PA firewall treated NBSS Continuation Message as Worm/Win32.vobfus

Showing results for 
Show  only  | Search instead for 
Did you mean: 
Please sign in to see details of an important advisory in our Customer Advisories area.

PA firewall treated NBSS Continuation Message as Worm/Win32.vobfus

L0 Member

Hi all,


Recently the PA firewall received massive threat alert with family Worm/Win32.vobfus.

(Application: ms-ds-smbv3, Port: 445, thr_category: pe)

I have submitted the file samples and the files are clean, we also scan the server and there is no virus.

Which we confirm this alert is a false positive.


Then I take a Threat Packet Capture, PA firewall captures the NBSS Continuation Message.

I see the TCP payload is all zero, it that the reason PA treated the NBSS Continuation Message as Worm/Win32.vobfus?



Please help, thank you!




L6 Presenter

Well just make a new security rule that matches the source and destination with a new antivirus profilewhere the antivirus signature is dissabled and place is before the current rule that is triggering the false positive.






  • 1 replies
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!