Palo Alto Updates Remediation for Max-Critical Firewall Bug

Palo Alto Updates Remediation for Max-Critical Firewall Bug

April 26, 2024 at 04:05PM

Palo Alto Networks shares important update on a critical vulnerability (CVE-2024-3400) with a severity score of 10/10. Exploitable on PAN-OS 10.2, 11.0, and 11.1, the flaw allows unauthenticated threat actors to execute arbitrary code. PAN recommends upgrading to fixed PAN-OS versions and taking specific actions based on suspected activity for full mitigation.

Key takeaways from the meeting notes:

– Palo Alto Networks (PAN) is addressing a critical vulnerability (CVE-2024-3400) actively being exploited.
– The vulnerability has a severity score of 10/10 and allows unauthenticated threat actors to execute arbitrary code with root privileges on the firewall device.
– The affected PAN-OS versions are 10.2, 11.0, and 11.1.
– PAN recommends upgrading to fixed versions such as PAN-OS 10.2.9-h1, 11.0.4-h1, and 11.1.2-h3, or later versions to fully protect devices.
– Additional hotfixes have been released for other maintenance releases.
– Customers are advised to take specific mitigation actions based on suspected activity, including updating to the latest PAN-OS hotfix and securing running-configs by creating a master key and electing AES-256-GCM.
– PAN-OS hotfixes are deemed sufficient to fix the vulnerability, and private data reset or factory reset is not suggested unless certain conditions, such as file copying or evidence of interactive command execution, are met.

Let me know if you need any further assistance!

Full Article