03-08-2016 12:06 AM - edited 03-08-2016 12:07 AM
A customer has been warned about DROWN attack (https://drownattack.com/) on one of its servers. As a server is behind PA I thought there was no risk. But searching through signature database I didn't find anything about DROWN attack. I've also checked all CVEs connected with attack (CVE-2015-3197, CVE-2016-0703, CVE-2016-0800) and PA doesn't have signature for any of them!
Anyone knows about if PA covers this attack? Anyone contacted PA about this already?
03-10-2016 06:42 AM
Would the PAN be able to detet this if it was performing reverse proxy ssl decryption?
Just a thought
03-10-2016 03:41 PM
Hi,
decryption would not really help, as Dulle explained intercepting communication over long time is sufficient to exploit this. Decryption can't help if someone is somewhere allowing (knowingly or unknowingly) copying of your traffic as it passes along the way.
03-10-2016 09:29 PM
And there came Application and Threat Content Release Notes Version 567, and proved me wrong....
03-15-2016 12:23 AM
Not really Dulle. The signature doesn't detect any exploit. It just detects use of SSLv2.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!