Article Details

Scrape Timestamp (UTC): 2024-07-11 15:22:36.893

Source: https://thehackernews.com/2024/07/palo-alto-networks-patches-critical.html

Original Article Text

Click to Toggle View

Palo Alto Networks Patches Critical Flaw in Expedition Migration Tool. Palo Alto Networks has released security updates to address five security flaws impacting its products, including a critical bug that could lead to an authentication bypass. Cataloged as CVE-2024-5910 (CVSS score: 9.3), the vulnerability has been described as a case of missing authentication in its Expedition migration tool that could lead to an admin account takeover. "Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition," the company said in an advisory. "Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue." The flaw impacts all versions of Expedition prior to version 1.2.92, which remediates the problem. Synopsys Cybersecurity Research Center's (CyRC) Brian Hysell has been credited with discovering and reporting the issue. While there is no evidence that the vulnerability has been exploited in the wild, users are advised to update to the latest version to secure against potential threats. As workarounds, Palo Alto Networks is recommending that network access to Expedition is restricted to authorized users, hosts, or networks. Also fixed by the American cybersecurity firm is a newly disclosed flaw in the RADIUS protocol called BlastRADIUS (CVE-2024-3596) that could allow a bad actor with capabilities to perform an adversary-in-the-middle (AitM) attack between Palo Alto Networks PAN-OS firewall and a RADIUS server to sidestep authentication. The vulnerability then permits the attacker to "escalate privileges to 'superuser' when RADIUS authentication is in use and either CHAP or PAP is selected in the RADIUS server profile," it said. The following products are affected by the shortcomings: It also noted that neither CHAP nor PAP should be used unless they are encapsulated by an encrypted tunnel since the authentication protocols do not offer Transport Layer Security (TLS). They are not vulnerable in cases where they are used in conjunction with a TLS tunnel. However, it's worth noting that PAN-OS firewalls configured to use EAP-TTLS with PAP as the authentication protocol for a RADIUS server are also not susceptible to the attack.

Daily Brief Summary

CYBERCRIME // Critical Authentication Flaw Fixed in Palo Alto Networks Tool

Palo Alto Networks has issued updates for five vulnerabilities affecting its products, including a critical authentication bypass.

The most severe bug, tracked as CVE-2024-5910 with a CVSS score of 9.3, affects the Expedition migration tool, enabling potential admin account takeovers.

The vulnerability arises from a lack of authentication in a key function of the Expedition tool, risking data compromise.

Users are strongly advised to upgrade Expedition to version 1.2.92 or later to mitigate the risk and apply suggested workarounds such as restricting network access.

The issue also highlights a vulnerability in the RADIUS protocol known as BlastRADIUS (CVE-2024-3596), facilitating potential adversary-in-the-middle attacks.

The security flaw could allow attackers to elevate privileges to "superuser" under certain conditions when CHAP or PAP protocols are used without adequate encryption.

Palo Alto Networks emphasizes that CHAP and PAP should not be used unless protected by an encrypted tunnel to maintain security integrity.