Non-RFC Compliant DNS Traffic on Port 53/5353

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Non-RFC Compliant DNS Traffic on Port 53/5353

L1 Bithead

HI,

Continuously receiving vulnerability threat events (Non-RFC Compliant DNS Traffic on Port 53/5353(56538))  form the same source IP towards our PA public IP addresses.  The source is also clean and belongs to Vodafone ISP.

 

I could not find any other trace to resolve the issue.

 

Please assist how I can proceed to resolve it.  What action I should take to find the root cause?

 

Sample Log:

<14>Aug 30 13:34:07 PA-FW-SEC LEEF:2.0|Palo Alto Networks|PAN-OS Syslog Integration|10.2.3-h4|Non-RFC Compliant DNS Traffic on Port 53/5353(56538)|x7C|ReceiveTime=2023/08/30 13:34:07|SerialNumber=016301009873|cat=THREAT|Subtype=vulnerability|devTime=Aug 30 2023 08:04:07 GMT|src=123.63.124.44|dst=x.x.246.105|srcPostNAT=0.0.0.0|dstPostNAT=0.0.0.0|RuleName=DNS-Inbound|usrName=|SourceUser=|DestinationUser=|Application=dns-base|VirtualSystem=vsys1|SourceZone=OUTSIDE-WAN|DestinationZone=DMZ|IngressInterface=ethernet1/17|EgressInterface=ethernet1/19|LogForwardingProfile=Qradar|SessionID=534411|RepeatCount=1|srcPort=52731|dstPort=53|srcPostNATPort=0|dstPostNATPort=0|Flags=0x2000|proto=tcp|action=alert|Miscellaneous=|ThreatID=Non-RFC Compliant DNS Traffic on Port 53/5353(56538)|URLCategory=any|sev=1|Severity=informational|Direction=client-to-server|sequence=7269186445734632983|ActionFlags=0x8000000000000000|SourceLocation=India|DestinationLocation=India|ContentType=|PCAP_ID=0|FileDigest=|Cloud=|URLIndex=0|RequestMethod=|Subject=|DeviceGroupHierarchyL1=97|DeviceGroupHierarchyL2=0|DeviceGroupHierarchyL3=0|DeviceGroupHierarchyL4=0|vSrcName=|DeviceName=ALCOB-PA-FW-SEC|SrcUUID=|DstUUID=|TunnelID=0|MonitorTag=|ParentSessionID=0|ParentStartTime=|TunnelType=N/A|ThreatCategory=protocol-anomaly|ContentVer=AppThreat-8749-8252

 

 

Thanks

 

 

2 REPLIES 2

Cyber Elite
Cyber Elite

you can enable packetcapture in the threat log so you can capture one of these DNS queries to see what they look like

that pcap can then be used to report a false positive with Palo TAC or get back to vodafone and let them know about potentially malformed dns queries

 

 

hope this helps

T

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

Cyber Elite
Cyber Elite

you can enable packetcapture in the threat log so you can capture one of these DNS queries to see what they look like

that pcap can then be used to report a false positive with Palo TAC or get back to vodafone and let them know about potentially malformed dns queries

 

 

hope this helps

T

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization
  • 2871 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!