Security

Patches

Palo Alto Networks tackles firewall-busting zero-days with critical patches

Amazing that these two bugs got into a production appliance, say researchers


Palo Alto Networks (PAN) finally released a CVE identifier and patch for the zero-day exploit that caused such a fuss last week.

The vendor dropped details of two vulnerabilities exploited as zero-days. The first, tracked as CVE-2024-0012, an authentication bypass bug, has a 9.3 (critical) severity rating, and users are encouraged to upgrade to one of the many patched maintenance versions of PAN-OS with the highest degree of urgency.

The second, CVE-2024-9474, carries a less severe 6.9 (medium) severity rating and is classified as a privilege escalation bug. Like the first bug, it also affects the PAN-OS management interface but also allows attackers to gain admin access and perform actions as root.

Both advisories for CVE-2024-0012 and CVE-2024-9474 detail the specific versions that are deemed safe. They contain a list of the latest versions available and a limited number of earlier iterations that are more commonly deployed.

PAN warned customers on Thursday that it was aware of a remote command execution bug being actively exploited on various publicly exposed firewall interfaces and a fix was coming soon.

While customers awaited a proper patch, PAN implored customers to "immediately" revoke public internet access to the management interface if it wasn't already and ensure only trusted internal IPs could access it.

The risk of the exploit working was "greatly reduced" if these steps were taken at the end of last week.

You'll notice that the description of CVE-2024-0012 – "authentication bypass" – differs from the wording used when PAN teased it last week as a command execution issue.

It isn't clear why the definition has changed. However, the admission that it can be used in conjunction with vulnerabilities like CVE-2024-9474 suggests that PAN discovered it wasn't the sole cause of the exploit activity detected last week. Rather, it could have been chained with the second zero-day, which does allow attackers to execute commands.

While PAN didn't explicitly say the two vulnerabilities were being chained, the researchers over at watchTowr appeared to assume they were.

They wrote in a blog: "This is a pair of bugs, described as 'authentication bypass in the management web interface' and a 'privilege escalation' respectively, strongly suggesting they are used as a chain to gain superuser access, a pattern that we've seen before with Palo Alto appliances."

The researchers added that for CVE-2024-0012, they were able to exploit it by supplying the x-pan-authcheck header with the value "off" in an HTTP request, disabling device authentication.

From there, they then showed how CVE-2024-9474 relies on PHP and could then be exploited using a series of specially crafted requests, falling just short of publishing a full proof-of-concept code – unlike watchTowr's usual style – thereby allowing admins to apply the necessary patches.

"So, yet another super-duper secure next-generation hardened security appliance popped," watchTowr commented.

"This time it's due to those pesky backticks, combined with the super-complicated step of simply asking the server not to check our authentication via x-pan-authcheck.

"It's amazing that these two bugs got into a production appliance, amazingly allowed via the hacked-together mass of shell script invocations that lurk under the hood of a Palo Alto appliance."

As of Monday, PAN said it was tracking a "limited set of exploitation activity" without going into any great detail about the scale at which the flaws were being attacked, or by whom, although it was said to be still ongoing.

"Palo Alto Networks has identified threat activity targeting a limited number of device management web interfaces," the vendor said. "This activity has primarily originated from IP addresses known to proxy/tunnel traffic for anonymous VPN services.

"Palo Alto Networks is still actively investigating and remediating this activity. Observed post-exploitation activity includes interactive command execution and dropping malware, such as webshells, on the firewall."

According to internet security organization The Shadowserver Foundation, the number of exposed devices running PAN-OS stood at 6,605. That's based on data from November 18, the latest available. The largest number of exposures were in Asia, closely followed by North America. ®

Send us news
4 Comments

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches

Apache issues patches for critical Struts 2 RCE bug

More details released after devs allowed weeks to apply fixes

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Three more vulns spotted in Ivanti CSA, all critical, one 10/10

Patch up, everyone – that admin portal is mighty attractive to your friendly cyberattacker

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push

Holiday cheer comes in the form of three arrests and 27 shuttered domains

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

US names Chinese national it alleges was behind 2020 attack on Sophos firewalls

Also sanctions his employer – an outfit called Sichuan Silence linked to Ragnarok ransomware