<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PCI DSS testing failure in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pci-dss-testing-failure/m-p/451578#M101176</link>
    <description>&lt;P&gt;We are experiencing the same issue from our PCI vendor. It was never an issue in the past. The only thing we've change is updated to the newest software 9.1.11. How did you all correct the problem?&lt;/P&gt;</description>
    <pubDate>Mon, 06 Dec 2021 16:29:11 GMT</pubDate>
    <dc:creator>ITRHPL</dc:creator>
    <dc:date>2021-12-06T16:29:11Z</dc:date>
    <item>
      <title>PCI DSS testing failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-dss-testing-failure/m-p/28591#M20865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are using SecurityMetrics to test for PCI compliance and have recently started receiving a failure based on &lt;SPAN style="color: #000000; font-family: 'Times New Roman'; font-size: medium; background-color: #edf6ff;"&gt;TCP/IP Initial Sequence Number (ISN) Reuse Weakness (&lt;A href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1463" style="font-family: 'Times New Roman'; font-size: medium;"&gt;CVE-2002-1463&lt;/A&gt;) &lt;/SPAN&gt;for the PaloAlto firewall (5.0.8).&lt;/P&gt;&lt;P&gt;I'm not sure how to remedy the problem within the firewall. There have been no rule changes that should have caused this to start to occur but we have updated the firewall from previous release. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Mar 2014 20:03:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-dss-testing-failure/m-p/28591#M20865</guid>
      <dc:creator>ReminderMedia</dc:creator>
      <dc:date>2014-03-03T20:03:16Z</dc:date>
    </item>
    <item>
      <title>Re: PCI DSS testing failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-dss-testing-failure/m-p/28592#M20866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the firewall is failing the test, we would need to get some more information about how you are testing the device and what the firewall is doing that causes it to fail. Both of the vulnerabilities are somewhat old and not modern firewall should be affected by them. We could create a zone protection profile, that gives you control over the how the firewall responds to specific packet based attacks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PAN-OS Administrator's Guide has some basic information about &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;zone&lt;/SPAN&gt; protection, &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" data-containerid="2021" data-containertype="14" data-objectid="6603" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-6603"&gt;https://live.paloaltonetworks.com/docs/DOC-6603&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are two documents that explain how the Paloalto handles TCP connections, &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" data-containerid="2027" data-containertype="14" data-objectid="1731" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-1731"&gt;https://live.paloaltonetworks.com/docs/DOC-1731&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" data-containerid="2027" data-containertype="14" data-objectid="1628" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-1628"&gt;https://live.paloaltonetworks.com/docs/DOC-1628&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although, the above mentioned problem looking like a BUG-44798- Weak sequence number generation vulnerability on MP (management-plane) CVE-2011-3188 and CVE-2002-1463. This problem has been fixed in PAN OS 6.0.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Mar 2014 21:18:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-dss-testing-failure/m-p/28592#M20866</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-03-03T21:18:55Z</dc:date>
    </item>
    <item>
      <title>Re: PCI DSS testing failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-dss-testing-failure/m-p/28593#M20867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm getting the same thing and I'm on PAN OS 6.1.2.&amp;nbsp; Any more updates on this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Apr 2015 17:38:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-dss-testing-failure/m-p/28593#M20867</guid>
      <dc:creator>bmccall136</dc:creator>
      <dc:date>2015-04-16T17:38:48Z</dc:date>
    </item>
    <item>
      <title>Re: PCI DSS testing failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-dss-testing-failure/m-p/254380#M72194</link>
      <description>&lt;P&gt;Got a similar PCI DSS testing failure from pcicompliancemanager:&amp;nbsp;&lt;SPAN&gt;CVE-2002-1463 BID : 5387, 8652&amp;nbsp;TCP/IP Initial Sequence Number (ISN) Reuse Weakness... Currently on PANOS 8.0.12 and find this highly suspect.. Any new details on this?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 14:33:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-dss-testing-failure/m-p/254380#M72194</guid>
      <dc:creator>jmwilkinson</dc:creator>
      <dc:date>2019-03-20T14:33:47Z</dc:date>
    </item>
    <item>
      <title>Re: PCI DSS testing failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-dss-testing-failure/m-p/451578#M101176</link>
      <description>&lt;P&gt;We are experiencing the same issue from our PCI vendor. It was never an issue in the past. The only thing we've change is updated to the newest software 9.1.11. How did you all correct the problem?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Dec 2021 16:29:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-dss-testing-failure/m-p/451578#M101176</guid>
      <dc:creator>ITRHPL</dc:creator>
      <dc:date>2021-12-06T16:29:11Z</dc:date>
    </item>
    <item>
      <title>Re: PCI DSS testing failure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pci-dss-testing-failure/m-p/452169#M101228</link>
      <description>&lt;P&gt;It actually happened twice and I ended up reporting the findings as false positives on both occasions. I provided some documentation/information etc. The finding was corrected after an upgrade past the 9.1.13.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Dec 2021 19:00:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pci-dss-testing-failure/m-p/452169#M101228</guid>
      <dc:creator>jmwilkinson</dc:creator>
      <dc:date>2021-12-08T19:00:48Z</dc:date>
    </item>
  </channel>
</rss>

