emoret</dc:creator>
      <dc:date>2018-01-24T22:57:47Z</dc:date>
    </item>
    <item>
      <title>Re: PAN-OS exposure to ROBOT attack</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/196752#M30</link>
      <description>&lt;P&gt;Ah I see. The GP portal/GW traffic is out of band of the threat protection services. Patching it is then!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your speedy help.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 23:00:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/pan-os-exposure-to-robot-attack/tac-p/196752#M30</guid>
      <dc:creator>Dan-Bowen</dc:creator>
      <dc:date>2018-01-24T23:00:38Z</dc:date>
    </item>
  </channel>
</rss>

