Article Details
Scrape Timestamp (UTC): 2024-11-07 19:07:25.960
Original Article Text
Click to Toggle View
CISA warns of critical Palo Alto Networks bug exploited in attacks. Today, CISA warned that attackers are exploiting a critical missing authentication vulnerability in Palo Alto Networks Expedition, a migration tool that can help convert firewall configuration from Checkpoint, Cisco, and other vendors to PAN-OS. This security flaw, tracked as CVE-2024-5910, was patched in July, and threat actors can remotely exploit it to reset application admin credentials on Internet-exposed Expedition servers. "Palo Alto Expedition contains a missing authentication vulnerability that allows an attacker with network access to takeover an Expedition admin account and potentially access configuration secrets, credentials, and other data," CISA says. While the cybersecurity agency has yet to provide more details on these attacks, Horizon3.ai vulnerability researcher Zach Hanley released a proof-of-concept exploit in October that can help chain this admin reset flaw with a CVE-2024-9464 command injection vulnerability (patched last month) to gain "unauthenticated" arbitrary command execution on vulnerable Expedition servers. CVE-2024-9464 can be chained with other security flaws (also addressed by Palo Alto Networks in October) to take over firewall admin accounts and hijack PAN-OS firewalls. Admins who can't immediately install security updates to block incoming attacks are advised to restrict Expedition network access to authorized users, hosts, or networks. "All Expedition usernames, passwords, and API keys should be rotated after upgrading to the fixed version of Expedition. All firewall usernames, passwords, and API keys processed by Expedition should be rotated after updating," the company cautions. Palo Alto Networks has yet to update its security advisory to warn customers of ongoing CVE-2024-5910 attacks. CISA also added the vulnerability to its Known Exploited Vulnerabilities Catalog on Thursday. As required by the binding operational directive (BOD 22-01) issued in November 2021, U.S. federal agencies must now secure vulnerable Palo Alto Networks Expedition servers on their networks against attacks within three weeks, by November 28. "These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise," the cybersecurity agency warned.
Daily Brief Summary
CISA warns that a critical vulnerability in Palo Alto Networks Expedition is currently being exploited by attackers.
The security flaw, identified as CVE-2024-5910, allows attackers to reset admin credentials on exposed Expedition servers remotely.
Palo Alto Networks fixed the vulnerability in July, but it remains a target for cyber attacks, possibly compromising firewall configurations and other sensitive data.
Horizon3.ai released a proof-of-concept in October that could chain CVE-2024-5910 with another vulnerability, CVE-2024-9464, enabling arbitrary command execution on affected systems.
Palo Alto Networks advises updating Expedition to the latest version and suggests rotating all admin credentials post-update.
CISA has placed CVE-2024-5910 in its Known Exploited Vulnerabilities Catalog and mandates U.S. federal agencies to secure their servers against this exploit by November 28.
This directive underlines the high risk these vulnerabilities present to federal operations and the urgency of securing potentially compromised systems.