back to article Palo Alto firewalls under attack as miscreants chain flaws for root access

A flaw patched last week by Palo Alto Networks is now under active attack and, when chained with two older vulnerabilities, allows attackers to gain root access to affected systems. This story starts with CVE-2024-9474, a 6.9-rated privilege escalation vulnerability in Palo Alto Networks PAN-OS software that allowed someone …

  1. ecofeco Silver badge

    Called it

    Palo Faulto

  2. elDog

    It's become that any company with a product that has firewall/security/defender/etc.

    in it's name is probably the easiest place for these types to attack.

    Beware market hype.

    1. Richard 12 Silver badge

      Re: It's become that any company with a product that has firewall/security/defender/etc.

      It's simpler than that.

      Firewalls are at the edge, by definition. They're always going to be accessible by the outside world because that's what they are.

      They have to be really fast, as a huge amount of traffic goes through them.

      Then a lot of corporates decide to enable deep packet inspection of encrypted communication.

      That means the firewall is in fact a blessed MitM attack on absolutely everyone in the company, and holds certificates that every machine in the company trusts. So it can pretend to be anyone - by design.

      So it's a public target, with the most external bandwidth, powerful processing, and capable of taking over the entire company on its own.

      And thus it's worth spending a huge amount of resources attacking - and as nothing is perfect, issues will be found.

      1. Teal Bee

        Re: It's become that any company with a product that has firewall/security/defender/etc.

        >They're always going to be accessible by the outside world

        I disagree, being able to ping a firewall is in no way equivalent to it being "accessible" to the extent described in this article.

        The fact that it's located at the border is also irrelevant as long as it doesn't expose any services to the outside world.

        The only issue with Palo Alto is that they employ PHP developers to develop its management interface and then allow said interface to be accessed over anything but a serial interface. If it can be accessed over Ethernet then it will be accessed over the Internet, whether you intended that or not.

  3. O'Reg Inalsin

    Intersection between "chain flaws" and "lions juggling chain saws"

    I'm seeing a pattern, but it might be a hallucination. Referring to Rupert Goodwins epic - "Time to make C the COBOL of this century - Lions juggling chainsaws are fun to watch, but you wouldn't want them trimming your trees". For one, I think chain flaws probably has nothing to do with C.

  4. Bebu sa Ware
    Windows

    "Exposing management consoles to the internet is a known risk."

    Or a massive hazard with a known risk, approaching certainty, of exploitation.

    A bit last century I suppose but I blanch at the thought of placing these over complicated devices on the network border. To my mind that function would be more securely served by simpler devices that implemented relatively static but broad bedrock security policies with the more complicated devices placed in network enclaves between the routers/firewalls of the internal networks and the border device. Roughly the DMZ architecture of yore.

    I still have a fondness for screening bridges the headless monks of network traffic filtering.

    1. tip pc Silver badge

      Re: "Exposing management consoles to the internet is a known risk."

      A bit last century I suppose but I blanch at the thought of placing these over complicated devices on the network border.

      They are referring to the management interface of the firewall.

      Most network systems have a management interface nowadays, helps separate management traffic from data.

      Pop that management interface on a secure internal network and it reduces the risk of the system getting pawned across the internet as it would typically not respond to management traffic on an interface that is not the management interface.

  5. harrys Bronze badge

    tripple wammy...

    anyone who exposes ssh / rdp / web management to all and sundry deserves...

    if ignorant ..... training and education

    if knowledgable ...... shot/hung/drawn and quartered :)

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like