Imechapishwa: Apr 15, 2024 17:34
Advisory No: TZCERT/SA/2024/04/15
Source: Palo Alto
Software Affected: PAN-OS versions 10.2, 11.0, and 11.1
Advisory No: TZCERT/SA/2024/04/15
Date of First Release: 15th April 2024
Source: Palo Alto
Software Affected: PAN-OS versions 10.2, 11.0, and 11.1
Overview:
Palo Alto’s PAN-OS is affected by the critical command injection vulnerability. The vulnerabilities may allow an attacker to execute arbitrary code with root privileges on the firewall.
Description:
GlobalProtect, a feature in PAN-OS is affected by a vulnerability tracked as CVE-2024-3400. GlobalProtect provides a complete infrastructure for managing your mobile workforce to enable secure access for all your users, regardless of what endpoints they are using or where they are located. According to the Volexity investigation team, after gaining access the attacker installs a custom Python backdoor named “UPSTYLE”, on the firewall. The UPSTYLE backdoor allows the attacker to execute additional commands on the device via specially crafted network requests.
Impact:
Successful exploitation of this vulnerability may allow an unauthenticated attacker to take control of the affected system.
Solution:
Palo Alto has released security patches for this vulnerability. Users and administrators are encouraged to apply necessary updates.
References:
A digest of Tanzania Computer Emergency Response Team coverage of cyber-security news across the globe.