<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability wrong action Palo in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-wrong-action-palo/m-p/453186#M101327</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;&amp;nbsp;, below are my opinions on your questions -&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;why Palo is detecting a normal access as a vulnerability?&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;A- Palo Alto triggers this signature when there are multiple requests in specified time from same source to same destination. e.g. 20 attempts in 1 min then it will consider it as brute force. In this case the signature is triggered and actions set against it will be followed.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;why Palo is not permitting this traffic if the action is alert?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;A- I would ask you to verify the profile where you are looking the action against the profile mapped on the security policy. It may be the case that you are looking at wrong profile.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 14 Dec 2021 14:07:29 GMT</pubDate>
    <dc:creator>SutareMayur</dc:creator>
    <dc:date>2021-12-14T14:07:29Z</dc:date>
    <item>
      <title>Vulnerability wrong action Palo</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-wrong-action-palo/m-p/453163#M101325</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are having a weird issue in Palo. We have a FTP server and we can not access because Palo detects this vulnerability:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Name: SSH User Authentication Brute Force Attempt&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;Unique Threat ID: 40015&lt;/P&gt;&lt;P class=""&gt;The Palo action is "alert" for this vulnerability but its being blocked "block-ip". I attach the screenshots:&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pic1.JPG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/38138iED70E7ED528ED9A6/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="pic1.JPG" alt="pic1.JPG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pic2.JPG" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/38139i4DA7B0B542651B05/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="pic2.JPG" alt="pic2.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;why Palo is detecting a normal access as a vulnerability?&lt;/P&gt;&lt;P class=""&gt;why Palo is not permitting this traffic if the action is alert?&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;any idea?&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;thanks&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 12:19:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-wrong-action-palo/m-p/453163#M101325</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2021-12-14T12:19:32Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability wrong action Palo</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-wrong-action-palo/m-p/453186#M101327</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;&amp;nbsp;, below are my opinions on your questions -&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;why Palo is detecting a normal access as a vulnerability?&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;A- Palo Alto triggers this signature when there are multiple requests in specified time from same source to same destination. e.g. 20 attempts in 1 min then it will consider it as brute force. In this case the signature is triggered and actions set against it will be followed.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;why Palo is not permitting this traffic if the action is alert?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;A- I would ask you to verify the profile where you are looking the action against the profile mapped on the security policy. It may be the case that you are looking at wrong profile.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 14:07:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerability-wrong-action-palo/m-p/453186#M101327</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2021-12-14T14:07:29Z</dc:date>
    </item>
  </channel>
</rss>

