Changes to the LIVEcommunity experience are coming soon... Here's what you need to know.
A new research has demonstrated a technique that allow an attacker to bypass firewall protection and remotely access any TCP/UDP service on victim machine.
https://thehackernews.com/2020/11/new-natfirewall-bypass-attack-lets.html
It would be great to hear from someone at PAN on this exploit.
The attack Kill-Chain. Palo Alto Networks Firewall Deployment decryption to avoid inspection bypass for encrypted content and applications For internal clients not behind a NAT device, a source-ip classification profile may be a good
We produced the following IPS signatures to cover this threat:
NAT Slipstreaming Detection (59667)
NAT Slipstreaming Detection (59668)
NAT Slipstreaming Detection (59669)
NAT Slipstreaming Detection (59671)
NAT Slipstreaming Detection (59672)
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!