HomeCII/OTCritical Zero-Day Firewall Bug Patched in Palo Alto

Critical Zero-Day Firewall Bug Patched in Palo Alto

Published on

spot_img

Palo Alto Networks (PAN) recently issued a warning to its customers regarding a critical vulnerability in its Expedition firewall interface that is being actively exploited by cybercriminals. This vulnerability marks the fourth security flaw in the tool to come under attack within a span of just one week.

The Expedition firewall management system is a utility used by PAN to help transition new customers from their previous systems to PAN-OS. The latest bug, identified as a critical unauthenticated remote command injection vulnerability (CVE-2024-0012, CVSS 9.3), was highlighted in a security bulletin issued by the company. This bug, which lacks proper authentication checks, poses a serious risk to users.

In response to the threat, PAN has released patches to address the vulnerability. The company has urged customers to update their systems immediately to safeguard against potential exploitation. The security bulletin specifically warns against unauthorized access to firewall management interfaces exposed to the Internet.

The Cybersecurity and Infrastructure Security Agency (CISA) also added this vulnerability to its Known Exploited Vulnerabilities Catalog on November 18, underscoring the severity of the situation. PAN has been actively monitoring the exploit and reaching out to customers who may be at heightened risk due to the vulnerability.

Prior to this latest issue, two separate critical vulnerabilities in the Expedition firewall system were disclosed and added to the KEV list by CISA. These vulnerabilities, an OS command injection flaw (CVE-2024-9463) and an SQL injection flaw (CVE-2024-9465), presented significant risks to users and were swiftly addressed by PAN.

Despite these efforts, cybersecurity experts emphasize the importance of promptly addressing any vulnerabilities in firewall systems. Ray Kelly, a cybersecurity expert, warned that vulnerabilities like OS commanding and SQL injection can have serious consequences if left unchecked.

PAN has reassured customers that its Prisma Access and Cloud NGFW products are not affected by the current vulnerability. Additionally, the company announced last summer that the Expedition system is being phased out and will no longer be supported after January 2025.

With the ongoing threat of cyberattacks targeting vulnerable systems, PAN and other cybersecurity firms are working diligently to ensure the security of their customers. By promptly applying patches and following best practices for system security, users can help mitigate the risks associated with these exploitable vulnerabilities.

Source link

Latest articles

McGraw Hill Data Breach Impacts 13.5 Million Accounts

Data Breach at McGraw Hill: 13.5 Million Accounts Exposed In a significant security incident, McGraw...

Bluesky Experiences Downtime as Users Encounter Access Issues

Widespread Outage Affects Bluesky Users Bluesky, the burgeoning social media platform, is currently facing a...

Insurance Carriers Rethink AI Insurance Coverage

Insurance Carriers Reassess AI Coverage Amid Rising Risks As the landscape of artificial intelligence (AI)...

Automotive Ransomware Attacks Expected to Double by 2025

Ransomware: Increasing Threats to the Automotive Industry Ransomware has been identified as a formidable and...

More like this

McGraw Hill Data Breach Impacts 13.5 Million Accounts

Data Breach at McGraw Hill: 13.5 Million Accounts Exposed In a significant security incident, McGraw...

Bluesky Experiences Downtime as Users Encounter Access Issues

Widespread Outage Affects Bluesky Users Bluesky, the burgeoning social media platform, is currently facing a...

Insurance Carriers Rethink AI Insurance Coverage

Insurance Carriers Reassess AI Coverage Amid Rising Risks As the landscape of artificial intelligence (AI)...