CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

0
26
CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild


The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has issued a high-priority alert on a important vulnerability in Palo Alto Networks PAN-OS.

Tracked as CVE-2024-3393, this flaw has been noticed in energetic exploitation, placing programs liable to distant disruption.

CVE-2024-3393: Malformed DNS Packet Vulnerability

This vulnerability stems from improper parsing and logging of malformed DNS packets when the DNS Safety characteristic is enabled in Palo Alto Networks PAN-OS firewalls.

– Commercial –
SIEM as a ServiceSIEM as a Service

Exploiting this flaw permits risk actors to carry out unauthenticated distant assaults that trigger the firewall to reboot unexpectedly.

2024 MITRE ATT&CK Analysis Outcomes for SMEs & MSPs -> Obtain Free Information

If the assault is repeated, it forces the firewall into upkeep mode, successfully eradicating it from operation and leaving networks weak to additional compromise.

  • CWE Identifier: CWE-754 (Improper Dealing with of Distinctive Circumstances)
  • Affect: Distant Denial of Service (DoS)
  • Exploitation: An attacker sends particularly crafted DNS packets to set off the flaw.

Whereas this vulnerability doesn’t end in unauthorized entry or knowledge exfiltration, its capacity to incapacitate firewalls makes it a major risk to organizations depending on Palo Alto Networks for perimeter safety and visitors administration.

CISA has confirmed that CVE-2024-3393 is being exploited within the wild. Nevertheless, whether or not this vulnerability is presently being leveraged in ransomware campaigns or broader cybercrime operations stays unknown.

Nonetheless, safety specialists warn that given the important nature of this flaw, superior risk actors might combine it into extra advanced assault chains to disrupt important infrastructure or support in infiltration.

  • Vendor Steerage: Palo Alto Networks has issued steering and patches to deal with CVE-2024-3393. Organizations are suggested to instantly implement these updates.
  • Interim Measures: If patches can’t be utilized, disabling the DNS Safety characteristic could mitigate the danger briefly, although this might cut back firewall performance.
  • Final-Resort Possibility: In excessive instances the place mitigations can’t be applied, discontinuing the usage of weak merchandise is advisable.

CISA has set a due date of January 20, 2025, for organizations to make sure applicable mitigations are utilized.

This alert underscores the significance of well timed patching and vigilance in at this time’s quickly evolving risk surroundings.

Organizations utilizing Palo Alto Networks PAN-OS ought to act swiftly to guard their networks from the operational disruptions posed by CVE-2024-3393.

Examine Actual-World Malicious Hyperlinks, Malware & Phishing Assaults With ANY.RUN – Attempt for Free

LEAVE A REPLY

Please enter your comment!
Please enter your name here