12-15-2017 03:52 PM
Recent article talks about a newly discovered (but old) vulnerability:
You can test your links here if you are vulnerable:
With TLSv1.2, all my Palo Alto GlobalProtect interfaces check as vunerable.
Has anyone heard of this and is there a configuration that lessen the vulnerability?
12-29-2017 12:05 PM
Please note that we have posted the following advisory regarding ROBOT.
01-02-2018 12:54 PM
Hi Curtis - any idea if this fix will resolve findings on Global Protect portals using an RSA cert? Seems this mitigation / workaround statement only reflects fixes on the SSL Decryption Profiles.
01-02-2018 04:19 PM
The 757 contect update is giving some extra protection, but doesn't solve the problem.
I've done the update and our GP site still tests vulnerable.
Their jugestion of switching to DHA type certificate is not an option for me at this time.
It seems to me that they are coming out with an actual fix, with 8.0.7:
A security-related fix was made to prevent the decryption of captured sessions through the ROBOT attack (CVE-2017-17841).
But I haven't tested it yet.
01-08-2018 10:14 AM
Same thing here - 757 has the signature and can be applied to a vulnerability protection profile, but external facing portals will still show the finding. We're running PanOS 7.1.11 and PanOS 8.0.7 is not an option for us at this time.
They did update the mitigation notes to reflect issues with PanOS 7.1, but it's not clear.
01-19-2018 02:54 AM
PANOS- 7.1.15 is out and the release note includes the following entrie:
PAN-89936: A security‐related fix was made to prevent the decryption of captured sessions through the ROBOT attack (CVE‐2017‐17841).
I assume it solves the vulnerability exposition but not tested yet.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!