Article Details
Scrape Timestamp (UTC): 2025-02-19 04:57:24.198
Source: https://thehackernews.com/2025/02/cisa-adds-palo-alto-networks-and.html
Original Article Text
Click to Toggle View
CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The flaws are listed below - Palo Alto Networks has since confirmed to The Hacker News that it has observed active exploitation attempts against CVE-2025-0108, with the company noting that it could be chained with other vulnerabilities like CVE-2024-9474 to allow unauthorized access to unpatched and unsecured firewalls. Threat intelligence firm GreyNoise said as many as 25 malicious IP addresses are actively exploiting CVE-2025-0108, with the volume of attacker activity surging 10 times since it was detected nearly a week ago. The top three sources of attack traffic are the United States, Germany, and the Netherlands. As for CVE-2024-53704, cybersecurity company Arctic Wolf revealed that threat actors are weaponizing the flaw shortly after a proof-of-concept (PoC) was made available by Bishop Fox. In light of active exploitation, Federal Civilian Executive Branch (FCEB) agencies are required to remediate the identified vulnerabilities by March 11, 2025, to secure their networks.
Daily Brief Summary
CISA has included two security vulnerabilities from Palo Alto Networks and SonicWall in its KEV catalog due to active exploitation.
The affected products are Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN.
Palo Alto Networks confirmed ongoing exploitation attempts against its CVE-2025-0108, which could be linked with CVE-2024-9474 to access unprotected firewalls.
Threat intelligence from GreyNoise highlighted significant exploitation activity, with 25 IP addresses linked to attacks on CVE-2025-0108, mainly from the U.S., Germany, and the Netherlands.
Arctic Wolf reported that CVE-2024-53704 is being actively exploited following the release of a proof-of-concept by Bishop Fox.
Federal agencies under the FCEB are required to patch these vulnerabilities by March 11, 2025, to prevent potential security breaches.