How to block NAT Slipstreaming on Palo Alto Firewalls

Ricardo Gutierrez
2 min readMar 7, 2021

--

How to block “Nat Slipstreaming” on Palo Alto Firewalls

Update: 02/10/2021 If you are using threat DB version 8373–6537, the default action now is reset-server.

The main objective of Cybersecurity professionals, is to reduce the attack surface, on network connected devices (computers, IoT, hvac, smart UPSs, smart power strips, etc.). Cybersecurity professionals often assume that devices that have no internet connectivity will never be compromised by a hacker. The NAT slipstreaming cyberattack proves this wrong.

NAT Slipstreaming allows an attacker to remotely access ANY TCP/UDP service bound to ANY system behind a victim’s NAT, bypassing the victim’s NAT/firewall (remote arbitrary firewall pinhole control), all it takes is the victim’s computer to visit the attacker’s website”.

Once the victim’s computer visits the website, the attacker’s servers start to scan your network to identify the network connected devices. If your devices have not been patched to mitigate vulnerabilities, the attackers will exploit these to take control over them and cause havoc. — Sammy Kamkar (discovered the attack method).

NAT Slipstreaming

Requirements

In order to protect your network you will need to meet the following requirements:

  1. You will need to build or use an existing security policy.
  2. You will need to build or use an existing “vulnerability protection” security profile

STEPS TO CONFIGURE A PALO ALTO FIREWALL TO PROTECT FROM THE “NAT SLIPSTREAM” ATTACK METHOD

  1. Click on vulnerability protection profile name you want to edit.
  2. Go to the exceptions tab.
  3. Click on the exceptions tab.
  4. Type slipstream.
  5. Change the action from alert to drop, or reset-server or client.

6. In your security policy make sure to use the vulnerability profile that you just edited.

For more great tutorials go to https://www.smartcloudcomputing.net/

--

--