Advisory

Palo Alto Networks warns of claimed critical flaw in PAN-OS management interface

Take action: If by some weird accident, your PAN-OS Management Interface is exposed to the internet, lock it down immediately. Even if you think it's locked down - check again. Because it may become a very serious vector of attack, and the preventative measures are simple - make it accessible only from trusted networks, use encrypted channels (SSH, TLS) and don't even respond to pings.


Learn More

Palo Alto Networks has issued an advisory regarding a potential remote code execution (RCE) vulnerability affecting the PAN-OS management interface of their next-generation firewalls.

While specific details about this potential vulnerability are currently unknown, the company is actively monitoring for exploitation attempts. No active exploitation has been detected as of the advisory's publication date.

Separately to this report, unrelated flaws tracked as CVE-2024-5910 and CVE-2024-9464 enable command injection vulnerability chained together in another Palo Alto product.

Recommended Mitigation Measures for PAN-OS Management Interface:

  1. Block internet access to the PAN-OS management interface
  2. Allow connections only from trusted internal IP addresses
  3. Isolate the management interface on a dedicated management VLAN
  4. Implement jump servers for management access
  5. Limit inbound IP addresses to approved management devices
  6. Permit only secured communication (SSH, HTTPS)
  7. Restrict PING to testing connectivity only
Palo Alto Networks warns of claimed critical flaw in PAN-OS management interface