PAN-OS 9.0.12 Addressed Issues
PAN-OS® 9.0.12 addressed issues.
Fixed an issue with GPRS tunneling protocol (GTP) event packet capture (pcap) where enabling
Packet Capturedid not work.
Fixed an issue where user information in the Clientless VPN wasn't handled properly in high availability (HA) configurations, which resulted in the firewall being unable to create more user sessions.
Fixed an issue in Panorama where frequent API requests caused the Panorama web interface to become unresponsive. This issue occurred because the web interface automatically refreshed after each request.
A fix was made to address a vulnerability related to information exposure through log files in PAN-OS where secrets in PAN-OS XML API requests were logged in cleartext in the web server logs when the API was used incorrectly (CVE-2021-3036).
Fixed an issue where firewalls repeatedly connected and disconnected to Cortex Data Lake due to a probing issue.
Fixed an issue where a dataplane process stopped responding while processing fragmented traffic on GTP-U tunnels.
Fixed an issue where a content update caused the Panorama XML cache build to fail. This resulted references of the used objects on Panorama being removed, which caused commits on the managed firewalls to fail.
Fixed an issue where the firewall dropped GTPv2-x Create Session Response packets with the following error message:
bad port 84b.
Fixed an issue where the syntax on GlobalProtect DNS suffixes was not validated.
Fixed an issue where user activity reports failed to run when the firewall was in FIPS mode.
Fixed an issue where, when an out-of-order stream of TCP packets was subjected to HTTP header insertion, the packets were duplicated.
Fixed an issue where certificates, custom logos, and Security Assertion Markup Language (SAML) metadata were unable to be uploaded from the web interface using a Chromium-based browser running version 84 or later.
Fixed an issue where a Panorama virtual appliance was unable to manage more than 2,500 firewalls when 28 or more CPU cores were available.
Fixed an intermittent issue where the GlobalProtect portal stopped responding with a 502 Bad Gateway response page when trying to access the portal URL using a web browser.
Fixed an issue in a virtual wire deployment configured with
Link State Pass Throughenabled where, when one member port went down, the peer port took longer than expected to change the status to
Fixed an issue where, after a change in Security policies, traffic logs for inner GTP-U sessions did not show
IMEIfields following a commit.
A fix was made to address a vulnerability regarding information exposure through log files in PAN-OS that made it possible for configuration secrets for HTTP, email, and SNMP trap v3 log forwarding server profiles to be logged to the logrcvr.log system log (CVE-2021-3032).
Fixed an issue where, when using certificate profiles configured under specific virtual systems (vsys), the GlobalProtect
Machine Certification Checkand
HIP Objectfail during a client certificate check.
Fixed an issue where the decryption profile was configured without the
Block sessions with expired certificatesoption, but the firewall still blocked websites that were signed by an Expired AddTrust Root CA (certificate authority).
Fixed an issue where the firewall incorrectly created GTP-U sessions from Create Session Request and Create Session Response packets.
Fixed an issue where required processes were not automatically restarted on the Log Processing Card (LPC) or the Log Forwarding Card (LFC).
Fixed an issue where traffic didn't hit the intended Security policy if SSL forward proxy was enabled and service was set to
Fixed an issue where
ValidateAlljobs were incorrectly logged as
CommitAllin the configuration log of the firewall.
Fixed an issue where firewall buffers were depleted with GTP traffic due to the mishandling of conflicting sessions.
PA-7050 and PA-7080 firewalls with 100G NPC only) Fixed an issue where jumbo frames brought down the Network Processing Card (NPC) when traffic traversed the firewall at a high rate.
Fixed an issue where TCP connections got stuck between the firewall and the Log Collector if some packets were dropped on the path between the two appliances.
Fixed a configuration issue on a multi-vsys where the configured interface service route for email schedule reports was not being used.
FPP offload based hardware model only) Fixed an issue where, when UDP traffic that was received on a tunnel had back-to-back client-to-server packets, random packets dropped.
An update was made to change the following system log message:
DO NOT CHOOSE WMI in Active-Directory FOR YOUR USE CASE IF SEE THIS LOG AGAIN IN <number> SECONDSto
Please change server monitor(log server) Transport Protocol from WMI to WinRM for better performance. This update also reduces the severity from
Debug logs were added to detect an out-of-memory (OOM) condition that caused the management server to restart.
Fixed an issue where the firewall silently dropped TCP out-of-order packets.
Fixed an issue where service session timeout override was not used for custom applications and the default value was chosen instead.
Fixed an issue on the firewall where, with SSL Forward Proxy feature enabled, random file downloads over a decrypted session would stall or hang in the middle.
Fixed an issue that led to exhaustion of memory, which resulted in path monitoring failures when Cortex Data Lake was configured.
Fixed an issue where
URL Filteringlogs were misaligned when exported from the firewall due to the presence of a comma in the
User-Agentfield of the logs.
Fixed an issue where the keyword
[Disabled]was missing from the disabled policies exported in CSV/PDF format.
Fixed an issue where the data for a botnet report was deleted before the botnet report was completed.
PA-3200 Series and PA-800 Series firewalls only) Fixed an issue where you were unable to disable auto negotiation on small form-factor pluggable (SFP) ports.
Fixed an issue with GTP event packet capture (pcap) where enabling
Packet Capturedid not work.
Fixed an issue where region information was not called due to a mismatch in uppercase and lowercase letters in the region name.
Fixed an issue where pre-logon users failed authentication if the cookie was expired, instead of using certificate authentication.
Fixed an issue with the GlobalProtect portal where pre-logon authentication failed when agent Config Selection Critiera was configured on the firewall.
PA-7000 Series firewalls only) Fixed an issue where unplugging cables from Quad Small Form-factor Pluggable (QSFP) interfaces on 100G NPC causes path monitoring failures.
Fixed an issue where DNS proxy failed due to incorrect mapping of the DNS transaction ID.
Fixed an issue where syslog connection failures were frequently reported in system logs.
A fix was made to address a vulnerability where Ethernet packets on PA-200, PA-220, PA-500, PA-800, PA-2000 Series, PA-3000 Series, PA-3200 Series, PA-5000 Series, PA-5200 Series, and PA-7000 Series firewalls were not cleared before the data frame was created (CVE-2021-3031).
Fixed an issue where BGP flapped continuously with Jumbo Frames enabled on the firewall.
Fixed an issue where the
Group foundflag was set to
NOon User-ID logs on the web interface, even when the user belonged to a group retrieved from the Active Directory (AD) server.
Recommended For You
Recommended videos not found.