Security News > 2020 > July > If you haven't potentially exposed 1000s of customers once again with networking vulns, step forward... Not so fast, Palo Alto Networks

If you haven't potentially exposed 1000s of customers once again with networking vulns, step forward... Not so fast, Palo Alto Networks
2020-07-09 10:12

Palo Alto Networks has emitted its second software update in as many weeks to address a potentially serious security vulnerability in its products.

This latest Palo Alto advisory comes just ten days after the IT supplier sounded the alarm for another remote code execution flaw in its PAN-OS. That vulnerability, CVE-2020-2021, was serious enough to warrant an alert from Uncle Sam's CyberCom, which feared that in-the-wild exploitation attempts were likely.

Still, there are likely to be thousands of internet-facing PAN-OS devices that are potentially still vulnerable to exploit.

Nate Warfield, of medical system security group CTI League, reckoned there are over 60,000 internet-facing devices that could potentially be vulnerable, though he tol El Reg many of those may well already be patched, particularly because of last week's bug disclosure.

Admins who have at-risk internet-facing PAN-OS gear should schedule downtime and get the fix for both vulnerabilities installed ASAP. Meanwhile, F5 adjusts warnings.


News URL

https://go.theregister.com/feed/www.theregister.com/2020/07/09/palo_alto_fix/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2020-06-29 CVE-2020-2021 Improper Verification of Cryptographic Signature vulnerability in Paloaltonetworks Pan-Os
When Security Assertion Markup Language (SAML) authentication is enabled and the 'Validate Identity Provider Certificate' option is disabled (unchecked), improper verification of signatures in PAN-OS SAML authentication enables an unauthenticated network-based attacker to access protected resources.
network
low complexity
paloaltonetworks CWE-347
critical
10.0