Table of Contents
Imagine that your IT security relies on a reputed firewall system, but a flaw could render it unusable. You are probably wondering how such a situation could be fixed. Discover how the company Palo Alto reacted to a critical vulnerability in its software.
The 3 key pieces of information not to miss
Palo Alto recently revealed a vulnerability in its PAN-OS software, used by the majority of its firewalls. This vulnerability, rated 7.7 on the CVSS scale, could allow attackers to bypass the firewalls by causing a DNS outage. This would result in systems going into maintenance mode, rendering them inoperative.
The company specified that the flaw could only be exploited in a specific configuration, and when the GlobalProtect feature is enabled. Cloud-based firewalls would not be affected by this vulnerability.
Palo Alto has deployed a patch for several versions of PAN-OS, and strongly recommends its users check if an update is necessary. In addition to PAN-OS, Prisma Access versions 10.2 and 11.2 have also received patches. The company emphasizes the importance of applying these updates promptly to prevent any potential exploitation of the flaw.
According to Shadowserver, there are nearly 5,742 potentially vulnerable firewalls worldwide. In Europe, about 794 firewalls are affected, including 111 in France. Belgium and the Netherlands have 17 and 58 firewalls respectively requiring immediate updates.
Although the current situation shows no evidence of active exploitation of the flaw, Palo Alto warns that the scenario could quickly evolve if patches are not applied in time.
Founded in 2005, Palo Alto Networks has become a reference in the field of cybersecurity, offering firewall and network security solutions to thousands of companies worldwide. In 2024, the company already faced similar challenges, notably in November when thousands of firewalls were hacked. These events highlight the importance of vigilance and responsiveness to vulnerabilities in the ever-evolving cybersecurity sector.
Source: