Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Palo Alto Networks: Public PoC for Exploitation of Vulnerabilities in Firewall Products (AL02/241010/CSIRT-ITA) – Update

Palo Alto Networks: Public PoC for Exploitation of Vulnerabilities in Firewall Products (AL02/241010/CSIRT-ITA) – Update

Summary

Palo Alto Networks has released security updates to address multiple vulnerabilities. In particular, for 5 of these vulnerabilities – which affect the Network Expedition solution – a Proof of Concept (PoC) is available that could allow the concatenated exploitation of the same in order to take control of the administration accounts of firewall products.

Note: a Proof of Concept (PoC) for the exploitation of the vulnerabilities CVE-2024-9463CVE-2024-9464CVE-2024-9465CVE-2024-9466CVE-2024-9467 is available online.

Note (updated 11/15/2024): the vendor states that CVE-2024-9463 and CVE-2024-9465 are being actively exploited online.

Risk

Estimate of impact of vulnerability on the reference community: SERIOUS/RED (79.35/100)1.

Type

  • Arbitrary Code Execution
  • Data Manipulation
  • Denial of Service
  • Information Disclosure
  • Information Leakage
  • Security Restrictions Bypass

Affected Products and Versions

Networks Expedition, versions prior to 1.2.96

PAN-PS

  • 11.1, versions prior to 11.1.3
  • 11.0.4.x, versions prior to 11.0.4-h5
  • 11.0.6.x, versions prior to 11.0.6
  • 10.2.9.x, versions prior to 10.2.9-h11
  • 10.2.10.x, versions prior to 10.2.10-h4
  • 10.2.11.x, versions prior to 10.2.11

Mitigation Actions

In line with vendor statements, it is recommended to promptly update the vulnerable products to the latest available version and perform the post-update actions recommended in the security bulletin, available in the References section.

Unique Vulnerability Identifiers

The following are the CVEs for the “Critical” and “High” severity vulnerabilities only:

CVE-2024-9463

CVE-2024-9464

CVE-2024-9465

CVE-2024-9466

CVE-2024-9467

CVE-2024-9468

References

https://security.paloaltonetworks.com/CVE-2024-9468

https://security.paloaltonetworks.com/PAN-SA-2024-0010

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.

Recommended to you

Search in 365TRUST

Our services