Skip to content

2024-117: Zero-Day Vulnerabilities in Palo Alto Networks PAN-OS

Table of Contents

Palo Alto Networks released security updates for two actively exploited zero-day vulnerabilities in Palo Alto Networks PAN-OS. If exploited, these vulnerabilities could allow a remote unauthenticated attacker to gain administrator privileges, or a PAN-OS administrator to perform actions on the firewall with root privileges.
It recommended applying the updates and restricting the access to the management web interface to only trusted internal IP addresses, according to the vendor's best practice deployment guidelines.


Security Update for Palo Alto Networks PAN-OS

Security Update for Palo Alto Networks PAN-OS

History: 19/11/2024 --- v1.0 -- Initial publication

Summary

Palo Alto Networks released security updates for two actively exploited zero-day vulnerabilities in Palo Alto Networks PAN-OS. If exploited, these vulnerabilities could allow a remote unauthenticated attacker to gain administrator privileges, or a PAN-OS administrator to perform actions on the firewall with root privileges [1], [2].It recommended applying the updates and restricting the access to the management web interface to only trusted internal IP addresses, according to the vendor's best practice deployment guidelines [3].

Technical Details

The vulnerability CVE-2024-0012, with a CVSS score of 9.3, is an authentication bypass flaw in Palo Alto Networks PAN-OS software. It enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 [1].

The vulnerability CVE-2024-9474, with a CVSS score of 6.9, is a privilege escalation flaw in Palo Alto Networks PAN-OS software. It allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges [2].

Affected Products

The following PAN-OS versions are affected by CVE-2024-0012 and CVE-2024-9474:

  • PAN-OS 11.2 before 11.2.4-h1
  • PAN-OS 11.1 before 11.1.5-h1
  • PAN-OS 11.0 before 11.0.6-h1
  • PAN-OS 10.2 before 10.2.12-h2

The PAN-OS 10.1 versions before 10.1.14-h6 are also affected by CVE-2024-9474.

Recommendations

CERT-EU recommends applying updates to the affected devices as soon as possible. It is also strongly recommended restricting access to the management web interface.

References


MITRE ATT&CK Matrix Advisory

MITRE ATT&CK Matrix from Advisory

Advisory Date: 19/11/2024

Threat Actor Groups

Based on the available data, specific threat actor groups have not been identified. However, the threat actors are categorized as capable remote unauthenticated attackers and privileged administrators within the organization.

Enterprise Layer

Tactic Technique Sub-Technique Mitigation
Initial Access T1190 - Exploit Public-Facing Application N/A Update Software, Restrict Web Interface Access
Privilege Escalation T1068 - Exploitation For Privilege Escalation N/A Update Software
Defense Evasion T1078 - Valid Accounts N/A Update Software, Multifactor Authentication

Mobile Layer

The advisory did not pertain to mobile-specific vulnerabilities or attack vectors.

ICS Layer

The advisory did not pertain to Industrial Control System-specific vulnerabilities or attack vectors.

Mitigation Techniques

  • Apply security updates as recommended by the vendor.
  • Follow best practice deployment guidelines by restricting the management web interface access to trusted internal IP addresses.

References

Palo Alto Networks Advisory for CVE-2024-0012

Palo Alto Networks Advisory for CVE-2024-9474

Vendor's Best Practice Deployment Guidelines


This post was generated entirely by an AI language model. Source: CERT EU

Latest

Modern zsarolóvírusok

Modern zsarolóvírusok

A Magyar Védelmi Beszerzési Ügnynökséget az INC Ransom csoport támadta és zsarolta meg 2024. októberében. Az elmúlt időszakban megszaporodtak azok a magyarországi zsarolóvírus támadások, amelyek során az INC és a vele csaknem 71%-ban azonos Lynx zsarolóvírusokat használták a támadók.

Members Public