Friday, November 15

CISA cautions of more Palo Alto Networks bugs made use of in attacks

CISA cautioned today that 2 more important security vulnerabilities in Palo Alto Networks’ Expedition migration tool are now actively made use of in the wild.

Attackers can utilize the 2 unauthenticated command injection (CVE-2024-9463) and SQL injection (CVE-2024-9465) vulnerabilities to hack into unpatched systems running the business’s Expedition migration tool, which assists move setups from Checkpoint, Cisco, and other supported suppliers.

While CVE-2024-9463 permits aggressors to run approximate OS commands as root, exposing usernames, cleartext passwords, gadget setups, and gadget API secrets of PAN-OS firewall programs, the 2nd defect can be made use of to gain access to Expedition database contents (consisting of password hashes, usernames, gadget setups, and gadget API secrets) and develop or check out approximate files on susceptible systems.

Palo Alto Networks is delivering security updates attending to these concerns in Expedition 1.2.96 and later on. The business encourages admins who can’t instantly upgrade the software application to limit Expedition network access to licensed users, hosts, or networks.

“Multiple vulnerabilities in Palo Alto Networks Expedition permit an enemy to check out Expedition database contents and approximate files, along with compose approximate files to momentary storage areas on the Expedition system,” Palo Alto Networks included a security advisory released in early October that still requires to be upgraded to alert consumers that assailants are making use of these vulnerabilities in the wild.

“Combined, these consist of details such as usernames, cleartext passwords, gadget setups, and gadget API secrets of PAN-OS firewall programs.”

“All Expedition usernames, passwords, and API secrets need to be turned after updating to the repaired variation of Expedition. All firewall software usernames, passwords, and API secrets processed by Expedition must be turned after upgrading,” it included, stating that these security defects do not impact its firewall software, Panorama, Prisma Access, and Cloud NGFW items.

Federal companies purchased to spot within 3 weeks

On Thursday, CISA included the 2 vulnerabilities to its Known Exploited Vulnerabilities Catalog, buying federal companies to spot Palo Alto Networks Expedition servers on their networks within 3 weeks, by December 5, as needed by the binding functional instruction (BOD 22-01).

One week back, the cybersecurity company alerted of another Expedition security defect– an important missing out on authentication vulnerability (CVE-2024-5910) covered in July that can let risk stars reset application admin qualifications– actively abused in attacks.

Despite the fact that CISA has yet to offer more details on these continuous attacks, proof-of-concept make use of code launched by Horizon3.ai vulnerability scientist Zach Hanley last month can assist chain CVE-2024-5910 with another command injection vulnerability (CVE-2024-9464) covered in October to get “unauthenticated” approximate command execution on susceptible and Internet-exposed Expedition servers.

CVE-2024-9464 can be chained with other Expedition defects (likewise attended to last month) to take control of firewall program admin accounts and pirate unpatched PAN-OS firewall programs.

ยป …
Learn more