Original Article Text

Click to Toggle View

Palo Alto Networks warns of PAN-OS firewall zero-day used in attacks. Today, Palo Alto Networks warns that an unpatched critical command injection vulnerability in its PAN-OS firewall is being actively exploited in attacks. "Palo Alto Networks is aware of a limited number of attacks that leverage the exploitation of this vulnerability," warns the Palo Alto security bulletin. The flaw, which has been discovered by Volexity and is tracked as CVE-2024-3400, is a command injection vulnerability that received the maximum severity score of 10.0 as it requires no special privileges or user interaction to exploit. The vendor clarified that the issue affects specific versions of PAN-OS software when both the GlobalProtect gateway and device telemetry features are enabled. "A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall," explains the Palo Alto Networks advisory. The vulnerable versions are PAN-OS 10.2, 11.0, and 11.1, and fixes for these versions are expected by April 14, 2024. The vendor will implement hotfixes by Sunday with the release of the following versions: Products like Cloud NGFW, Panorama appliances, and Prisma Access are not affected. An overview of the impact can be seen in the table below: Threat researcher Yutaka Sejiyama reported on X that his scans show there are currently 82,000 exposed devices online that might be vulnerable to CVE-2024-34000, with 40% residing in the United States. BleepingComputer contacted Volexity and Palo Alto Networks with questions on how the zero-day is being exploited. Mitigating CVE-2024-3400 Since CVE-2024-3400 is already under active exploitation, impacted users must apply mitigations immediately to address the risk until security updates are available. The advisory proposes implementing the following measures: Palo Alto Networks devices often become targets of sophisticated threat actors due to their deployment in corporate networks. In August 2022, hackers exploited another zero-day in PAN-OS to carry out amplified TCP denial-of-service (DoS) attacks. This time, the issue is much more severe, and its exploitation would be far more damaging to the targets, so admins must take prompt action to secure their systems.

Daily Brief Summary

CYBERCRIME // Critical Zero-Day in PAN-OS Firewalls Actively Exploited

Palo Alto Networks has issued a warning about a zero-day vulnerability in its PAN-OS firewall software, actively exploited in the wild.

The vulnerability, indexed as CVE-2024-3400, is a severe command injection flaw that allows unauthenticated attackers to execute arbitrary code with root privileges.

This flaw affects specific versions of PAN-OS (10.2, 11.0, and 11.1) when both the GlobalProtect gateway and device telemetry features are enabled.

The vulnerability has a maximum severity score of 10.0 due to its ability to be exploited without special privileges or user interaction.

Remedial actions include implementing mitigations proposed by Palo Alto Networks until security updates are available, with hotfixes expected to release by April 14, 2024.

Approximately 82,000 devices could be vulnerable to this exploit, with around 40% located in the United States.

Non-affected Palo Alto Network products include Cloud NGFW, Panorama appliances, and Prisma Access.