Mystery Palo Alto Networks hijack-my-firewall zero-day now officially under exploit

Mystery Palo Alto Networks hijack-my-firewall zero-day now officially under exploit

November 15, 2024 at 04:19PM

Palo Alto Networks’ firewall management interface has a critical zero-day vulnerability, allowing remote code execution by unauthenticated attackers. With a CVSS rating of 9.3, it currently lacks a patch. Users are advised to restrict access to the interface. Other vulnerabilities have been identified, with fixes available.

### Meeting Takeaways

1. **Critical Zero-Day Vulnerability**:
– A vulnerability in Palo Alto Networks’ firewall management interface is under active exploitation.
– Vulnerability characteristics:
– No CVE number assigned.
– Rated 9.3/10 on CVSSv4.0.
– Requires no user interaction or privileges; considered low complexity.

2. **Exploitation Risks**:
– Unauthorized remote code execution could allow attackers to control compromised firewalls.
– Attackers must have access to the management interface, either internally or over the internet.

3. **Immediate Actions Required**:
– Customers must restrict access to the management interface to trusted internal IP addresses only.
– No access should be allowed from the open internet until a patch is released.
– Securing the management interface is currently the most effective protective measure.

4. **Vendor Update**:
– Palo Alto Networks is working on fixes and threat prevention signatures.
– There have been added security measures urged by the vendor after discovering the vulnerability.

5. **Affected Products**:
– Neither Prisma Access nor Cloud NGFW are affected by this vulnerability.

6. **Identification of Vulnerable Devices**:
– Customers are advised to check the customer support portal for devices with internet-facing management interfaces.
– Devices tagged with “PAN-SA-2024-0015” indicate those that need remediation.
– Caution is advised, as the list of potentially vulnerable devices may not be exhaustive.

7. **Additional Vulnerabilities**:
– The US government’s Cybersecurity and Infrastructure Security Agency (CISA) added two other vulnerabilities to its Known Exploited Vulnerabilities Catalog:
– **CVE-2024-9463**: A critical OS command injection vulnerability with a CVSS score of 9.9, allowing unauthorized access to sensitive information.
– **CVE-2024-9465**: A SQL injection vulnerability rated 9.2, which can disclose database contents.

8. **Next Steps**:
– Continue monitoring the situation for further updates from Palo Alto Networks.
– Follow best practices for network hardening as advised by the vendor.

Full Article