PAN-demonium: Palo Alto Networks Hit by Fourth Firewall Flaw in a Week!
Palo Alto Networks warns of a critical unauthenticated remote code execution bug in its Expedition firewall interface, under active attack. This marks the fourth vulnerability in a week. PAN urges users to patch immediately and limit access to trusted internal IPs, as over 8,700 systems remain exposed to the internet.

Hot Take:
Looks like Palo Alto Networks is throwing a bug bash party and everyone’s invited! Just when you thought your firewall was safe, cybercriminals are RSVPing to the latest vulnerability extravaganza. It’s high time they hire a cybersecurity bouncer to keep these uninvited guests out!
Key Points:
- Palo Alto Networks has identified a critical remote code execution (RCE) vulnerability in its Expedition firewall interface.
- This marks the fourth vulnerability in the tool under active attack in just a week.
- The zero-day flaw, CVE-2024-0012, stems from a missing authentication check and has a CVSS score of 9.3.
- PAN has issued patches and advises restricting access to management interfaces from the public Internet.
- The company plans to phase out Expedition by January 2025.
Already a member? Log in here