- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
05-06-2020 05:53 AM
We have ssl inbound decryption configured and from outside we are able to exploit the vulnerabilty.
Need to know why PA allows the connection for that signature.
Vul threat id is 57230
Name Telerik Web UI
06-21-2020 09:04 AM
Seems Palo Alto did the content upgrade on their end recently and now we see that signature is blocking the traffic.
05-06-2020 04:26 PM
Sounds like a false negative, but the forum is not the right place to troubleshoot this. Please open a Support case. You will be asked to provide the exploit PoC, a packet capture of the attack (capture it from the client side) and supporting evidence that SSL decryption is working properly (detailed traffic log view showing the decrypted application normally detected and readable by the firewall).
05-08-2020 12:19 PM
I agree we have opened the case with PA for 10 days as per them decryption is working as expected.
They are looking into this vulnerability as we can exploit the signature.
06-15-2020 02:41 PM
PA is still searching on this.
06-21-2020 09:04 AM
Seems Palo Alto did the content upgrade on their end recently and now we see that signature is blocking the traffic.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!