Critical Palo Alto Firewall Vulnerabilities Actively Exploited

TL;DR Summary
Palo Alto Networks has identified a critical zero-day vulnerability in its PAN-OS firewall management interface, which is being actively exploited to deploy web shells for persistent remote access. The flaw, with a CVSS score of 9.3, allows unauthenticated remote command execution and requires no user interaction. While patches are not yet available, users are urged to secure their management interfaces. The vulnerability is distinct from other recent critical flaws in Palo Alto Networks products, and there is no evidence linking the activities.
Topics:business#cybersecurity#network-security#palo-alto-networks#pan-os#remote-code-execution#zero-day-vulnerability
- PAN-OS Firewall Vulnerability Under Active Exploitation – IoCs Released The Hacker News
- Mystery Palo Alto Networks hijack-my-firewall zero-day now officially under exploit The Register
- CISA Warns of Two More Palo Alto Expedition Flaws Exploited in Attacks SecurityWeek
- Palo Alto updates advisory about firewall bug after discovering exploitation attempts The Record from Recorded Future News
- Palo Alto Networks warns of critical RCE zero-day exploited in attacks BleepingComputer
Reading Insights
Total Reads
0
Unique Readers
1
Time Saved
2 min
vs 2 min read
Condensed
79%
399 → 82 words
Want the full story? Read the original article
Read on The Hacker News