Crucial Palo Alto Networks PAN-OS Flaw Beneath Energetic Assault

-

Crucial Palo Alto Networks PAN-OS Flaw Beneath Energetic Assault

Palo Alto Networks is warning {that a} important flaw impacting PAN-OS software program utilized in its GlobalProtect gateways is being actively exploited within the wild.

Tracked as CVE-2024-3400, the difficulty has a CVSS rating of 10.0, indicating most severity.

“A command injection vulnerability within the GlobalProtect function of Palo Alto Networks PAN-OS software program for particular PAN-OS variations and distinct function configurations could allow an unauthenticated attacker to execute arbitrary code with root privileges on the firewall,” the corporate stated in an advisory printed at this time.

The flaw impacts the next variations of PAN-OS, with fixes anticipated to be launched on April 14, 2024 –

  • PAN-OS < 11.1.2-h3
  • PAN-OS < 11.0.4-h1
  • PAN-OS < 10.2.9-h1

The corporate additionally stated that the difficulty is relevant solely to firewalls which have the configurations for each GlobalProtect gateway (Community > GlobalProtect > Gateways) and system telemetry (Machine > Setup > Telemetry) enabled.

Cybersecurity

Risk intelligence and incident response firm Volexity has been credited with discovering and reporting the bug.

Whereas there are not any different ttechnical particulars in regards to the nature of the intrusions or the id of menace actors behind them, Palo Alto Networks acknowledged that it is “conscious of a restricted variety of assaults that leverage the exploitation of this vulnerability.”

Within the interim, it is recommending clients with a Risk Prevention subscription to allow Risk ID 95187 to safe in opposition to the menace.

The event comes as Chinese language menace actors have more and more relied on zero-day flaws impacting Barracuda Networks, Fortinet, Ivanti, and VMware to breach targets of curiosity and deploy covert backdoors for persistent entry.

See also  Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk

LEAVE A REPLY

Please enter your comment!
Please enter your name here

ULTIMI POST

Most popular