Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security Privacy

Palo Alto Firewalls Under Attack As Miscreants Chain Flaws For Root Access (theregister.com) 28

A recently patched Palo Alto Networks vulnerability (CVE-2025-0108) is being actively exploited alongside two older flaws (CVE-2024-9474 and CVE-2025-0111), allowing attackers to gain root access to unpatched firewalls. The Register reports: This story starts with CVE-2024-9474, a 6.9-rated privilege escalation vulnerability in Palo Alto Networks PAN-OS software that allowed an OS administrator with access to the management web interface to perform actions on the firewall with root privileges. The company patched it in November 2024. Dark web intelligence services vendor Searchlight Cyber's Assetnote team investigated the patch for CVE-2024-9474 and found another authentication bypass.

Palo Alto (PAN) last week fixed that problem, CVE-2025-0108, and rated it a highest urgency patch as the 8.8/10 flaw addressed an access control issue in PAN-OS's web management interface that allowed an unauthenticated attacker with network access to the management web interface to bypass authentication "and invoke certain PHP scripts." Those scripts could "negatively impact integrity and confidentiality of PAN-OS."

The third flaw is CVE-2025-0111 a 7.1-rated mess also patched last week to stop authenticated attackers with network access to PAN-OS machines using their web interface to read files accessible to the "nobody" user. On Tuesday, US time, Palo A lot updated its advisory for CVE-2025-0108 with news that it's observed exploit attempts chaining CVE-2024-9474 and CVE-2025-0111 on unpatched and unsecured PAN-OS web management interfaces. The vendor's not explained how the three flaws are chained but we understand doing so allows an attacker to gain more powerful privileges and gain full root access to the firewall.
PAN is urging users to upgrade their PAN-OS operating systems to versions 10.1, 10.2, 11.0, 11.1, and 11.2. A general hotfix is expected by Thursday or sooner, notes the Register.

Palo Alto Firewalls Under Attack As Miscreants Chain Flaws For Root Access

Comments Filter:
  • by rsilvergun ( 571051 ) on Wednesday February 19, 2025 @04:45PM (#65180231)
    hostile Foreign actor... Is this like a regional dialect or something? Like how down south when they say bless your heart it's like the worst thing you could say to somebody?
    • by AmiMoJo ( 196126 )

      It's arse covering. Every hack is described as being done by "sophisticated foreign attackers", to imply that it wasn't bad security but a state level threat that nobody could reasonably have defended against.

  • If only people could were notified about this earlier....
  • A web server is a complex beast, and including it on a firewall raises attack surface. I would expect such hardware to only have SSH enabled by default.

    • Exactly right.

      If a firewall ships with PHP enabled, that vendor deserves to go bankrupt. The faster the better.

    • by ls671 ( 1122017 )

      Yeah, I make any kind of stuff like that with a web interface only listen to 127.0.0.1 and ssh tunnel into it to access the web GUI. Web GUI is nice to have sometimes.

  • "access to the management web interface to perform actions on the firewall with root privileges" That there is always amazing to me. After all these years of what seems like *every vendor* having an issue like this with web interface, what dimwitted idiot incompetent would put the web interface reachable directly by the public internet?
    • what dimwitted idiot incompetent would put the web interface reachable directly by the public internet?

      They may not have. Don't forget about the 2017 hack of a casino who's point of entry was a fish tank [forbes.com]. Assuming the fish tank appliance was able to function as an SSH proxy, all one had to do is configure Firefox to send its traffic through the fish tank, and boom! 'internal' access to the firewall's webUI.

      Also, I've had situations where firewall rules on DMZ/Guest networks could still technically access the WebUI - they couldn't log in even with admin credentials, but the page loaded.

      Some firewalls have a W

  • Is it wise putting a Management Web Interface in a security device :o
    • by gweihir ( 88907 )

      If you secure it carefully, maybe. But apparently firewall makers (not only Palo Alto) are too greedy and too incompetent to write secure software. And no liability is in the picture. That needs to change. This is like a fire-extinguisher maker selling products that sometimes burst into flames ...

  • by gweihir ( 88907 ) on Thursday February 20, 2025 @12:48AM (#65180865)

    I mean firewalls as attack vectors, really? These cretins (at Palo Alto and others) urgently need liability for their crappy products.

    • I mean firewalls as attack vectors, really? These cretins (at Palo Alto and others) urgently need liability for their crappy products.

      The reason is that probably a significant number of outsourced IT shops don't do any checking on access from the firewall to internal servers, so you get on the firewall - bam! - you have unrestricted root/administrator access to the servers behind it.

  • Scalawags and ne'er-do-wells!

Economists state their GNP growth projections to the nearest tenth of a percentage point to prove they have a sense of humor. -- Edgar R. Fiedler

Working...