Nicol Daňková’s Post

View profile for Nicol Daňková, graphic

Cyber Battlegrounds Warchief @Henkel

‼️ Update of info about #vulnerability with CVSS 10.0 - CVE-2024-3400 - impacting #PaloAlto devices is out! 👇👇 Info from PA to be shared in community: ————————— 👉 We have updated the advisory to reflect a change in our initial understanding of the required configuration for CVE exposure. 👉 Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability. Earlier versions of this advisory, disabling device telemetry was listed as a secondary mitigation action. Disabling device telemetry is no longer an effective mitigation. Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability. 👉 We strongly advise customers to immediately upgrade to a fixed version of PAN-OS to protect their devices even when workarounds and mitigations have been applied. This issue is fixed in hotfix releases of PAN-OS 10.2.9-h1, PAN-OS 11.0.4-h1, PAN-OS 11.1.2-h3, and in all later PAN-OS versions. Hotfixes for other commonly deployed maintenance releases will also be made available to address this issue. 🫶 If you can help us get this word out to our customer base, that would be most appreciated. Our SEs are calling customers and they should have all received an email regarding this advice and urgently asking them to patch https://lnkd.in/edG66Cti

CVE-2024-3400 PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect

CVE-2024-3400 PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect

security.paloaltonetworks.com

To view or add a comment, sign in

Explore topics