Urgent Alert: CISA Uncovers Two Critical Security Flaws in Palo Alto – Act Now to Protect Your Systems!

N-Ninja
3 Min Read

“`html



  • CISA Alerts on Exploited Vulnerabilities in Palo Alto Software
  • New Flaws Added to KEV Catalog, Urging⁤ Federal‌ Agencies to Act
  • Exploits Can Lead to Data ⁤Theft and Unauthorized ​File Creation

The Cybersecurity and Infrastructure Security Agency (CISA) of the United States has recently included two vulnerabilities in its Known Exploited‍ Vulnerabilities (KEV) catalog, indicating that these flaws ⁤are currently⁣ being exploited‌ by malicious actors.

These vulnerabilities ‌were identified within the Expedition migration tool developed by⁣ Palo Alto⁣ Networks, which has⁢ previously been associated with another vulnerability now listed in the KEV catalog.

The newly‌ identified ⁢issues include an unauthenticated command injection vulnerability (CVE-2024-9463) and an SQL injection flaw (CVE-2024-9465). The ‌command injection flaw permits attackers to execute arbitrary commands with root ⁣privileges on the ⁤operating system. This access can expose sensitive information such as usernames, ⁤passwords in plaintext, ⁣device configurations, and API keys for PAN-OS firewalls.⁢ Conversely, the SQL injection vulnerability allows unauthorized ⁤users to access the Expedition database where they can find password hashes, usernames, device​ configurations,‍ and API ​keys. Additionally, this flaw enables attackers to read or create⁢ files at will on the affected system.

Urgent⁢ Patching Required

A patch is reportedly⁣ available for immediate implementation. Users concerned ​about potential exploitation should upgrade their Expedition tool to version 1.2.96 or later‍ without delay. For ⁣those unable to apply this update right away, Palo Alto Networks recommends limiting‍ network access for Expedition exclusively to authorized users or networks.

The inclusion of a vulnerability in the KEV catalog ⁤signifies not only its active ⁤exploitation but also‌ imposes a deadline for federal agencies—typically 21 days from listing—to either‍ patch⁤ their ‌systems or discontinue use of vulnerable software.

CISA has also recently added CVE-2024-5910 into its KEV list; this particular bug involves missing ⁣authentication‍ for ⁣critical functions that could allow unauthorized individuals with network access to take over administrative accounts within Expedition.

Palo Alto Networks’ Expedition tool is designed specifically for streamlining and automating security policy⁤ migrations and optimizations related to⁢ next-generation firewalls from Palo‍ Alto Networks. It facilitates a smoother transition from outdated firewall setups while ⁤minimizing manual intervention and reducing errors during configuration changes.

Source: BleepingComputer

You ⁣May Also Find Interesting

  • Significant⁢ Security Flaw in Palo Alto‍ Being Exploited via Python Zero-Day Backdoor
  • A Comprehensive Guide:⁣ Top Firewalls Available Today
  • The Leading Endpoint ⁣Protection Solutions Currently on Offer

Source
“`

Share This Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *