Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Network Security

Thousands of Palo Alto Networks Firewalls Compromised This Week After Critical Security Hole (theregister.com) 28

Palo Alto Networks boasts 70,000 customers in 150 countries, including 85% of the Fortune 500.

But this week "thousands of Palo Alto Networks firewalls were compromised by attackers exploiting two recently patched security bug," reports the Register: The intruders were able to deploy web-accessible backdoors to remotely control the equipment as well as cryptocurrency miners and other malware. Roughly 2,000 devices had been hijacked as of Wednesday — a day after Palo Alto Networks pushed a patch for the holes — according to Shadowserver and Onyphe. As of Thursday, the number of seemingly compromised devices had dropped to about 800. The vendor, however, continues to talk only of a "limited number" of exploited installations... The Register has asked for clarification, including how many compromised devices Palo Alto Networks is aware of, and will update this story if and when we hear back from the vendor.

Rumors started swirling last week about a critical security hole in Palo Alto Networks appliances that allowed remote unauthenticated attackers to execute arbitrary code on devices. Exploitation requires access to the PAN-OS management interface, either across the internet or via an internal network. The manufacturer did eventually admit that the firewall-busting vulnerability existed, and had been exploited as a zero-day — but it was still working on a patch. On Tuesday, PAN issued a fix, and at that time said there were actually two vulnerabilities. The first is a critical (9.3 CVSS) authentication bypass flaw tracked as CVE-2024-0012. The second, a medium-severity (6.9 CVSS) privilege escalation bug tracked as CVE-2024-9474. The two can be chained together to allow remote code execution (RCE) against the PAN-OS management interface... once the attackers break in, they are using this access to deploy web shells, Sliver implants, and/or crypto miners, according to Wiz threat researchers.

This discussion has been archived. No new comments can be posted.

Thousands of Palo Alto Networks Firewalls Compromised This Week After Critical Security Hole

Comments Filter:
  • by Njovich ( 553857 ) on Monday November 25, 2024 @08:15AM (#64970287)

    I guess these days a 'security company' is a company that adds extra breaches into your network by adding shoddy code to the gateway points.

    • by DarkOx ( 621550 )

      Sadly not exactly unique in this space:

      Cisco PIX/ASA, Ivanti, Citrix, and Palo Alto (previously) have all had serious RCE vulns that were either unauthenticated or only required basic previliges like what would be assigned to every employee to connect to the vpn, use the captive webportal etc, in fairly recent memory.

      If you get to look at the firmware to these things you find out they are often piles of decades old Perl and PHP scripts. You'd like think these things are built with more hardened stuff from s

      • "Honestly the real scandal is the super premium prices they ask for this stuff given what it actually is." if you think the purchase price is bad, just wait until it's time to renew support. That's when they break out the shoulder-length rubber glove. It's also funny how PAN sales reps bash their competitors for vulnerabilities. You'd think by now they would realize how that blows up in their faces. ALL OF THEM have the same problem. All we can do as customers is to watch how they communicate and how quic
    • by gweihir ( 88907 )

      Unfortunately, yes. Just look at one week of alerts for security problems with security components to see how bad things are.

    • by Junta ( 36770 )

      Not just gateway points...

      At this point most "security" offerings from third parties are risks. They demand administrative access to frequently redundantly do the things that the base platform already provide, which means the only outcome is larger attack surface.

      They are not in the market by virtue of value, but by virtue of oblivious assumptions of brand value combined with sometimes downright underhanded sales tactics. I've heard people complain of 'security' vendors threatening to tell managers that t

  • by gweihir ( 88907 ) on Monday November 25, 2024 @08:37AM (#64970327)

    An all-too common problem these days. You do get the impression that makes of security elements like firewalls, IDS, SIEM, VPN endpoints, etc. do not know how to write code, and even less how to write secure code. Also see the Crowdstrike incident for one well analysed instance of abject failure. This state of affairs is utterly unacceptable and truly pathetic. We need vendor liability, at the very least for insecure security components. Of course, an OS is a security component in the broader sense, so some very powerful players are strictly opposed to being held responsible when they sell insecure crap.

    That is not to say you should not use these things. Not using them likely still a lot worse. But you must be prepared to patch these components on short notice and you must not trust them. One reason why careful operations use two different firewalls from two vendors at their border.

    • by Junta ( 36770 )

      To be fair to CrowdStrike, there's not much that's more secure than a system that won't even boot and get online. So.... mission accomplished?

      I will go so far as to say you should not use a lot of these things. Many of them are now redundant with what comes with the platforms they are trying to secure. But at least be surgical, my corporate windows load has about 3 different anti-malware suites running concurrently, 4 different remote patch management solutions, and at least 2 different "security monitorin

      • I will go so far as to say you should not use a lot of these things. Many of them are now redundant with what comes with the platforms they are trying to secure. But at least be surgical, my corporate windows load has about 3 different anti-malware suites running concurrently, 4 different remote patch management solutions, and at least 2 different "security monitoring" software (I've lost track as they keep changing and adding to it).

        ”Surgical”, would imply precise.

        The FUCK sounds precise about 3 different anti-malware battalions defending concurrently, 4 different tank divisions supporting it, and at least 2 different special forces groups doing black ops “monitoring” work?

