Article Details
Scrape Timestamp (UTC): 2024-04-12 08:59:22.381
Source: https://thehackernews.com/2024/04/zero-day-alert-critical-palo-alto.html
Original Article Text
Click to Toggle View
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack. Palo Alto Networks is warning that a critical flaw impacting its PAN-OS software used in its GlobalProtect gateways is being exploited in the wild. Tracked as CVE-2024-3400, the issue has a CVSS score of 10.0, indicating maximum severity. "A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall," the company said in an advisory published today. The flaw impacts the following versions of PAN-OS, with fixes expected to be released on April 14, 2024 - The company also said that the issue is applicable only to firewalls that have the configurations for both GlobalProtect gateway (Network > GlobalProtect > Gateways) and device telemetry (Device > Setup > Telemetry) enabled. Cybersecurity firm Volexity has been credited with discovering and reporting the bug. While there are no other technical details about the nature of the attacks, Palo Alto Networks acknowledged that it's "aware of a limited number of attacks that leverage the exploitation of this vulnerability." In the interim, it's recommending customers with a Threat Prevention subscription to enable Threat ID 95187 to secure against the threat. The development comes as Chinese threat actors have increasingly relied on zero-day flaws impacting Barracuda Networks, Fortinet, Ivanti, and VMware to breach targets of interest and deploy covert backdoors for persistent access. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.
Daily Brief Summary
Palo Alto Networks issued a warning about a critical flaw (CVE-2024-3400) in its PAN-OS software, receiving a maximum severity score of 10.0.
The vulnerability lies in the GlobalProtect gateways, enabling unauthenticated attackers to execute arbitrary code with root privileges.
This flaw only affects specific PAN-OS versions and configurations involving the GlobalProtect gateway and device telemetry features.
Fixes for the impacted versions are planned for release on April 14, 2024.
Volexity discovered and reported the vulnerability; however, details on the attack methods remain undisclosed.
Palo Alto Networks noted a limited number of attacks exploiting this vulnerability and advises customers with Threat Prevention subscriptions to enable Threat ID 95187 for protection.
Recent trends show Chinese threat actors exploiting similar zero-day flaws in products from Barracuda Networks, Fortinet, Ivanti, and VMware for targeted attacks and persistent access.