Palo Alto Networks has issued a critical security advisory regarding a potential remote code execution (RCE) vulnerability affecting the PAN-OS management interface of their next-generation firewalls.
The advisory, released on November 8, 2024, warns customers to restrict access to their firewall management interfaces due to this unconfirmed security threat.
While specific details about the vulnerability are still under investigation, Palo Alto Networks has emphasized that they actively monitor for signs of exploitation. At present, no active exploitation has been detected.
However, the company strongly recommends that customers ensure their management interface access is configured correctly, following best practice deployment guidelines.
Attend a Free Webinar on How to Maximize Cybersecurity Program ROI
Shadowserver has conducted scans to identify exposed PAN-OS management interfaces. Alarmingly, approximately 11,000 IP addresses with exposed management interfaces have been discovered.
This significant number of potentially vulnerable systems underscores the urgency of implementing proper security measures.
Palo Alto Networks advises customers to limit access to the management interface to trusted internal IP addresses only and not expose it to the internet. The company believes that Prisma Access and cloud NGFW are unaffected by this potential vulnerability.
To mitigate the risk, administrators are encouraged to take several precautionary measures:
Customers using Cortex Xpanse and Cortex XSIAM with the ASM module can investigate internet-exposed instances by reviewing alerts generated by the Palo Alto Networks Firewall Admin Login attack surface rule.
Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!
A newly discovered malware campaign is targeting Docker environments, employing a sophisticated, multi-layered obfuscation technique…
The pace of technological change in today’s business environment is unprecedented. Organizations are racing to…
Cyber risk appetite represents the amount and type of cyber risk an organization is willing…
A new campaign by Russian threat actors. These actors are exploiting legitimate Microsoft OAuth 2.0…
Security researchers at Fortinet's FortiGuard Labs have uncovered a sophisticated phishing campaign that uses weaponized…
British retail giant Marks & Spencer (M&S) has confirmed it is dealing with a significant…