Security News > 2024 > April > Palo Alto Networks zero-day exploited since March to backdoor firewalls
Suspected state-sponsored hackers have been exploiting a zero-day vulnerability in Palo Alto Networks firewalls tracked as CVE-2024-3400 since March 26, using the compromised devices to breach internal networks, steal data and credentials.
Palo Alto Networks warned yesterday that hackers were actively exploiting an unauthenticated remote code execution vulnerability in its PAN-OS firewall software and that patches would be available on April 14.
As the flaw was being used in attacks, Palo Alto Networks decided to disclose the it and release mitigations so customers could protect their devices until patches were complete.
A later report by Volexity, who discovered the zero-day flaw, is providing more details on how hackers exploited the vulnerability since March and installed a custom backdoor to pivot to the target's internal network and steal data.
Volexity says two methods can be used to detect if a Palo Alto Networks firewall was compromised.
Palo Alto Networks warns of PAN-OS firewall zero-day used in attacks.
News URL
Related news
- Palo Alto Networks fixes zero-day exploited to backdoor firewalls (source)
- Palo Alto Networks warns of PAN-OS firewall zero-day used in attacks (source)
- Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack (source)
- Week in review: Palo Alto Networks firewalls under attack, Microsoft patches two exploited zero-days (source)
- Palo Alto Networks firewalls under attack, hotfixes incoming! (CVE-2024-3400) (source)
- Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack (source)
- Zero-day exploited right now in Palo Alto Networks' GlobalProtect gateways (source)
- Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation (source)
- Exploit code for Palo Alto Networks zero-day now public (source)
- 22,500 Palo Alto firewalls "possibly vulnerable" to ongoing attacks (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-04-12 | CVE-2024-3400 | Command Injection vulnerability in Paloaltonetworks Pan-Os A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. | 10.0 |