Skip navigation

Tag Archives: Palo Alto

https://security.paloaltonetworks.com/CVE-2024-3400

This is a command injection vulnerability that enabled an unauthenticated attacker to execute code with root privileges. POC has been released publicly.

Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability.

You can verify whether you have a GlobalProtect gateway or GlobalProtect portal configured by checking for entries in your firewall web interface (Network > GlobalProtect > Gateways or Network > GlobalProtect > Portals).

https://unit42.paloaltonetworks.com/cve-2024-3400

Patches are available for the varied versions of PAN-OS

https://unit42.paloaltonetworks.com/cve-2022-22965-springshell/

https://unit42.paloaltonetworks.com/gamaredon-primitive-bear-ukraine-update-2021/

Photo by Pixabay on Pexels.com

https://unit42.paloaltonetworks.com/apache-log4j-vulnerability-cve-2021-44228/

Bad actors are usually all over current events when it comes to #phishing and #SocialEngineering attacks, in a different twist, they are now preying on those that have been itching to get out and travel. With all the talk about increasing vaccine rates and boosters, the field is ripe for shooting fish in a barrel. Palo Alto Unit 42 describes the trend they have seen. And with all the stolen data/credentials out there, bad actors are armed pretty well

https://unit42.paloaltonetworks.com/travel-themed-phishing/

https://www.reuters.com/technology/microsoft-warns-azure-customers-flaw-that-could-have-permitted-hackers-access-2021-09-08/

https://unit42.paloaltonetworks.com/dns-rebinding/

Palo Alto Networks


https://security.paloaltonetworks.com/CVE-2021-3044