- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
02-09-2021 10:37 PM
In my case, the team is performing a vulnerability assessment on PA820
Vulnerability Title: TCP timestamp response.
Description: The remote host responded with a TCP timestamp. The TCP timestamp response can be used to approximate the remote host's uptime, potentially aiding in further attacks. Additionally, some operating systems can be fingerprinted based on the behavior of their TCP timestamps.
The scanning was running to the MGMT IP,
How to disable the timestamp response.
02-10-2021 02:14 AM
Hi @Mohammed_Yasin ,
I'm pretty sure you won't be able to do this unless you root into the device and edit some config-file.
I'd recommend reaching out to support with your findings of the vulnerability assessment.
Cheers,
-Kiwi.
05-07-2021 12:33 PM - edited 05-07-2021 12:39 PM
The answer to this is found here:
https://live.paloaltonetworks.com/t5/threat-vulnerability-discussions/tcp-timestamp-response-on-mgmn...
User @mivaldi explains this topic and what can be done.
Also found this option as well:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFZCA0
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!