Palo Alto Networks closes door on TunnelCrack

By

Configuration checks needed, rather than patches.

Palo Alto Networks has published its response to the TunnelCrack VPN eavesdropping technique that academics demonstrated earlier this month.

Palo Alto Networks closes door on TunnelCrack

The researchers announced that most VPNs could be tricked into leaking traffic.

They detailed two vulnerabilities, one that allowed traffic to leak on the VPN client side (LocalNet), the other on the server side (ServerIP).

Palo Alto Networks has now published an advisory in response, saying the vulnerability is specific to product and configuration.

Its GlobalProtect agent deployments on iOS, Android, and ChromeOS are not vulnerable to LocalNet attacks; and all platforms running GlobalProtect are safe if they’re configured with no direct access to the local network.

“Additionally, Prisma Access customers are not impacted by ServerIP attacks. PAN-OS with GlobalProtect Gateways configured with the address set as an IP are not impacted by ServerIP attacks”, the advisory stated.

However, the GlobalProtect application on PAN-OS gateways are vulnerable to ServerIP if their address is set as a fully-qualified domain name (FQDN); and to LocalNet if they have local network access.

Similarly, Prisma Access with the GlobalProtect application is vulnerable to LocalNet if local network access is enabled.

“No software updates are required at this time,” Palo Alto said, referring customers to this knowledge base article for specific configuration instructions.

“Note that enabling ‘No direct access to local network’ prevents end users from connecting to local LAN devices such as home printers, network storage, or streaming devices,” the advisory noted, adding that admins can configure exceptions for “specific users, operating systems, source addresses, destination domains, and applications”.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Qantas facing 'significant' data theft after cyber attack

Qantas facing 'significant' data theft after cyber attack

Home Affairs officer accessed data on "friends and associates"

Home Affairs officer accessed data on "friends and associates"

Qantas contacted by "potential cyber criminal"

Qantas contacted by "potential cyber criminal"

SA Power Networks tackles IAM, cloud security under five-year strategy

SA Power Networks tackles IAM, cloud security under five-year strategy

Log In

  |  Forgot your password?