The Register: Palo Alto firewalls under attack as miscreants chain flaws for root access

Source URL: https://www.theregister.com/2025/02/19/palo_alto_firewall_attack/
Source: The Register
Title: Palo Alto firewalls under attack as miscreants chain flaws for root access

Feedly Summary: If you want to avoid urgent patches, stop exposing management consoles to the public internet
A flaw patched last week by Palo Alto Networks is now under active attack and, when chained with two older vulnerabilities, allows attackers to gain root access to affected systems.…

AI Summary and Description: Yes

Summary: The text discusses critical vulnerabilities in Palo Alto Networks’ PAN-OS software, highlighting a series of patches for privilege escalation and authentication bypass flaws. Active exploitation of these vulnerabilities can lead to unauthorized root access to affected systems, emphasizing the necessity for prompt updates to maintain security.

Detailed Description: The text outlines a sequence of vulnerabilities associated with Palo Alto Networks’ PAN-OS software that could be exploited by attackers to gain elevated privileges on affected devices. Below are the major points summarized:

– **Identified Vulnerabilities**:
– **CVE-2024-9474** (Rating: 6.9): A privilege escalation flaw allowing OS administrators with management web interface access to execute actions with root privileges. It was patched in November 2024.
– **CVE-2025-0108** (Rating: 8.8): An urgent authentication bypass vulnerability, allowing unauthenticated attackers to invoke certain scripts via the management web interface, impacting the integrity and confidentiality of PAN-OS.
– **CVE-2025-0111** (Rating: 7.1): This flaw allowed authenticated attackers to read files accessible to the “nobody” user when utilizing the web interface.

– **Exploitation Scenario**:
– Recent investigations revealed active exploit attempts combining the vulnerabilities to grant attackers root access to firewalls, emphasizing the critical nature of patching unpatched and unsecured interfaces.
– Palo Alto Networks confirmed an increase in attempts targeting these vulnerabilities and warned affected users of the urgent need to apply relevant patches.

– **Recommendations**:
– Users should upgrade their PAN-OS operating systems, specifically versions 10.1, 10.2, 11.0, 11.1, and 11.2, to the latest patches immediately.
– A strong recommendation against exposing management consoles to the internet has been reiterated, though some admins may still do so for easier remote management, leading to inherent risks.

– **Importance of Security Practices**:
– The situation underscores the fundamental need for securing external-facing management interfaces and continuously patching systems to mitigate risks.
– It illustrates the ongoing challenge faced by administrators regarding access control while maintaining security in network environments.

In conclusion, this incident highlights the importance of timely patch management and adherence to security best practices in the realm of infrastructure security, particularly for organizations using Palo Alto Networks products.