• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
zero day alert: critical palo alto networks pan os flaw under active

Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack

You are here: Home / General Cyber Security News / Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
April 12, 2024

Palo Alto Networks is warning that a critical flaw impacting its PAN-OS software employed in its GlobalProtect gateways is remaining exploited in the wild.

Tracked as CVE-2024-3400, the issue has a CVSS rating of 10., indicating most severity.

“A command injection vulnerability in the GlobalProtect function of Palo Alto Networks PAN-OS software package for distinct PAN-OS variations and unique element configurations might empower an unauthenticated attacker to execute arbitrary code with root privileges on the firewall,” the company reported in an advisory revealed now.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The flaw impacts the subsequent variations of PAN-OS, with fixes predicted to be unveiled on April 14, 2024 –

  • PAN-OS < 11.1.2-h3
  • PAN-OS < 11.0.4-h1
  • PAN-OS < 10.2.9-h1

The company also said that the issue is relevant only to firewalls that have the configurations for both of those GlobalProtect gateway (Network > GlobalProtect > Gateways) and system telemetry (Product > Set up > Telemetry) enabled.

Cybersecurity

Cybersecurity firm Volexity has been credited with finding and reporting the bug.

Though there are no other specialized aspects about the nature of the attacks, Palo Alto Networks acknowledged that it is really “informed of a minimal quantity of attacks that leverage the exploitation of this vulnerability.”

In the interim, it truly is recommending consumers with a Danger Avoidance membership to allow Danger ID 95187 to protected in opposition to the risk.

The progress arrives as Chinese menace actors have significantly relied on zero-day flaws impacting Barracuda Networks, Fortinet, Ivanti, and VMware to breach targets of fascination and deploy covert backdoors for persistent entry.

Identified this report exciting? Comply with us on Twitter  and LinkedIn to study more exclusive content we publish.


Some components of this write-up are sourced from:
thehackernews.com

Previous Post: «sneaky credit card skimmer disguised as harmless facebook tracker Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker
Next Post: Iranian MuddyWater Hackers Adopt New C2 Tool ‘DarkBeatC2’ in Latest Campaign iranian muddywater hackers adopt new c2 tool 'darkbeatc2' in latest»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.