Cyber Security News

CISA Warns of Critical Palo Alto Networks Vulnerability Exploited in Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warns organizations of a critical vulnerability in Palo Alto Networks’ Expedition tool, which could lead to severe security breaches.

The vulnerability, CVE-2024-5910, is classified as a “Missing Authentication” flaw that potentially allows attackers with network access to take control of an Expedition admin account.

According to CISA’s alert, this could allow cybercriminals to access sensitive configuration data, including credentials and other highly privileged information.

Build an in-house SOC or outsource SOC-as-a-Service -> Calculate Costs

CVE-2024-5910 – Vulnerability Details

CVE-2024-5910 is linked to CWE-306 (Missing Authentication for Critical Function), a common weakness caused by an application not adequately verifying user credentials before granting access to sensitive functions.

In the case of Palo Alto Networks’ Expedition—a tool used for firewall migration and configuration analysis—the vulnerability could enable attackers to hijack the administrative interface and gain access to configuration secrets. 

While it is yet to be confirmed whether this vulnerability has been actively exploited in ransomware campaigns, CISA has urged all organizations using Palo Alto Expedition to take immediate action.

“The risk of this vulnerability being leveraged in targeted attacks is significant due to the high level of access it grants to attackers,” the advisory notes.

CISA has strongly advised organizations to apply the recommended mitigations outlined by Palo Alto Networks.

If mitigations are unavailable or impractical, CISA recommends discontinuing the product’s use to avoid potential compromise. The deadline for addressing this vulnerability is November 28, 2024.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps and…

28 minutes ago

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage PowerShell…

2 hours ago

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations in…

2 hours ago

New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data

A new variant of malware, dubbed "Poco RAT," has emerged as a potent espionage tool…

3 hours ago

U.S. Suspends Cyberattacks Against Russia

The United States has suspended offensive cyber operations against Russia under an order issued by…

3 hours ago

Hackers Abused Google and PayPal’s Infrastructure to Steal Users Personal Data

Cybersecurity researchers have uncovered a sophisticated phishing campaign leveraging Google Ads and PayPal’s infrastructure to…

3 hours ago