Question about CVE-2022-0028 PAN-OS: Reflected Amplification Denial-of-Service (DoS) Vulnerability in URL Filtering (Severity: HIGH)

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Question about CVE-2022-0028 PAN-OS: Reflected Amplification Denial-of-Service (DoS) Vulnerability in URL Filtering (Severity: HIGH)

L1 Bithead

Dear all,

 

PAN-OS

CVE-2022-0028 PAN-OS: Reflected Amplification Denial-of-Service (DoS) Vulnerability in URL Filtering (Severity: HIGH)

https://security.paloaltonetworks.com/CVE-2022-0028

 

About CVE-2022-0028 on Palo Alto vulnerability. If we have policy that config source with any because we use shared policy for all vsys. If we config source address with internal customer ip. It will have any effect from this vulnerability because if internet ip come to policy it will not match and go to deny policy. 

 

Thank you for your answer.

1 REPLY 1

Cyber Elite
Cyber Elite

Hello there

 

Security profiles are interpreted AFTER a security policy.
Why not create your rule with the internal IP BEFORE your current rule.

This way, your internal rule is matched first, and the remaining users will continue to hit the rule you currently have.
I guess I am thinking that you want a way to "whitelist" the internal IP.  This is one way.
You can also white list the IP inside of the Vulnerability Profile itself, finding the ID number of the vulnerability and creating an Exception.

Please help out other users and “Accept as Solution” if a post helps solve your problem !
  • 2160 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!