Have Palo Alto Firewalls? - patch yours now!

If you have Palo Alto firewalls in your environment, now is the time to put your morning coffee down and get patching.

“This story starts with CVE-2024-9474, a 6.9-rated privilege escalation vulnerability in Palo Alto Networks PAN-OS software that allowed an OS administrator with access to the management web interface to perform actions on the firewall with root privileges. The company patched it in November 2024.

Dark web intelligence services vendor Searchlight Cyber’s Assetnote team investigated the patch for CVE-2024-9474 and found another authentication bypass.

Palo Alto (PAN) last week fixed that problem, CVE-2025-0108, and rated it a highest urgency patch as the 8.8/10 flaw addressed an access control issue in PAN-OS's web management interface that allowed an unauthenticated attacker with network access to the management web interface to bypass authentication “and invoke certain PHP scripts.” Those scripts could “negatively impact integrity and confidentiality of PAN-OS.”

The full article on TheRegister can be found here: https://www.theregister.com/2025/02/19/palo_alto_firewall_attack/

Previous
Previous

Australia Follows US Lead: Kaspersky Ban Raises Security Concerns for Government and Beyond

Next
Next

Rethinking Customer Success: Is it Really About the Customer?