Action on a vulnerabilty found in a SMTP flow

Reply
L1 Bithead

Action on a vulnerabilty found in a SMTP flow

Hello,

 

How to configure the PA firewall to return a SMTP 541 when vulnerability is seen in a SMTP flow ? I have managed to do it with the AV protection but not with the vulnerability protection.

 

Cedric

Community Team Member

Re: Action on a vulnerabilty found in a SMTP flow

L1 Bithead

Re: Action on a vulnerabilty found in a SMTP flow

Thanks @kiwi

 

From what I see, starting from 7.0, I will be able to use 'reset both' for vulnerabilty and if it is SMTP, it will send a SMTP 541 ?

 

Currently, I am using 6.1 and it is only working like that for AV protection.

Highlighted
Community Team Member

Re: Action on a vulnerabilty found in a SMTP flow

Hi @Cedricd,

 

Yes, that is correct.

 

Cheers !

-Kim.

 

 

L0 Member

Re: Action on a vulnerabilty found in a SMTP flow

Hi kiwi,

 

is it possible that this does not work if there is a vulnerability found inside an attachment?

 

For example I have emails arriving with office documents where a threat (Microsoft Office Memory Corruption Vulnerability (id 38859)) is found inside the office document and the corresponding email gateway does not receive a smtp error 541 but gets the connection cancelled via tcp reset and retries and retries to deliver the email to the backend server. The email gateway itself states smtp error 442 Bad Connection.

 

We are on PAN-OS 7.1 so according to the https://live.paloaltonetworks.com/t5/Featured-Articles/Tips-amp-Tricks-Complete-Action-List-in-Profi... the firewall should send smtp error 541

 

Best regards

Alex

Tags (1)
L1 Bithead

Re: Action on a vulnerabilty found in a SMTP flow

That's exactly my problem with PAN-OS 6.1. I was hoping 7.1 solved that issue but it looks like it is not the case ?

Community Team Member

Re: Action on a vulnerabilty found in a SMTP flow

Hi @aroos_dts , @Cedricd,

 

I might have mixed up virus/vulnerability in my previous comment :/

 

It actually depends if the email is identified as virus or as vulnerability.

Note that in Antivirus profile you have an SMTP decoder (you don't have this decoder in Vulnerability profiles).  

The article posted earlier does mention that it only applies to the SMTP decoder.

 

With the correct action of "reset-both" in the SMTP decoder you will get the 541 response.

However, in the vulnerability profile, there is no such thing as an SMTP decoder so you will get a TCP reset.

 

The good news is that there is already a feature request to add this functionality to Vulnerability profiles (FR #6548).   You can reach out to your local SE and ask him to add your vote to this feature.

 

Kind regards,

-Kim.

L0 Member

Re: Action on a vulnerabilty found in a SMTP flow

Hi @kiwi,

 

thanks for your fast response! So we hope that this will be implemented some day :)

 

Best regards

Alex

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!

The Live Community thanks you for your participation!