        • by Junta ( 36770 )

          I guess I wasn't clear, my company's load is an example of what *not* to do, and why I am triggered by the whole 'security suite' industry.

      • by gweihir ( 88907 )

        To be fair to CrowdStrike, there's not much that's more secure than a system that won't even boot and get online. So.... mission accomplished?

        Yes, definitely. In the worst possible way. ^^
        It is at this time the only known reliable way to reasonably secure a Windows installation though, besides cutting network connectivity.

        I will go so far as to say you should not use a lot of these things. Many of them are now redundant with what comes with the platforms they are trying to secure. But at least be surgical, my corporate windows load has about 3 different anti-malware suites running concurrently, 4 different remote patch management solutions, and at least 2 different "security monitoring" software (I've lost track as they keep changing and adding to it).

        That sounds like a really bad situation. "More helps more" is not true for security components. In some places redundancy helps, for example two different firewalls in series enforcing the same things, but several AV or several patch-managers running in parallel will only cause problems and insecurities. Seems however is in char

        • by Junta ( 36770 )

          Nah, they haven't lost sight of their goals, their goals are to not be fired for saying no to any security pitch from a vendor. If you say "no" to something that, to an executive, sounds like "improving security" it's out the door with you.

  • Good, so not infinite because that would be worse.
  • by Inglix the Mad ( 576601 ) on Monday November 25, 2024 @09:01AM (#64970367)
    the reality is that we cannot secure things using the models built for simpler implementations.

    I think we're going to have to evolve security past what is the current ideal of (effectively) moats / strong doors to an even lower internal trust model. We simply can't afford to risk the moat's builder leaving an unintended bridge, or the door builder using a shoddy lock.

    What will that entail? Well, if I knew I'd be ridiculously wealthy and buying my own G800.
    • by DarkOx ( 621550 )

      In fairness, Palo Alto has been a leader in that space as has Cisco with ISE. They have done a lot around trying to do things like associate network flows with individual users and getting out of being edge devices and being able to do policy enforcement right inside the enterprise core. Always VPN and variations on 802.1x solutions etc even push that policy enforcement right down to the client.

      They have gotten that hilariously wrong at times too - seen lots of reports where the credentials the device uses

      • by Junta ( 36770 )

        I find "Zero Trust" to have taken a bit of a bad turn.

        It started out well enough, acknowledging that the whole notion of a 'trusted internal network' is deeply flawed, and you need all services to assume that any client network could be as adversarial as a random internet access.

        But it became "I can't let anything connect to me unless I have an agent running with root privilege on every possible client device". So, the owner of a network can't trust me unless I very much trust them. As a result, I have to

        • by DarkOx ( 621550 )

          Well blame NIST;

          Part of the recommendations are to continuously assess posture. How can you really do that without some kind of agent?

          I am not trying to be argumentative here. I happen to agree with you. I think Zero trust as often as not is really just an excuse to shove asset management off on your employees, partners, and clients.

          Because you are right, I too connect to a lot of these environments for clients, from VMs. VMs with TMPs implemented in software, VMs that I can pause tamper with memory, in

  • by coofercat ( 719737 ) on Monday November 25, 2024 @09:17AM (#64970403) Homepage Journal

    This does look pretty rubbish - somehow you can log in across a network, even if you don't have credentials. Then you can somehow gain higher privileges from that login. This doesn't feel like "an unlucky bug", but rather is symptomatic of generally janky coding standards and equally janky testing.

    The usual caveats apply though... there should be no way to access the login functionality remotely. Even those on the LAN ought to be on a particular segment of it, so of 8.2 billion people on earth, only about 20 ought to be able to mount such an attack. The fact that hundreds/thousands of devices can be attacked quite so quickly suggests thousands of shops aren't following decent security practices. As much as Palo Alto Networks look to be pretty sucky, there's no way they could protect people from their own poor standards.

    • What I see repeatedly is that the network security team clamps down on everyone else, but then makes their life as easy as possible. For instance they partition the network and implement zero trust on every system, but then configure the network from their segment/PoV to be effectively flat so that they can run their scanning tools, and access systems with ease. So the largest weaknesses in the network correlate with the high privilege accounts. Zero Trust is for the plebes, not the lords.
  • We were affected by this. But it was painless: we use more than one firewall vendor, for this exact reason. Behind our PaloAlto firewalls we had another firewall from a different vendor, so no much harm was done other than a nuisance to swap a set of wires and ship the unit to PA for RMA and forensics.

    • We were affected by this. But it was painless: we use more than one firewall vendor, for this exact reason. Behind our PaloAlto firewalls we had another firewall from a different vendor, so no much harm was done other than a nuisance to swap a set of wires and ship the unit to PA for RMA and forensics.

      Multiple firewall vendors means multiple training and support needs internally and/or multiple support contracts that also support a “swap a set of wires” level of enterprise support.

      In other words, it’s only painless when you can afford it to be. The other 99% of the time I’d imagine the maintenance costs are a painful enough FUD budget fight no matter how justified. Kudos to who is succeeding for you in that endeavor. Not everyone works for competent management capable of respec

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (3) Ha, ha, I can't believe they're actually going to adopt this sucker.

Working...