Cyber Security News

CISA Warns of Actors Exploiting Two Palo Alto Networks Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert and added two new vulnerabilities related to Palo Alto Networks to its Known Exploited Vulnerabilities Catalog.

These vulnerabilities, CVE-2024-9463 and CVE-2024-9465, are reportedly actively exploited by malicious cyber actors. CISA emphasizes that both vulnerabilities pose significant risks, particularly to federal systems.

CVE-2024-9463: Palo Alto Networks Expedition OS Command Injection Vulnerability

The first vulnerability, CVE-2024-9463, is an OS Command Injection flaw in Palo Alto Networks’ Expedition tool, which could allow attackers to execute arbitrary code on the affected system.

This type of vulnerability is particularly dangerous because it grants threat actors the ability to take control of a system and launch further attacks, escalating their access across the network.

Free Ultimate Continuous Security Monitoring Guide - Download Here (PDF)

CVE-2024-9465: Palo Alto Networks Expedition SQL Injection Vulnerability

The second vulnerability, CVE-2024-9465, is an SQL Injection vulnerability in the same Expedition tool.

This flaw allows attackers to manipulate database queries, potentially stealing, modifying, or deleting sensitive data.

SQL Injection vulnerabilities are a common attack vector for cybercriminals, making this a critical issue for organizations using the impacted versions of Expedition.

Federal Civilian Executive Branch (FCEB) agencies are required to address these vulnerabilities by the established deadlines.

The Known Exploited Vulnerabilities Catalog, created through BOD 22-01, is a dynamic list that serves as a critical resource for organizations looking to mitigate cyber risks.

It includes vulnerabilities that are actively exploited and pose a significant threat to federal networks.

While BOD 22-01 directly applies to federal agencies, CISA strongly urges all organizations, both public and private, to prioritize the timely remediation of vulnerabilities listed in the catalog.

Organizations should incorporate these steps as part of their comprehensive vulnerability management strategies to reduce exposure to cyberattacks.

Analyze Unlimited Phishing & Malware with ANY.RUN For Free - 14 Days Free Trial.



Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Critical Laravel Vulnerability CVE-2024-52301 Allows Unauthorized Access

CVE-2024-52301 is a critical vulnerability identified in Laravel, a widely used PHP framework for building…

2 minutes ago

4M+ WordPress Websites to Attacks, Following Plugin Vulnerability

A critical vulnerability has been discovered in the popular "Really Simple Security" WordPress plugin, formerly…

2 hours ago

Google Unveils New Intelligent, Real-Time Protections for Android Users

Google has once again raised the bar for mobile security by introducing two new AI-powered…

23 hours ago

Chinese National Faces 20 Years of Jail Time for Laundering Millions in Crypto

Daren Li, 41, a dual citizen of China and St. Kitts and Nevis, and a…

23 hours ago

Google to Issue CVEs for Critical Cloud Vulnerabilities

Google Cloud has announced a significant step forward in its commitment to transparency and security…

1 day ago

GitLab Patches Critical Flaws Leads to Unauthorized Access to Kubernetes Cluster

GitLab has rolled out critical security updates to address multiple vulnerabilities in its Community Edition…

1 day ago