Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign

Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign

November 21, 2024 at 11:57AM

Approximately 2,000 Palo Alto Networks devices have reportedly been compromised due to recently disclosed security vulnerabilities. The flaws, CVE-2024-0012 and CVE-2024-9474, could enable malicious actions. Palo Alto warns that cyber attacks exploiting these weaknesses may rise and urges users to implement security measures and apply updates promptly.

### Meeting Takeaways – Nov 21, 2024

**Subject**: Vulnerability / Cyber Attack

1. **Compromise Overview**: An estimated 2,000 Palo Alto Networks devices have been compromised due to newly disclosed security flaws currently being actively exploited.

2. **Geographical Impact**:
– Most infections reported:
– U.S. – 554
– India – 461
– Other affected countries include Thailand (80), Mexico (48), and Indonesia (43), among others.

3. **Exposed Firewalls**: Censys identified 13,324 publicly exposed next-generation firewall (NGFW) management interfaces, with 34% located in the U.S. Not all exposed hosts are vulnerable.

4. **Vulnerabilities**:
– **CVE-2024-0012**: CVSS score of 9.3 (authentication bypass and privilege escalation).
– **CVE-2024-9474**: CVSS score of 6.9 (authentication bypass and privilege escalation).
– Both flaws can allow unauthorized actions like configuration changes and arbitrary code execution.

5. **Exploitation Activity**:
– The exploitation of these flaws is being tracked under the codename **Operation Lunar Peek**, where attackers aim to achieve command execution and deploy malware (e.g., PHP-based web shells).

6. **Threat Assessment**:
– There’s a moderate to high confidence that a functional exploit chaining these vulnerabilities is publicly available, which could lead to broader cyber threat activities.
– Manual and automated scanning activities related to these vulnerabilities have been observed.

7. **Recommended Actions**:
– Users are urged to apply the latest fixes immediately.
– Secure access to NGFW management interfaces by restricting access to only trusted internal IP addresses, following best deployment practices to prevent external access.

8. **Monitoring and Updates**: Stay informed on threats and updates regarding these vulnerabilities through social media channels and cybersecurity news.

These takeaways highlight the urgent need for vigilance and prompt remediation in response to the identified vulnerabilities in Palo Alto Networks devices.

Full Article