Unable to locate threat ID 8723 for a vulnerability protection exception.

Unable to locate threat ID 8723 for a vulnerability protection exception.

4781
Created On 07/06/22 01:52 AM - Last Modified 07/06/22 03:14 AM


Symptom


  • The Threat Vault  (https://threatvault.paloaltonetworks.com/) classifies the signature as  "Vulnerability Protection Signatures".Threat Vault1.png
  • Unable to locate any threat IDs listed below to create an exception in the vulnerability protection profile.
           Threat-ID 8721     This event detects the source or destination address of the network packet is defined as an unspecified address or an address reserved for future definition and use as specified in RFC 3513 for IPv6.
           Threat-ID 8722      This event detects TCP split handshake, where both a client and server of a TCP connection send a SYN packet to each other simultaneously. 
           Threat-ID 8723      This event detects a TCP SYN packet with payload, and a TCP fast open option is not present.
           Threat-ID 8724      This event detects a TCP SYN-ACK packet with payload, and a TCP fast open option is not present.
           Threat-ID 8725      This event detects and strips the TCP Fast Open option (and data payload, if any) from the TCP SYN or SYN-ACK packet during a TCP three-way handshake.
           Threat-ID 8726      This event detects the presence of fragmented IP packets.
           Threat-ID 8727      This event detects attempts at spoofing of IP address. 
           Threat-ID 8728      This event detects attempts to launch a ping of death DoS attack.  
           Threat-ID 8729      This event detects the presence of ICMP Packets that are larger than 1024 bytes.  
           Threat-ID 8730      This event detects the presence of ICMP fragments.  
           Threat-ID 8731      This event detects the presence of an error message embedded within ICMP packets. 
           Threat-ID 8732      This event is triggered when encountering a TCP packet which does not belong to an existing session. Any new session is expected to begin with a SYN packet and dropped if not so. 

Vuln Profile.png


Environment


  • Palo Alto Networks Firewalls.
  • PAN-OS 8.1.0  and later versions.
  • PAN-OS 9.1.0  and later versions.
  • PAN-OS 10.0.0  and later versions.
  • PAN-OS 10.1.0  and later versions.
  • PAN-OS 10.2.0  and later versions.


Cause


  • Although these threat IDs are identified as "Vulnerability Protection Signatures", all signatures ID in the ranges between 8700-8799 are associated with Packet Based Attacks Protections available in the  "Zone Protection" profiles. 


Resolution


  • This is the expected behavior. Exceptions for these signatures are not to be found under the  "Vulnerability Protection Profile".
  • There are no threat exceptions for signatures related to Packet Based Protections. Only "Source Address Exclusion" is optional for "Reconnaissance Protection".
           Network -->Zone Protection --> Zone Protection Profile -->Packet Based Attack Protection.


Additional Information


  • What are the Threat IDs for Packet Based Attacks associated with Zone Protection?

          https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000wkqxCAA


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000wkrWCAQ&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language