Friday 29th November 2024
Palo Alto Networks has published two Critical Security Advisories regarding vulnerabilities that could allow attackers to exploit firewall management interfaces and therefore gain unauthorised access to the firewall device.
While the vendor has observed limited threat activity attempting to leverage these vulnerabilities, it is crucially important that all affected customers take action to avoid unnecessary risks.
Below is a summary of these vulnerabilities:
The risk linked to these vulnerabilities is higher where the firewall management interface is accessible from, or exposed to, the public internet.
The solution: apply the hotfix that has already been released by Palo Alto for those vulnerabilities as soon as possible and follow the advice in the corresponding articles below.
*PAN-OS: Palo Alto Networks-Operating System is the base software running on all Palo Alto firewalls.
**root: a user access level superior to that of an administrator. Root users are normally allowed to perform any operation on a system without restrictions.
____________________________________
All customer affected should have received direct communication from Palo Alto Networks on remediation steps; please reach out to your Bytes Account Manager for additional guidance as required.
Want to keep informed? Sign up to our Newsletter