Palo Alto Networks on Friday issued an informational advisory urging prospects to make sure that entry to the PAN-OS administration interface is secured due to a possible distant code execution vulnerability.
“Palo Alto Networks is conscious of a declare of a distant code execution vulnerability by way of the PAN-OS administration interface,” the corporate mentioned. “At the moment, we have no idea the specifics of the claimed vulnerability. We’re actively monitoring for indicators of any exploitation.”
Within the interim, the community safety vendor has advisable that customers appropriately configure the administration interface in step with one of the best practices, and guarantee that entry to it’s potential solely by way of trusted inner IPs to restrict the assault floor.
It goes with out saying that the administration interface shouldn’t be uncovered to the Web. A number of the different pointers to cut back publicity are listed under –
- Isolate the administration interface on a devoted administration VLAN
- Use soar servers to entry the administration IP
- Restrict inbound IP addresses to the administration interface to accepted administration gadgets
- Solely allow secured communication akin to SSH, HTTPS
- Solely enable PING for testing connectivity to the interface
The event comes a day after the U.S. Cybersecurity and Infrastructure Safety Company (CISA) added a now-patched crucial safety flaw impacting Palo Alto Networks Expedition to its Identified Exploited Vulnerabilities (KEV) catalog, citing proof of energetic exploitation.
The vulnerability, tracked as CVE-2024-5910 (CVSS rating: 9.3), pertains to a case of lacking authentication within the Expedition migration instrument that would result in an admin account takeover, and probably acquire entry to delicate knowledge.
Whereas it is at present not recognized the way it’s being exploited within the wild, federal businesses have been suggested to use the required fixes by November 28, 2024, to safe their networks towards the menace.