PAN-demonium: Palo Alto Networks Hit by Fourth Firewall Flaw in a Week!

Palo Alto Networks warns of a critical unauthenticated remote code execution bug in its Expedition firewall interface, under active attack. This marks the fourth vulnerability in a week. PAN urges users to patch immediately and limit access to trusted internal IPs, as over 8,700 systems remain exposed to the internet.

Pro Dashboard

Hot Take:

Looks like Palo Alto Networks is throwing a bug bash party and everyone’s invited! Just when you thought your firewall was safe, cybercriminals are RSVPing to the latest vulnerability extravaganza. It’s high time they hire a cybersecurity bouncer to keep these uninvited guests out!

Key Points:

  • Palo Alto Networks has identified a critical remote code execution (RCE) vulnerability in its Expedition firewall interface.
  • This marks the fourth vulnerability in the tool under active attack in just a week.
  • The zero-day flaw, CVE-2024-0012, stems from a missing authentication check and has a CVSS score of 9.3.
  • PAN has issued patches and advises restricting access to management interfaces from the public Internet.
  • The company plans to phase out Expedition by January 2025.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?