Discover the impact of CVE-2020-2035, a vulnerability in PAN-OS allowing evasion of URL filtering policies on decrypted HTTPS sessions. Learn about affected systems, exploitation, and mitigation steps.
A vulnerability in PAN-OS allows a compromised host to evade URL filtering policies on decrypted HTTPS sessions, impacting Palo Alto Networks' products.
Understanding CVE-2020-2035
This CVE highlights a situation where URL filtering policies are not enforced on TLS handshakes for decrypted HTTPS sessions.
What is CVE-2020-2035?
When SSL/TLS Forward Proxy Decryption is configured, the PAN-OS URL filtering feature inspects HTTP Host and URL path headers but overlooks the Server Name Indication (SNI) field in the TLS Client Hello handshake. This evasion technique can be exploited by a compromised host to bypass security policies.
The Impact of CVE-2020-2035
Technical Details of CVE-2020-2035
This section provides detailed technical information about the vulnerability.
Vulnerability Description
The issue allows a compromised host to evade URL filtering policies on decrypted HTTPS sessions, potentially leading to policy enforcement bypass.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability arises when SSL/TLS Forward Proxy Decryption is enabled, allowing a compromised host to evade URL filtering policies.
Mitigation and Prevention
Learn how to mitigate and prevent exploitation of this vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates