Wednesday, January 15

CISA cautions of more Palo Alto Networks bugs made use of in attacks

videobacks.net

CISA cautioned that 2 more important in Palo Alto ' are now actively made use of in wild.

Attackers can utilize the 2 unauthenticated (CVE--9463) and SQL injection (CVE-2024-9465) vulnerabilities to into unpatched the ' Expedition migration tool, which move setups from , Cisco, and other supported .

While CVE-2024-9463 permits aggressors to approximate root, exposing usernames, cleartext , setups, and gadget API of PAN-OS , the 2nd defect can be made use of to to Expedition contents (consisting of hashes, usernames, gadget setups, and gadget API secrets) and develop or out approximate susceptible systems.

Palo Alto Networks is delivering attending to these in Expedition 1.2.96 and later on. The business encourages who can' instantly the to Expedition to licensed , , or networks.

“Multiple vulnerabilities in Palo Alto Networks Expedition permit an enemy to check out Expedition database contents and approximate files, along with compose approximate files to momentary on the Expedition ,” Palo Alto Networks included security in early that still requires to be to alert that assailants are making use of these vulnerabilities in the wild.

“Combined, these consist of such as usernames, cleartext passwords, gadget setups, and gadget API secrets of PAN-OS firewall programs.”

Expedition usernames, passwords, and API secrets to be turned after updating to the repaired variation of Expedition. All firewall usernames, passwords, and API secrets processed by Expedition must be turned after upgrading,” included, stating that these security do its firewall software, Panorama, Access, and NGFW .

purchased to within 3 weeks

On , CISA included the 2 vulnerabilities to its Catalog, buying federal companies to spot Palo Alto Networks Expedition on their networks within 3 weeks, by , as needed by the binding functional instruction (BOD 22-).

One , the alerted of another Expedition security defect– an important out on (CVE-2024-5910) covered in that can let admin – actively abused in .

Despite the fact that CISA has yet to more details on these continuous attacks, -of- use of launched by Horizon3. vulnerability Hanley last month can chain CVE-2024-5910 with another vulnerability (CVE-2024-9464) covered in October to get “unauthenticated” approximate command on susceptible and -exposed Expedition servers.

CVE-2024-9464 can be chained with other Expedition defects (likewise attended to last month) to take of firewall and unpatched PAN-OS firewall programs.

ยป …
Learn more

videobacks.net