back to article Palo Alto Networks patches 9.8 severity CVE in popular GlobalProtect product

Palo Alto Networks (PAN) has issued a patch for a CVSS 9.8-rated buffer overflow affecting a VPN component of its widely used firewall software, warning that the flaw allows unauthenticated attackers to execute arbitrary code on unpatched appliances. While the current version, 10.1, and three before it are not affected, the …

  1. Wally Dug
    FAIL

    Discovered a Year Ago

    Is this the vulnerability that was discovered a year ago but was not disclosed by those that discovered it until recently?

    https://arstechnica.com/gadgets/2021/11/vpn-vulnerability-on-10k-servers-has-severity-rating-of-9-8-out-of-10/

    Security firm Randori said on Wednesday that it discovered the vulnerability 12 months ago and for most of the time since has been privately using it in its red team products, which help customers test their network defenses against real-world threats.

    1. Gene Cash Silver badge
      Mushroom

      Re: Discovered a Year Ago

      OK, in my opinion, that takes them directly from "security firm" to "black hat hackers" - they're exploiting an undisclosed vulnerability for their own financial gain.

      1. Clausewitz 4.0
        Devil

        Re: Discovered a Year Ago

        It's a grayish black area

  2. Clausewitz 4.0
    Devil

    Patch Poem

    Patch, patch while you can act, and fast

    Expensive tech it is

    Meets bravery to keep it in place - ohhh good biz

    With brain ideas gone

    No more insights, not even one

    Exploits new sure will appear

    Foreign fellas, will then fear

  3. James12345
    Facepalm

    It must have been a slow day in the Reg news room

    Furious Reg reader John needs to relax before he has a heart attack. It's not healthy getting so stressed about stuff as minor as this. (Furious Reg reader John was too good a forum name not to use, so I've taken it!)

    Patch your firewalls that are running Ver 8.1.16 or older, as 8.1.17 fixes the issue. BTW - 8.1.17 was released over a year ago. If you are stuck on the 8.1 train, then you should already be running 8.1.20 and be evaluating 8.1.21 (or have already deployed it).

    The release trains for 9.0.x / 9.1.x / 10.0.x / 10.1.x have never had the issue.

    Really not sure why The Reg is getting its panties in a knot about this one.

    1. Clausewitz 4.0
      Devil

      Re: It must have been a slow day in the Reg news room

      QUOTE: "around 10,000 vulnerable firewalls were viewable across the wider internet earlier this week"

      If you could only imagine how many systems can be in the intranet of those 10.000 exposed, unpatched, vulnerable appliances...

      1. Furious Reg reader John

        Re: It must have been a slow day in the Reg news room

        Indeed, but that has no bearing on a public announcement of a vulnerability that was patched a year ago. If system admins can't be bother to patch their kit, it doesn't really matter to them how quickly or slowly a vendor releases patches.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like