EDIT: This remediation is outdated, and organisations are instructed to follow the advice in the High Severity Cyber Alert CC-4578
Summary
EDIT: This remediation is outdated, and organisations are instructed to follow the advice in the High Severity Cyber Alert CC-4578
Affected platforms
The following platforms are known to be affected:
Threat details
Introduction
Palo Alto has issued a critical severity security bulletin for an unauthenticated remote command execution vulnerability affecting the management interface for firewall devices.
The vulnerability is still under investigation by Palo Alto but has not yet received a CVE designation. Palo Alto has tentatively given the vulnerability an initial CVSSv4 score of 9.3. However, if access to the management interface is restricted to trusted internal IP addresses, the CVSSv4 score is reduced to 7.5.
Remediation advice
EDIT: This remediation is outdated, and organisations are instructed to follow the advice in the High Severity Cyber Alert CC-4578
Affected organisations are encouraged to review the Palo Alto Security Bulletin PAN-SA-2024-0015 and verify that the management interface is configured correctly. Palo Alto has not released security updates but advise customers follow their guidance on securing access to the management interface to reduce the risk of exploitation.
For best practice deployment guidelines, follow the steps in Palo Alto's blog How to Secure the Management Access of Your Palo Alto Networks Device and ensure that access to the management interface is possible only from trusted internal IP addresses and not from the Internet.
Remediation steps
Definitive source of threat updates
Last edited: 18 November 2024 5:06 pm