Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Palo Alto Networks Firewalls Under Siege: A Growing Concern for Cybersecurity


A growing number of cyber attacks are targeting Palo Alto Networks firewalls due to a combination of vulnerabilities in the PAN-OS software. Organizations must take immediate action to patch these vulnerabilities and secure their systems to avoid potential breaches.

  • Palo Alto Networks firewalls have found themselves at the center of a growing cybersecurity storm due to newly discovered vulnerabilities.
  • A flaw in PAN-OS software (CVE-2024-9474) was patched, but another authentication bypass vulnerability (CVE-2025-0111) was found.
  • Exploit attempts have been chaining these vulnerabilities on unpatched and unsecured web management interfaces, allowing attackers to gain more powerful privileges.
  • Palo Alto Networks has urged customers to apply security updates released on February 12, 2025, immediately to secure their external-facing management interfaces.
  • Organizations must review configurations and take steps to limit access to the management console to restricted internal IP addresses to reduce the risk of attack.



  • Palo Alto Networks firewalls, a stalwart defender of enterprise networks, have found themselves at the center of a growing cybersecurity storm. A recent flurry of activity has highlighted the vulnerabilities of these devices, leaving many to wonder if their reputation as a robust security solution is being challenged.

    According to recent reports, a flaw in Palo Alto Networks' PAN-OS software, identified as CVE-2024-9474, was patched last week by the company. However, this patch did not address all the issues at hand. Dark web intelligence services vendor Searchlight Cyber's Assetnote team investigated the patch for CVE-2024-9474 and found another authentication bypass vulnerability, which has now become a focal point of attention.

    Further digging into the issue revealed yet another vulnerability, identified as CVE-2025-0111, which was also patched by Palo Alto Networks last week. This flaw, rated 7.1 on the Common Vulnerability Scoring System (CVSS), allows authenticated attackers with network access to PAN-OS machines using their web interface to read files accessible to the "nobody" user.

    The most recent development in this saga comes from a recent update to Palo Alto Networks' advisory for CVE-2025-0108, which was first patched last week. In this update, it was revealed that exploit attempts have been chaining these vulnerabilities on unpatched and unsecured PAN-OS web management interfaces.

    This brings us to the heart of the matter - what does it mean for Palo Alto Networks firewalls when such vulnerabilities are chained together? Simply put, it means that an attacker who can chain these three vulnerabilities will be able to gain more powerful privileges and ultimately gain full root access to the firewall. This is a serious concern for anyone who relies on Palo Alto Networks firewalls as their primary line of defense against cyber threats.

    Palo Alto Networks has issued a statement urging all customers with internet-facing PAN-OS management interfaces to apply the security updates released on February 12, 2025, immediately. The company stresses the importance of securing external-facing management interfaces as a fundamental security best practice.

    While this warning comes as no surprise, it highlights the need for organizations to take proactive steps in ensuring their systems are patched and secure against such vulnerabilities. This means reviewing configurations and taking steps to limit access to the management console to restricted internal IP addresses.

    However, even with these precautions, unpatched systems remain vulnerable. The risk is greatly reduced but not entirely eliminated, underscoring the need for vigilance in cybersecurity.

    In recent days, there have been reports of Palo Alto firewalls experiencing reboots due to specific network traffic. This issue was addressed by a limited-release patch, 11.1.4-h12, which has since become available for more widespread distribution.

    It is worth noting that the impact of this vulnerability on the overall cybersecurity landscape is still being assessed and evaluated. However, one thing is clear - Palo Alto Networks firewalls are under attack and it is imperative that organizations take immediate action to secure their systems against these vulnerabilities.

    In conclusion, the recent revelations surrounding the vulnerabilities in Palo Alto Networks' firewalls serve as a stark reminder of the ever-evolving nature of cybersecurity threats. As we continue to rely on technology to protect us from the ever-present specter of cyber attacks, it is essential that we remain vigilant and proactive in our defense against such threats.



    Related Information:

  • https://go.theregister.com/feed/www.theregister.com/2025/02/19/palo_alto_firewall_attack/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-9474

  • https://www.cvedetails.com/cve/CVE-2024-9474/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-0111

  • https://www.cvedetails.com/cve/CVE-2025-0111/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-0108

  • https://www.cvedetails.com/cve/CVE-2025-0108/


  • Published: Tue Feb 18 19:39:21 2025 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us