Critical Palo Alto Networks PAN-OS Flaw Under Active Attack

-

PAN-OS Flaw

Palo Alto Networks is warning {that a} crucial flaw impacting PAN-OS software program utilized in its GlobalProtect gateways is being actively exploited within the wild.

Tracked as CVE-2024-3400, the problem has a CVSS rating of 10.0, indicating most severity.

“A command injection vulnerability within the GlobalProtect characteristic of Palo Alto Networks PAN-OS software program for particular PAN-OS variations and distinct characteristic configurations could allow an unauthenticated attacker to execute arbitrary code with root privileges on the firewall,” the corporate stated in an advisory printed immediately.

The flaw impacts the next variations of PAN-OS, with fixes anticipated to be launched on April 14, 2024 –

  • PAN-OS < 11.1.2-h3
  • PAN-OS < 11.0.4-h1
  • PAN-OS < 10.2.9-h1

The corporate additionally stated that the problem is relevant solely to firewalls which have the configurations for each GlobalProtect gateway (Community > GlobalProtect > Gateways) and gadget telemetry (Gadget > Setup > Telemetry) enabled.

Cybersecurity

Menace intelligence and incident response firm Volexity has been credited with discovering and reporting the bug.

Whereas there aren’t any different ttechnical particulars in regards to the nature of the intrusions or the id of risk actors behind them, Palo Alto Networks acknowledged that it is “conscious of a restricted variety of assaults that leverage the exploitation of this vulnerability.”

Within the interim, it is recommending clients with a Menace Prevention subscription to allow Menace ID 95187 to safe towards the risk.

The event comes as Chinese language risk actors have more and more relied on zero-day flaws impacting Barracuda Networks, Fortinet, Ivanti, and VMware to breach targets of curiosity and deploy covert backdoors for persistent entry.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

ULTIMI POST

Most popular