Palo Alto Networks to fix exploited GlobalProtect zero-day
The Register
|
Contributed by: Drex DeFord
Summary
Palo Alto Networks issued a critical alert on Friday for a command-injection vulnerability in its PAN-OS software, affecting firewall and VPN products, with a CVSS severity score of 10/10, allowing unauthenticated attackers to execute remote code with root privileges. Updates are expected by Sunday, April 14. The vulnerability, designated CVE-2024-3400, affects certain configurations and is currently being exploited, as detected by Volexity, which observed the attacks aiming to take control of the equipment and penetrate victims' networks. Palo Alto Networks is actively working on a fix and has recommended temporary mitigations, emphasizing the importance of customer security and urging users to apply these measures promptly.