Skip to main content

Palo Alto Releases Critical Security Bulletin for Firewall Devices

EDIT: This remediation is outdated, and organisations are instructed to follow the advice in the High Severity Cyber Alert CC-4578

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

EDIT: This remediation is outdated, and organisations are instructed to follow the advice in the High Severity Cyber Alert CC-4578


Affected platforms

The following platforms are known to be affected:

Threat details

This Cyber Alert has been superceded by CC-4578

The information in this Cyber Alert is outdated, the description of the vulnerability and the remediation has changed. Organisations must follow the remediation advice in CC-4578.


Introduction

Palo Alto has issued a critical severity security bulletin for an unauthenticated remote command execution vulnerability affecting the management interface for firewall devices. 

The vulnerability is still under investigation by Palo Alto but has not yet received a CVE designation. Palo Alto has tentatively given the vulnerability an initial CVSSv4 score of 9.3. However, if access to the management interface is restricted to trusted internal IP addresses, the CVSSv4 score is reduced to 7.5. 

Probable exploitation of unauthenticated RCE vulnerability

Palo Alto Networks has observed threat activity exploiting firewall management interfaces exposed to the internet and is preparing to release fixes and threat prevention signatures.


Remediation advice

EDIT: This remediation is outdated, and organisations are instructed to follow the advice in the High Severity Cyber Alert CC-4578


Affected organisations are encouraged to review the Palo Alto Security Bulletin PAN-SA-2024-0015 and verify that the management interface is configured correctly. Palo Alto has not released security updates but advise customers follow their guidance on securing access to the management interface to reduce the risk of exploitation.

For best practice deployment guidelines, follow the steps in Palo Alto's blog How to Secure the Management Access of Your Palo Alto Networks Device and ensure that access to the management interface is possible only from trusted internal IP addresses and not from the Internet.


Remediation steps

Type Step
Action

To find assets that require remediation action, visit the Assets section of Customer Support Portal at https://support.paloaltonetworks.com (Products → Assets → All Assets → Remediation Required).


Action

Devices with an internet-facing management interface discovered in Palo Alto's scans are tagged with PAN-SA-2024-0015. If no such devices are listed, it indicates their scan did not find any devices with internet-facing management interface for your account.​​



Last edited: 18 November 2024 5:06 pm