Attackers are exploiting 2 zero-days in Palo Alto Networks firewalls (CVE-2024-0012, CVE-2024-9474)

Teilen:

Palo Alto Networks has released fixes for two vulnerabilities (CVE-2024-0012 and CVE-2024-9474) in its next-generation firewalls that have been exploited by attackers as zero-days.

About the vulnerabilities (CVE-2024-0012, CVE-2024-9474)

CVE-2024-0012 stems from missing authentication for a critical function and allows unauthenticated attackers with network access to the management web interface “to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474,” according to Palo Alto Networks.

CVE-2024-0012 is the (previously unspecified) unauthenticated remote command execution zero-day that the company started warning about ten days ago, after urging customers to appropriately configure and secure access to firewall management interfaces exposed to the internet.

CVE-2024-9474 is an OS command injection flaw that allows a PAN-OS administrator with access to the management web interface to escalate their privileges and perform actions on the firewall with root privileges.

The company’s product security researchers pinpointed the vulnerabilities based on observed threat activity.

Cloud NGFW and Prisma Access are not impacted by these flaws.

Exploitation detection and remediation

The company’s incident responders are tracking the initial exploitation of CVE-2024-0012 under the name Operation Lunar Peek.

“Palo Alto Networks has identified threat activity targeting a limited number of device management web interfaces. This activity has primarily originated from IP addresses known to proxy/tunnel traffic for anonymous VPN services,” they explained in a separate threat brief, which also provides indicators of compromise.

“Observed post-exploitation activity includes interactive command execution and dropping malware, such as webshells, on the firewall.”

Limiting access to the management interface only to trusted internal IP addresses or a specified jump box reduces the risk of exploitation, but upgrading to a fixed version of the OS should be prioritized.

Both vulnerabilities have been fixed in PAN-OS 10.2.12-h2, PAN-OS 11.0.6-h1, PAN-OS 11.1.5-h1, PAN-OS 11.2.4-h1, and all later PAN-OS versions. CVE-2024-9474 has additionally been addressed in PAN-OS 10.1.14-h6.

“If your management web interface was exposed to the internet, then we advise you to closely monitor your network for suspicious threat activity, such as unrecognized configuration changes or suspicious users. We are scanning Telemetry data and customer uploaded tech support files (TSF) for evidence of threat activity and updating the case notes accordingly,” Palo Alto says.

Customers who find evidence of compromise are advised to take the affected devices offline and contact the company’s Global Customer Support to schedule a forced Enhanced Factory Reset (EFR). Further action will be required by the customers to finalize the clean-up.

UPDATE (November 19, 2024, 03:25 a.m. ET):

Censys has identified 13,324 publicly exposed – but not necessarily vulnerable – NGFW management interfaces.

“A large proportion of these (34%) are geolocated in the United States. Censys observed about 8% of the exposed instances to be associated with Amazon (ASN 16509),” the company said.

UPDATE (November 19, 2024, 07:40 a.m. ET):

WatchTowr researchers have published an analysis of how the two bugs can be concatenated to achieve unauthenticated remote code execution.

They’ve refrained from publishing a PoC exploit, but they have released a Nuclei template that admins can use to check if their hosts are affected.

Zeljka Zorz

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
2:37 am, Feb. 4, 2025
Wetter-Symbol 7°C
L: 6° | H: 7°
wenige Wolken
Luftfeuchtigkeit: 91 %
Druck: 1023 mb
Wind: 7 mph SSW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 20%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 7:34 am
Sonnenuntergang: 4:54 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
6° | 7°°C 0.2 mm 20% 15 mph 93 % 1026 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
4° | 8°°C 0 mm 0% 9 mph 86 % 1045 mb 0 mm/h
Do. Feb. 06 9:00 pm
Wetter-Symbol
2° | 8°°C 0 mm 0% 9 mph 86 % 1046 mb 0 mm/h
Fr. Feb. 07 9:00 pm
Wetter-Symbol
2° | 6°°C 0 mm 0% 12 mph 92 % 1041 mb 0 mm/h
Sa. Feb. 08 9:00 pm
Wetter-Symbol
1° | 4°°C 0.35 mm 35% 10 mph 89 % 1030 mb 0.15 mm/h
Today 3:00 am
Wetter-Symbol
5° | 7°°C 0 mm 0% 6 mph 91 % 1023 mb 0 mm/h
Today 6:00 am
Wetter-Symbol
6° | 6°°C 0 mm 0% 9 mph 93 % 1023 mb 0 mm/h
Today 9:00 am
Wetter-Symbol
7° | 7°°C 0 mm 0% 11 mph 91 % 1022 mb 0 mm/h
Today 12:00 pm
Wetter-Symbol
10° | 10°°C 0 mm 0% 13 mph 75 % 1022 mb 0 mm/h
Today 3:00 pm
Wetter-Symbol
9° | 9°°C 0 mm 0% 15 mph 76 % 1021 mb 0 mm/h
Today 6:00 pm
Wetter-Symbol
10° | 10°°C 0.2 mm 20% 12 mph 88 % 1022 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
8° | 8°°C 0.2 mm 20% 10 mph 74 % 1026 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
6° | 6°°C 0 mm 0% 9 mph 82 % 1030 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€97,791.65
8.15%
Ethereum(ETH)
€2,747.45
15.20%
XRP(XRP)
€2.67
31.29%
Fesseln(USDT)
€0.97
0.03%
Solana(SOL)
€211.40
17.20%
USDC(USDC)
€0.97
0.00%
Dogecoin(DOGE)
€0.275336
24.30%
Shiba Inu(SHIB)
€0.000015
26.23%
Pepe(PEPE)
€0.000011
20.64%
Nach oben scrollen