Security News > 2024 > April > Palo Alto Networks zero-day exploited since March to backdoor firewalls

Palo Alto Networks zero-day exploited since March to backdoor firewalls
2024-04-13 12:35

Suspected state-sponsored hackers have been exploiting a zero-day vulnerability in Palo Alto Networks firewalls tracked as CVE-2024-3400 since March 26, using the compromised devices to breach internal networks, steal data and credentials.

Palo Alto Networks warned yesterday that hackers were actively exploiting an unauthenticated remote code execution vulnerability in its PAN-OS firewall software and that patches would be available on April 14.

As the flaw was being used in attacks, Palo Alto Networks decided to disclose the it and release mitigations so customers could protect their devices until patches were complete.

A later report by Volexity, who discovered the zero-day flaw, is providing more details on how hackers exploited the vulnerability since March and installed a custom backdoor to pivot to the target's internal network and steal data.

Volexity says two methods can be used to detect if a Palo Alto Networks firewall was compromised.

Palo Alto Networks warns of PAN-OS firewall zero-day used in attacks.


News URL

https://www.bleepingcomputer.com/news/security/palo-alto-networks-zero-day-exploited-since-march-to-backdoor-firewalls/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2024-04-12 CVE-2024-3400 Command Injection vulnerability in Paloaltonetworks Pan-Os
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
network
low complexity
paloaltonetworks CWE-77
critical
10.0