Metrics
Affected Vendors & Products
Solution
Palo Alto Networks is currently working to improve our inspection engines by adding a URL filtering policy check on both the TLS SNI field and the HTTP Host and URL headers for decrypted HTTPS transactions. Apply any of the workarounds to completely mitigate the risk of evasion. There are currently no PAN-OS updates available for this issue.
Workaround
Customers concerned about the risk described in this advisory are encouraged to review the KB article https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008V4J for more information on background and mitigation options. To enforce URL filtering policy on TLS handshakes for decrypted HTTPS sessions, we suggest you use any one of the following workarounds: 1. Route outbound traffic between two virtual systems (vsys) on PAN-OS firewalls that have vsys capability and perform URL Filtering on one vsys and perform SSL/TLS Decryption on the other vsys. 2. Add two additional Security Zones and route outbound traffic between the two zones so that you can apply both "Decrypt" and "No Decrypt" Decryption policy rules. For example, configure your next-generation firewall so that traffic travels from the Inside zone to the Internal-DMZ zone where you applied a “No Decrypt” rule along with URL Filtering and then the traffic passes to the External-DMZ zone and from External-DMZ to the Internet zone where you applied a "Decrypt" rule. Be aware that this workaround configuration may significantly increase the load on your firewall. 3. Use the additional security device in the traffic chain. The SSL/TLS Decryption and URL Filtering functions should be separated (for example, the first device is performing URL Filtering and the second device is performing SSL/TLS Decryption). These workarounds are described in detail at https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008V4J We recommend you use an endpoint protection solution such as the Cortex XDR agent to significantly reduce the potential risk of hosts being compromised. See https://www.paloaltonetworks.com/cortex/endpoint-protection. Caution: We recommend that you do not disable SSL/TLS Decryption as a workaround to this issue. There are additional risks associated with this action.
No history.

Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-17T04:10:07.790Z
Reserved: 2019-12-04T00:00:00
Link: CVE-2020-2035

No data.

Status : Modified
Published: 2020-08-12T17:15:12.537
Modified: 2024-11-21T05:24:30.770
Link: CVE-2020-2035

No data.

No data.