- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
02-10-2015 06:07 PM
Anyone noting a large increase in triggering of following threat ID's after this Update (485-2569) was applied?
( threatid eq 36485 ) - OpenSSL SSL/TLS MITM vulnerability
( threatid eq 36420 ) - OpenSSL TLS Heartbeat Information Disclosure Vulnerability - Reverse Heartbleed
I've rolled it back as it was dropping a lot of HTTPS traffic for sites that looked ok on closer inspection.
This is mainly for internal users connecting to external sites out of our control for the first threat ( 36485 ).
The reverse ones (36420) i'm not so worried about as they are probably dodgy sites to begin with.
02-11-2015 10:08 AM
Hi Paul,
You can take captures for those threat packets and open up a case.
Please refer: How to Submit a Virus/Vulnerability False Positive
Regards,
Hitesh Mistry
02-11-2015 12:05 PM
I am having the same thing on my site. 100's of alerts coming from untrust-> our DMZ, there have been a 5 or 6 of the OpenSSL MITM from internal - untrust.
The updated installed last night at 3am on our boxes and alerts started at 3:08am. Reverting back for now.
02-12-2015 01:20 AM
Hi,
Palo Alto Networks has determined that Application and Threat Content version 485 may introduce false-positive triggers on certain IPS signatures involving SSL changes in that content release. We removed content release 485 from public update servers and are re-releasing Application and Threat Content 486 with the SSL changes removed. Please be informed that now content 486 is available.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!