Article Details

Scrape Timestamp (UTC): 2024-04-15 08:21:16.010

Source: https://thehackernews.com/2024/04/palo-alto-networks-releases-urgent.html

Original Article Text

Click to Toggle View

Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability. Palo Alto Networks has released hotfixes to address a maximum-severity security flaw impacting PAN-OS software that has come under active exploitation in the wild. Tracked as CVE-2024-3400 (CVSS score: 10.0), the critical vulnerability is a case of command injection in the GlobalProtect feature that an unauthenticated attacker could weaponize to execute arbitrary code with root privileges on the firewall. Fixes for the shortcoming are available in the following versions - Patches for other commonly deployed maintenance releases are expected to be released over the next few days. "This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 firewalls configured with GlobalProtect gateway or GlobalProtect portal (or both) and device telemetry enabled," the company clarified in its updated advisory. It also said that while Cloud NGFW firewalls are not impacted by CVE-2024-3400, specific PAN-OS versions and distinct feature configurations of firewall VMs deployed and managed by customers in the cloud are affected. The exact origins of the threat actor exploiting the flaw are presently unknown but Palo Alto Networks Unit 42 is tracking the malicious activity under the name Operation MidnightEclipse. Volexity, which attributed it to a cluster dubbed UTA0218, said CVE-2024-3400 has been leveraged since at least March 26, 2024, to deliver a Python-based backdoor called UPSTYLE on the firewall that allows for the execution of arbitrary commands via specially crafted requests. It is unclear how widespread the exploitation has been, but the threat intelligence firm said it has "evidence of potential reconnaissance activity involving more widespread exploitation aimed at identifying vulnerable systems." In attacks documented to date, UTA0218 has been observed deploying additional payloads to launch reverse shells, exfiltrate PAN-OS configuration data, remove log files, and deploy the Golang tunneling tool named GOST (GO Simple Tunnel). No other follow-up malware or persistence methods are said to have been deployed on victim networks, although it's unknown if it's by design or due to early detection and response. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.

Daily Brief Summary

MALWARE // Urgent Security Patch for Palo Alto Networks' PAN-OS Vulnerability

Palo Alto Networks has released critical hotfixes for a high-severity vulnerability in PAN-OS, actively exploited in the wild.

The vulnerability, identified as CVE-2024-3400 with a CVSS score of 10.0, involves command injection allowing unauthenticated code execution.

Affected versions include PAN-OS 10.2, 11.0, and 11.1, specifically configurations with GlobalProtect feature and telemetry enabled.

The flaw has been used to deploy a Python-based backdoor named UPSTYLE, enabling attackers to execute arbitrary commands.

Threat actor UTA0218, tracked by Volexity as the group behind the exploitation, has been active since at least March 26, 2024.

Exploits documented include deploying further payloads for data exfiltration, log removal, and reverse shell creation.

Palo Alto Network's response includes updates with more scheduled releases for various maintenance versions in the coming days.

There is still uncertainty about the full scope of system compromises due to this vulnerability.