Palo Alto Networks warns of critical RCE zero-day exploited in attacks

Teilen:

Palo Alto Networks is warning that a critical zero-day vulnerability on Next-Generation Firewalls (NGFW) management interfaces, currently tracked as ‘PAN-SA-2024-0015,’ is actively being exploited in attacks.

Update 11/18 – Palo Alto Networks released a new advisory about this issue and assigned it the identifier CVE-2024-0012.

The flaw was originally disclosed on November 8, 2024, with Palo Alto Networks warning customers to restrict access to their next-generation firewalls because of a “potential” remote code execution (RCE) vulnerability impacting them.

No signs of exploitation were detected at that time, but now, one week later, the situation has changed.

“Palo Alto Networks has observed threat activity exploiting an unauthenticated remote command execution vulnerability against a limited number of firewall management interfaces which are exposed to the Internet,” warns an update on the advisory page.

“At this time, we believe devices whose access to the Management Interface is not secured as per our recommended best practice deployment guidelines are at increased risk,” warns the vendor in the same bulletin.

The vulnerability, rated with a CVSS v4.0 score of 9.3 (“critical”), is remotely exploitable and requires no authentication or user interaction.

Once an internet-exposed interface is detected, the attacker can send a specially crafted request to gain unauthorized control over the firewall, potentially enabling them to alter rules, redirect or intercept network traffic, and turn off security protections.

Unfortunately, the vendor does not have sufficient information to formulate a useful list of indicators of compromise at this time, but suggested the following mitigation steps:

  • Configure access to the firewall management interface so it is only accessible from trusted internal IP addresses.
  • Block all internet access to the management interface to prevent exploitation.
  • Place the management interface behind a secured network or VPN to ensure access is controlled and authenticated.
  • Review and implement the security guidelines found here.

Despite the dangerous RCE bug being discovered a week ago, Palo Alto Networks has not yet made security updates available to impacted clients.

“At this time, securing access to the management interface is the best recommended action,” says Palo Alto Networks.

“As we investigate the threat activity, we are preparing to release fixes and threat prevention signatures as early as possible.”

Threat monitoring platform The Shadowserver Foundation reported earlier today that it sees approximately 8,700 exposed interfaces.

Tweet

Threat researcher Yutaka Sejiyama conducted his own scans on Shodan and told BleepingComputer that he observed 11,180 IP addresses exposed online associated with the Palo Alto management interface.

“As you know, the results from Shodan are not real-time information. However, during my investigation three days ago, I confirmed that 11,180 of these IPs were actually online,” Sejiyama told BleepingComputer.

According to Shodan, most of the devices are located in the United States, followed by India, Mexica, Thailand, and Indonesia.

Shodan map of exposed Palo Alto management interfaces
Shodan map of exposed Palo Alto management interfaces
Source: Shodan

To ensure that you have applied the mitigations properly, visit the Assets section of the Palo Alto Networks Customer Support Portal to find a list of devices with Internet-facing management interfaces, and look for devices tagged with ‘PAN-SA-2025-0015.’

If none showed up, the scan did not detect any internet-exposed management interfaces. If they do, admins should use the steps mentioned to secure devices.

Bill Tolaus

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
4:37 am, Juli 14, 2025
Wetter-Symbol 19°C
L: 17° | H: 20°
wenige Wolken
Luftfeuchtigkeit: 77 %
Druck: 1011 mb
Wind: 6 mph S
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 20%
Regen Chance: 0%
Sichtbarkeit: 9 km
Sonnenaufgang: 4:59 am
Sonnenuntergang: 9:12 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
17° | 20°°C 0 mm 0% 18 mph 78 % 1015 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
15° | 20°°C 1 mm 100% 15 mph 78 % 1016 mb 0 mm/h
Mi. Juli 16 10:00 pm
Wetter-Symbol
14° | 27°°C 0.2 mm 20% 14 mph 73 % 1017 mb 0 mm/h
Do. Juli 17 10:00 pm
Wetter-Symbol
18° | 26°°C 1 mm 100% 8 mph 80 % 1017 mb 0 mm/h
Fr. Juli 18 10:00 pm
Wetter-Symbol
19° | 30°°C 0 mm 0% 12 mph 79 % 1015 mb 0 mm/h
Today 7:00 am
Wetter-Symbol
17° | 18°°C 0 mm 0% 9 mph 78 % 1011 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
20° | 20°°C 0 mm 0% 11 mph 60 % 1012 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
23° | 23°°C 0 mm 0% 15 mph 39 % 1013 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
25° | 25°°C 0 mm 0% 18 mph 28 % 1013 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
22° | 22°°C 0 mm 0% 15 mph 30 % 1013 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
19° | 19°°C 0 mm 0% 9 mph 45 % 1015 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 8 mph 61 % 1016 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
15° | 15°°C 0 mm 0% 8 mph 72 % 1016 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€102,634.71
1.82%
Ethereum(ETH)
€2,580.87
2.02%
XRP(XRP)
€2.50
5.37%
Fesseln(USDT)
€0.86
0.00%
Solana(SOL)
€142.38
3.21%
USDC(USDC)
€0.86
0.00%
Dogecoin(DOGE)
€0.173133
2.17%
Shiba Inu(SHIB)
€0.000012
3.06%
Pepe(PEPE)
€0.000011
3.75%
Peanut das Eichhörnchen(PNUT)
€0.244556
5.81%
Nach oben scrollen