Palo Alto Networks warnt vor möglicher PAN-OS RCE-Schwachstelle

Teilen:

Today, cybersecurity company Palo Alto Networks warned customers to restrict access to their next-generation firewalls because of a potential remote code execution vulnerability in the PAN-OS management interface.

In a security advisory published on Friday, the company said it doesn’t yet have additional information regarding this alleged security flaw (tracked internally as PAN-SA-2024-0015) and added that it has yet to detect signs of active exploitation.

“Palo Alto Networks is aware of a claim of a remote code execution vulnerability via the PAN-OS management interface. At this time, we do not know the specifics of the claimed vulnerability. We are actively monitoring for signs of any exploitation,” it said.

“We strongly recommend customers to ensure access to your management interface is configured correctly in accordance with our recommended best practice deployment guidelines.

“Cortex Xpanse and Cortex XSIAM customers with the ASM module can investigate internet exposed instances by reviewing alerts generated by the Palo Alto Networks Firewall Admin Login attack surface rule.”

The company advised customers to block access from the Internet to their firewalls’ PAN-OS management interface and only allow connections from trusted internal IP addresses.

According to a separate support document on Palo Alto Networks’ community website, admins can also take one or more of the following measures to reduce the management interface’s exposure:

  • Isolate the management interface on a dedicated management VLAN.
  • Use jump servers to access the mgt IP. Users authenticate and connect to the jump server before logging in to the firewall/Panorama.
  • Limit inbound IP addresses to your mgt interface to approved management devices. This will reduce the attack surface by preventing access from unexpected IP addresses and prevents access using stolen credentials.
  • Only permit secured communication such as SSH, HTTPS.
  • Only allow PING for testing connectivity to the interface.

Critical missing authentication flaw exploited in attacks

On Thursday, CISA also warned of ongoing attacks exploiting a critical missing authentication vulnerability in Palo Alto Networks Expedition tracked as CVE-2024-5910. This security flaw was patched in July and threat actors can remotely exploit it to reset application admin credentials on Internet-exposed Expedition servers.

While CISA didn’t provide more details on these attacks, Horizon3.ai vulnerability researcher Zach Hanley released a proof-of-concept exploit last month that chains it with a command injection vulnerability (tracked as CVE-2024-9464) to gain “unauthenticated” arbitrary command execution on vulnerable Expedition servers.

CVE-2024-9464 can also be chained with other security flaws—addressed by Palo Alto Networks in October—to take over admin accounts and hijack PAN-OS firewalls.

The U.S. cybersecurity agency also added the CVE-2024-5910 vulnerability to its Known Exploited Vulnerabilities Catalog, ordering federal agencies to secure their systems against attacks within three weeks, by November 28.

“These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise,” warned CISA.

Sergiu Gatlan

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
10:37 am, Feb. 2, 2025
Wetter-Symbol 5°C
L: 3° | H: 6°
klarer Himmel
Luftfeuchtigkeit: 86 %
Druck: 1023 mb
Wind: 5 mph S
Windböe: 8 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 4%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 7:37 am
Sonnenuntergang: 4:51 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
3° | 6°°C 0 mm 0% 7 mph 86 % 1025 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
3° | 9°°C 0 mm 0% 8 mph 91 % 1025 mb 0 mm/h
Di. Feb. 04 9:00 pm
Wetter-Symbol
6° | 9°°C 1 mm 100% 13 mph 93 % 1026 mb 0 mm/h
Mi. Feb. 05 9:00 pm
Wetter-Symbol
4° | 7°°C 0 mm 0% 10 mph 86 % 1045 mb 0 mm/h
Do. Feb. 06 9:00 pm
Wetter-Symbol
2° | 8°°C 0 mm 0% 8 mph 86 % 1045 mb 0 mm/h
Today 12:00 pm
Wetter-Symbol
5° | 7°°C 0 mm 0% 7 mph 86 % 1023 mb 0 mm/h
Today 3:00 pm
Wetter-Symbol
6° | 8°°C 0 mm 0% 7 mph 76 % 1023 mb 0 mm/h
Today 6:00 pm
Wetter-Symbol
5° | 5°°C 0 mm 0% 4 mph 78 % 1023 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
4° | 4°°C 0 mm 0% 4 mph 79 % 1025 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
3° | 3°°C 0 mm 0% 4 mph 79 % 1025 mb 0 mm/h
Tomorrow 3:00 am
Wetter-Symbol
3° | 3°°C 0 mm 0% 4 mph 86 % 1025 mb 0 mm/h
Tomorrow 6:00 am
Wetter-Symbol
4° | 4°°C 0 mm 0% 4 mph 86 % 1025 mb 0 mm/h
Tomorrow 9:00 am
Wetter-Symbol
5° | 5°°C 0 mm 0% 4 mph 87 % 1025 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€95,807.42
-2.52%
Ethereum(ETH)
€2,988.09
-4.53%
XRP(XRP)
€2.76
-3.99%
Fesseln(USDT)
€0.96
0.00%
Solana(SOL)
€204.73
-6.92%
USDC(USDC)
€0.96
0.02%
Dogecoin(DOGE)
€0.288686
-7.33%
Shiba Inu(SHIB)
€0.000016
-6.89%
Pepe(PEPE)
€0.000012
-9.07%
Nach oben scrollen