Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Palo Alto Reports Two More Bugs in PAN-OS That Are Being Actively Exploited

    Palo Alto Reports Two More Bugs in PAN-OS That Are Being Actively Exploited

    November 18, 2024

    PAN-OS, CVE-2024-0012, CVE-2024-9474, CVE-2024-5910, Palo Alto Networks, Expedition Vulnerability

    An alarming set of chained vulnerabilities in Palo Alto Networks’ PAN-OS software has sparked concerns that attackers could seize administrator privileges through an authentication bypass.

    The first vulnerability, identified as CVE-2024-0012, is a flaw that allows unauthenticated users with network access to the management interface to escalate their privileges, tamper with configurations, or exploit other privilege escalation vulnerabilities, including the second bug, CVE-2024-9474.

    CVE-2024-9474 is a critical part of the exploit operation, potentially contributing to a chained attack scenario. While Palo Alto Networks has acknowledged the CVE, it has not yet provided in-depth technical details about the vulnerability’s mechanics, leaving room for speculation.

    Palo Alto Networks has confirmed the availability of patches to address these issues and said it is “tracking a limited set of exploitation activity” and is “working with external researchers, partners, and customers to share information transparently and rapidly.”

    The Scope of the Threat to PAN-OS

    Palo Alto Networks disclosed that the main vulnerability in the exploit chain – CVE-2024-0012 – affects PAN-OS versions 10.2, 11.0, 11.1, and 11.2.

    Notably, Cloud NGFW and Prisma Access remain unaffected. The exploitation risk significantly decreases when organizations limit access to the management interface to trusted internal IP addresses as per best practices.

    Despite these measures, Palo Alto Networks Unit 42 researchers have identified limited exploitation attempts. Dubbed “Operation Lunar Peek,” these attacks involve adversaries executing commands interactively and deploying malware, including webshells, on compromised firewalls.

    Also read: Palo Alto Networks Warns Customers of Actively-Exploited PAN-OS vulnerability

    PAN-OS Attack Origins and Indicators

    Threat actors have primarily targeted exposed management web interfaces using IP addresses linked to anonymous VPN services. Palo Alto Networks has published a detailed list of suspicious IPs and associated indicators of compromise (IOCs), enabling organizations to monitor and mitigate potential threats.

    The list includes IPs such as 91.208.197[.]167 and 136.144.17[.]146, among others. Some post-exploitation payloads, including a PHP webshell (SHA256 hash: 3C5F9034C86CB1952AA5BB07B4F77CE7D8BB5CC9FE5C029A32C72ADC7E814668), have also been detected.

    Patching Reduces Risk

    Palo Alto Networks has released patches to address CVE-2024-0012 and CVE-2024-9474 and strongly recommends updating affected devices immediately. Organizations should ensure the management interface is accessible only from trusted internal IPs to block unauthorized external access.

    For organizations needing further assistance, Palo Alto Networks provides support services. Unit 42 retainer customers can directly contact the threat intelligence team for incident response guidance.

    Mitigations Beyond Patching

    Securing the management interface is essential. Palo Alto Networks advises implementing best practice deployment guidelines, which include:

    • Restricting access to trusted internal IP addresses.
    • Avoiding direct exposure of the management interface to the internet.
    • Continuously monitoring for IOCs using threat intelligence feeds.

    Palo Alto Networks has shared intelligence with the Cyber Threat Alliance (CTA) to strengthen collective defense measures against this exploit. CTA members have leveraged this data to deploy protections and disrupt threat actors systematically.

    Organizations should act promptly to apply patches, implement network segmentation, and adopt recommended security configurations. For ongoing updates and technical details, refer to the Palo Alto Networks Security Advisory here. Ensure your defenses remain robust as attackers evolve their tactics.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleU.S. Extradites and Charges Alleged Phobos Ransomware Admin
    Next Article New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers

    Related Posts

    Machine Learning

    Salesforce AI Releases BLIP3-o: A Fully Open-Source Unified Multimodal Model Built with CLIP Embeddings and Flow Matching for Image Understanding and Generation

    May 16, 2025
    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    This AI Paper Introduces XMODE: An Explainable Multi-Modal Data Exploration System Powered by LLMs for Enhanced Accuracy and Efficiency

    Development

    Use Passkeys in Your Laravel App

    Development

    OpenAI unveils its most advanced o3 reasoning model on its last day of ‘shipmas’

    Development

    Distribution Release: Edubuntu 25.04

    News & Updates

    Highlights

    News & Updates

    It turns out you can only change VRAM on Legion Go and Legion Go S handhelds by going into the BIOS — Here’s how it works

    March 16, 2025

    Whether you have a Legion Go or a Legion Go S, you can only change…

    This acclaimed new game could be the next Balatro-style hit, and you can get it at a huge discount

    April 11, 2025

    Mastering Title Tags and Meta Descriptions

    August 1, 2024

    How Breaches Start: Breaking Down 5 Real Vulns

    May 7, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.