Skip to content

Palo Alto Networks Warns of Critical SSL VPN Vulnerability

Thousands of TCP connections probing SSL VPN portals. Upgrade now to prevent command injection and root code execution.

In the image there is a bug on the white surface.
In the image there is a bug on the white surface.

Palo Alto Networks Warns of Critical SSL VPN Vulnerability

Palo Alto Networks has issued a warning about a critical vulnerability in its PAN-OS GlobalProtect system. Since late September, honeypots have detected thousands of TCP connections probing SSL VPN portals, exploiting a high-severity flaw (CVE-2024-3400).

The vulnerability, discovered by Palo Alto Networks, allows unauthenticated attackers to create arbitrary files on vulnerable firewalls. One IP address, 141.98.82.26, has been repeatedly exploiting the lack of session ID validation. The goal? OS command injection and full root code execution.

Security researchers have observed a significant increase in internet-wide scans targeting this networking issue. To mitigate, administrators are advised to upgrade to the fixed PAN-OS versions immediately. Additionally, Threat Prevention signatures can be deployed to block initial arbitrary file creation interactions at the GlobalProtect interface. Operators should also inspect GPSvc logs for anomalous session ID strings to detect exploitation attempts.

Palo Alto Networks urges administrators to take immediate action to protect their systems. Upgrade to the fixed PAN-OS versions, deploy Threat Prevention signatures, and monitor logs for suspicious activity. Staying vigilant and proactive is crucial in the face of this critical vulnerability.

Read also:

Latest