We are getting below vulnerability in PA NGFW.
Please find the error below,
|IP Status||QID||Title||Type||Severity||Port||Protocol||FQDN||SSL||CVE ID||Vendor Reference||Bugtraq ID||CVSS Base||CVSS Temporal||CVSS3 Base||CVSS3 Temporal||Threat||Impact||Solution||Exploitability||Associated Malware||Results||PCI Vuln||Instance||Category||Result Errors|
|host scanned, found vuln||34000||TCP Source Port Pass Firewall||Vuln||3||5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N)||3.6 (E:U/RL:W/RC:UC)||Your firewall policy seems to let TCP packets with a specific source port pass through.||Some types of requests can pass through the firewall. The port number listed in the results section of this vulnerability report is the source port that unauthorized users can use to bypass your firewall.||Make sure that all your filtering rules are correct and strict enough. If the firewall intends to deny TCP connections to a specific port, it should be configured to block all TCP SYN packets going to this port, regardless of the source port.||The host responded 4 times to 4 TCP SYN probes sent to destination port 25 using source port 25. However, it did not respond at all to 4 TCP SYN probes sent to the same destination port using a random source port.||yes||Firewall|
Make sure that all your filtering rules are correct and strict enough. If the
firewall intends to deny TCP connections to a specific port, it should be
configured to block all TCP SYN packets going to this port, regardless of the
Have you configured the FW to utilize PANW best practices for Zone and Dos Protections?
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!