By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: 22,500 Palo Alto firewalls “possibly vulnerable” to ongoing attacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > 22,500 Palo Alto firewalls “possibly vulnerable” to ongoing attacks
Tech News

22,500 Palo Alto firewalls “possibly vulnerable” to ongoing attacks

By admin 3 Min Read
Share
SHARE

Approximately 22,500 exposed Palo Alto GlobalProtect firewall devices are likely vulnerable to the CVE-2024-3400 flaw, a critical command injection vulnerability that has been actively exploited in attacks since at least March 26, 2024.

CVE-2024-3400 is a critical vulnerability impacting specific Palo Alto Networks’ PAN-OS versions in the GlobalProtect feature that allows unauthenticated attackers to execute commands with root privileges using command injection triggered by arbitrary file creation.

The flaw was disclosed by Palo Alto Networks on April 12, with the security advisory urging system administrators to apply provided mitigations immediately until a patch was made available.

Depending on the PAN-OS version, patches were made available between April 14 and 18, 2024, so the exposure to post-disclosure risks lasted two to six days. It was later revealed that Palo Alto’s mitigation of disabling telemetry would not protect devices and that the only solution was to apply the security patches.

Volexity researchers who first discovered the exploitation revealed that state-backed threat actors tracked as ‘UTA0218’ exploited the flaw to infect systems with a custom backdoor named ‘Upstyle.’

Earlier this week, researchers shared technical details and a proof-of-concept exploit for CVE-2024-3400, demonstrating how easily unauthenticated attackers could execute commands as root on unpatched endpoints.

The public availability of the exploit has allowed numerous threat actors to conduct their own attacks, leaving system administrators with no margins to delay patching.

Greynoise’s scanners confirmed this increased exploitation, showing larger numbers of unique IP addresses attempting to exploit the CVE-2024-3400 flaw.

Despite the urgency of the situation, the ShadowServer Foundation threat monitoring service says there are still roughly 22,500 instances that are “possibly vulnerable” as of April 18, 2024.

tweet

Most of the devices are located in the United States (9,620), followed by Japan (960), India (890), Germany (790), the UK (780), Canada (620), Australia (580), and France (500).

Earlier this week, Shadow Server reported seeing over 156,000 PAN-OS firewall instances exposed on the internet without discerning how many of those might be vulnerable to attacks.

Last Friday, threat researcher Yutaka Sejiyama conducted his own scans and reported observing 82,000 firewalls, which he claimed were vulnerable to CVE-2024-34000.

If the researcher’s estimations were accurate, roughly 73% of all exposed PAN-OS systems were patched within a week.

Those who haven’t taken any action are advised to follow the suggested actions in the Palo Alto security advisory, which has been updated several times since last week with new information and instructions on hunting for suspicious activity.

You Might Also Like

Google Pixel Glow Designs Shown by Gemini

Old Oil and Gas Wells Could Find Second Life Producing Clean Energy

NIST to stop rating non-priority flaws due to volume increase

Pharmaceutical Takeda to cut 4,500 from global workforce

What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface

TAGGED: Actively Exploited, CVE-2024-3400, Palo Alto Networks, PAN-OS, Vulnerability, Vulnerability Management
Share This Article
Facebook Twitter Copy Link
Previous Article Back in profit: Barclays share price jumps nearly 5% on latest results
Next Article Interactive Engineering joins Arduino’s System Integrators
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Crypto ATM Giant Bitcoin Depot Warns Of Possible Collapse
Crypto
Xbox Cloud and Elite 3 Controllers Leaked in New Images – Rumor
Gaming News
Scientists Say Earth Has a Time Limit and It Is Closer Than You Think
World News
Google Pixel Glow Designs Shown by Gemini
Tech News
Oil jumps 4% as Trump rejects Iran’s response to ceasefire proposal
Business
Diablo 4 Bug Fix Accidentally Makes Players Basically Immortal Instead: ‘Yep This Broke The Game”
Gaming News
Will airfares be easier on our wallets this summer? Some carriers are cutting prices
Travel

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Google Pixel Glow Designs Shown by Gemini

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Google Pixel Glow Designs Shown by Gemini
May 16, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?