Security

Patches

Palo Alto Networks tackles firewall-busting zero-days with critical patches

Amazing that these two bugs got into a production appliance, say researchers


Palo Alto Networks (PAN) finally released a CVE identifier and patch for the zero-day exploit that caused such a fuss last week.

The vendor dropped details of two vulnerabilities exploited as zero-days. The first, tracked as CVE-2024-0012, an authentication bypass bug, has a 9.3 (critical) severity rating, and users are encouraged to upgrade to one of the many patched maintenance versions of PAN-OS with the highest degree of urgency.

The second, CVE-2024-9474, carries a less severe 6.9 (medium) severity rating and is classified as a privilege escalation bug. Like the first bug, it also affects the PAN-OS management interface but also allows attackers to gain admin access and perform actions as root.

Both advisories for CVE-2024-0012 and CVE-2024-9474 detail the specific versions that are deemed safe. They contain a list of the latest versions available and a limited number of earlier iterations that are more commonly deployed.

PAN warned customers on Thursday that it was aware of a remote command execution bug being actively exploited on various publicly exposed firewall interfaces and a fix was coming soon.

While customers awaited a proper patch, PAN implored customers to "immediately" revoke public internet access to the management interface if it wasn't already and ensure only trusted internal IPs could access it.

The risk of the exploit working was "greatly reduced" if these steps were taken at the end of last week.

You'll notice that the description of CVE-2024-0012 – "authentication bypass" – differs from the wording used when PAN teased it last week as a command execution issue.

It isn't clear why the definition has changed. However, the admission that it can be used in conjunction with vulnerabilities like CVE-2024-9474 suggests that PAN discovered it wasn't the sole cause of the exploit activity detected last week. Rather, it could have been chained with the second zero-day, which does allow attackers to execute commands.

While PAN didn't explicitly say the two vulnerabilities were being chained, the researchers over at watchTowr appeared to assume they were.

They wrote in a blog: "This is a pair of bugs, described as 'authentication bypass in the management web interface' and a 'privilege escalation' respectively, strongly suggesting they are used as a chain to gain superuser access, a pattern that we've seen before with Palo Alto appliances."

The researchers added that for CVE-2024-0012, they were able to exploit it by supplying the x-pan-authcheck header with the value "off" in an HTTP request, disabling device authentication.

From there, they then showed how CVE-2024-9474 relies on PHP and could then be exploited using a series of specially crafted requests, falling just short of publishing a full proof-of-concept code – unlike watchTowr's usual style – thereby allowing admins to apply the necessary patches.

"So, yet another super-duper secure next-generation hardened security appliance popped," watchTowr commented.

"This time it's due to those pesky backticks, combined with the super-complicated step of simply asking the server not to check our authentication via x-pan-authcheck.

"It's amazing that these two bugs got into a production appliance, amazingly allowed via the hacked-together mass of shell script invocations that lurk under the hood of a Palo Alto appliance."

As of Monday, PAN said it was tracking a "limited set of exploitation activity" without going into any great detail about the scale at which the flaws were being attacked, or by whom, although it was said to be still ongoing.

"Palo Alto Networks has identified threat activity targeting a limited number of device management web interfaces," the vendor said. "This activity has primarily originated from IP addresses known to proxy/tunnel traffic for anonymous VPN services.

"Palo Alto Networks is still actively investigating and remediating this activity. Observed post-exploitation activity includes interactive command execution and dropping malware, such as webshells, on the firewall."

According to internet security organization The Shadowserver Foundation, the number of exposed devices running PAN-OS stood at 6,605. That's based on data from November 18, the latest available. The largest number of exposures were in Asia, closely followed by North America. ®

Send us news
4 Comments

Wallbleed vulnerability unearths secrets of China's Great Firewall 125 bytes at a time

Boffins poked around inside censorship engines – here's what they found

Palo Alto firewalls under attack as miscreants chain flaws for root access

If you want to avoid urgent patches, stop exposing management consoles to the public internet

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

Critical PostgreSQL bug tied to zero-day attack on US Treasury

High-complexity bug unearthed by infoseccers, as Rapid7 probes exploit further

Critical flaws in Mongoose library expose MongoDB to data thieves, code execution

Bugs fixed, updating to the latest version is advisable

Crimelords and spies for rogue states are working together, says Google

Only lawmakers can stop them. Plus: software needs to be more secure, but what's in it for us?

MITRE Caldera security suite scores perfect 10 for insecurity

Is a trivial remote-code execution hole in every version part of the training, or?

FreSSH bugs undiscovered for years threaten OpenSSH security

Exploit code now available for MitM and DoS attacks

Rather than add a backdoor, Apple decides to kill iCloud encryption for UK peeps

Plus: SEC launches new crypto crime unit; Phishing toolkit upgraded; and more

US minerals company says crooks broke into email and helped themselves to $500K

A painful loss for young company that's yet to generate revenue

Trump’s DoD CISO pick previously faced security clearance suspension

Hey, at least Katie Arrington brings a solid resume

Harassment allegations against DEF CON veteran detailed in court filing

More than a dozen women came forward with accusations