Security News > 2022 > August > CISA Warns of Active Exploitation of Palo Alto Networks' PAN-OS Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency on Monday added a security flaw impacting Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
The high-severity vulnerability, tracked as CVE-2022-0028, is a URL filtering policy misconfiguration that could allow an unauthenticated, remote attacker to carry out reflected and amplified TCP denial-of-service attacks.
"If exploited, this issue would not impact the confidentiality, integrity, or availability of our products," Palo Alto Networks said in an alert.
"However, the resulting denial-of-service attack may help obfuscate the identity of the attacker and implicate the firewall as the source of the attack."
The networking equipment maker said it discovered the vulnerability after being notified that susceptible firewall appliances from different vendors, including Palo Alto Networks, were being used as part of an attempted reflected denial-of-service attack.
In light of active exploitation, customers of affected products are advised to apply the relevant patches to mitigate potential threats.
News URL
https://thehackernews.com/2022/08/cisa-warns-of-active-exploitation-of.html
Related news
- CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability (source)
- Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability (source)
- Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades (source)
- New Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation (source)
- CISA Warns of Actively Exploited Apache Flink Security Vulnerability (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-08-10 | CVE-2022-0028 | Unspecified vulnerability in Paloaltonetworks Pan-Os A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. | 0.0 |