TechCrunch News 2024年11月21日
Palo Alto Networks warns hackers are breaking into its customers’ firewalls — again
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

网络安全巨头Palo Alto Networks的防火墙软件曝出两个新的零日漏洞,被恶意黑客利用入侵了可能数千家组织。这两个漏洞(CVE-2024-0012和CVE-2024-9474)分别允许攻击者获取管理员权限和最高权限,并可远程植入恶意代码。Shadowserver Foundation发现超过2000台Palo Alto防火墙已被入侵,主要集中在美国、印度等国家。Arctic Wolf的研究人员也观察到黑客早在11月19日就开始利用这些漏洞。Palo Alto Networks已发布补丁并敦促用户尽快更新,美国网络安全局CISA也将其列入已知漏洞目录。研究人员发现,这些漏洞源于开发过程中的基本错误,凸显了企业安全设备漏洞的风险。

🤔 **两个零日漏洞被恶意利用:** Palo Alto Networks的PAN-OS操作系统存在两个零日漏洞(CVE-2024-0012和CVE-2024-9474),允许攻击者通过网络访问管理界面获取管理员权限,甚至最高权限,并远程植入恶意代码。

🌍 **全球范围内超过2000台防火墙受影响:** Shadowserver Foundation发现超过2000台Palo Alto Networks防火墙遭到入侵,主要集中在美国、印度、英国、澳大利亚和中国等国家。

🚨 **黑客利用漏洞入侵客户网络:** Arctic Wolf的研究人员发现,黑客早在11月19日就开始利用这两个漏洞入侵客户网络,并尝试传输工具和窃取配置文件。

🩹 **Palo Alto Networks发布补丁并敦促更新:** 为了修复漏洞,Palo Alto Networks已发布了相应的补丁,并强烈建议所有用户尽快更新系统以防止被入侵。

🔎 **漏洞源于开发过程中的基本错误:** 安全公司watchTowr Labs的研究人员通过逆向工程Palo Alto的补丁发现,这些漏洞是由于开发过程中的一些基本错误造成的。

Malicious hackers have compromised potentially thousands of organizations by exploiting two new zero-day vulnerabilities found in widely used software made by cybersecurity giant Palo Alto Networks.

Security researchers at Palo Alto Networks said Wednesday that they have observed a “limited set of exploitation activity” related to the two vulnerabilities in PAN-OS, the operating system that runs on all of Palo Alto’s next-generation firewalls. The bugs are considered zero-days because the company had no time to release patches before the bugs were exploited.

The company said it has observed exploitation of the two bugs, including CVE-2024-0012, which allows an attacker with network access to the management web interface to gain administrator privileges, while the second bug, tracked as CVE-2024-9474, allows an attacker to perform actions on the compromised firewall with higher root privileges. 

When these vulnerabilities are used together, an attacker can remotely plant malicious code on affected firewalls with the highest possible privileges, allowing for deeper access to a company’s network.

Palo Alto Networks says attackers are now using their own functional exploit chaining the two flaws together to target a “limited number of device management web interfaces” exposed to the internet.

According to the Shadowserver Foundation, a nonprofit organization that scans and monitors the internet for vulnerability exploitation, hackers have already compromised more than 2,000 affected Palo Alto Networks firewalls by leveraging the two recently patched flaws. The non-profit found that the highest number of compromised devices were located in the United States, followed by India, with hackers also exploiting firewalls across the United Kingdom, Australia, and China. 

Palo Alto Networks declined to confirm how many firewalls had been compromised when asked by TechCrunch.

U.S. cybersecurity company Arctic Wolf said this week that its researchers also observed hackers exploiting the two Palo Alto firewall vulnerabilities as early as November 19 to break into customer networks, following the release of a proof-of-concept exploit.

“Upon successful exploitation, we have observed threat actors attempting to transfer tools into the environment and exfiltrate config files from the compromised devices,” said Andres Ramos, a threat intelligence researcher at Arctic Wolf, in the company’s blog post.

Palo Alto Networks released patches for the two vulnerabilities and urged organizations to patch as soon as possible. U.S. cybersecurity agency CISA has also added the two vulnerabilities to its Known Exploited Vulnerabilities catalog, which effectively orders civilian federal agencies to patch their systems within a three-week window.

According to researchers at security firm watchTowr Labs, who reverse-engineered Palo Alto’s patches, the flaws resulted from basic mistakes in the development process. 

This is the latest vulnerability in recent months found in corporate security devices, such as firewalls, VPN products and remote access tools, which sit on the edge of a company’s network to function as digital gatekeepers. This is Palo Alto Networks’ second major security alert of the year, alongside flaws found in similar products developed by cybersecurity vendors Ivanti and Check Point.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Palo Alto Networks 零日漏洞 防火墙 网络安全 漏洞利用
相关文章