Palo Alto Security Updates – 12 April 2024

Palo Alto has released security updates to fix multiple vulnerabilities across several products.

The addressed vulnerabilities could allow the remote attacker to execute arbitrary code, obtain information, elevate privileges, or perform denial-of-service attacks on the affected products.

Sample of the addressed vulnerabilities:

1. Palo Alto OS Command Injection Vulnerability (CVE-2024-3400):

  • CVSS: 10
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Consequences: Gain Access

2. Palo Alto Firewall Denial of Service Vulnerability (CVE-2024-3385):

  • CVSS: 8.2
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Consequences: Denial of Service

The affected products:

  • Palo Alto Cloud NGFW.
  • Palo Alto PAN-OS.
  • Palo Alto Prisma Access.

It should be highlighted that Palo Alto is warning that the critical vulnerability “CVE- 2024-3400” is being exploited in the wild.

Vulnerabilities
  • CVE-2024-3400
  • CVE-2024-3383
  • CVE-2024-3384
  • CVE-2024-3386
  • CVE-2024-3385
  • CVE-2024-3382
  • CVE-2024-3387
  • CVE-2024-3388
Mitigations

The enterprise should follow the mitigation steps for the “CVE-2024-3400” vulnerability until Palo Alto releases the hotfixes.

The enterprise should deploy this patch as soon as the testing phase is completed.

Palo Alto Security Advisory

References