
The Download
Palo Alto Networks has issued a warning about critical vulnerabilities in its migration software called Palo Alto Networks Expedition solutions. Successful exploit of the flaws can lead to disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls. The bugs include a combination of cross-site scripting (XSS) flaws, command injection, SQL injection, and missing authentication. The vulnerabilites disclosed are:
CVE-2024-9463 (unauthenticated command injection vulnerability)
CVE-2024-9464 (authenticated command injection vulnerability)
CVE-2024-9465 (unauthenticated SQL injection vulnerability)
CVE-2024-9466 (cleartext credentials stored in logs)
CVE-2024-9467 (unauthenticated reflected XSS vulnerability)
What You Can Do
IT administrators should prioritize applying the latest patches provided by Palo Alto Networks to mitigate these vulnerabilities. Administrators should also enforce strong access control measures, monitor network traffic for any unusual activity, and review firewall logs regularly to detect any signs of exploitation attempts. In addition to your attack surface management external scan, pentesting your firewall can determine the existence of these vulnerabilities.
Use ThreatMate pen testing today to find out if you are vulnerable to attack.
To Learn More: