Palo Alto 安全中心 01月24日
PAN-SA-2025-0003 Informational: PAN-OS BIOS and Bootloader Security Bulletin (Severity: NONE)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks 发布安全公告,指出其 PA 系列硬件防火墙的固件和引导加载程序中存在多个潜在漏洞。这些漏洞在正常情况下无法被恶意利用,因为攻击者需要先攻破系统并获取 root 权限。公告详细列出了多个 CVE 编号的漏洞,涉及 BootHole、InsydeH2O 内核、TPM2.0 模块库等。其中部分漏洞影响 PA-3500、PA-5200 和 PA-7200 系列,但其他硬件防火墙不受影响。PAN-OS CN 系列、VM 系列、Cloud NGFW 和 Prisma Access 产品不受这些漏洞的影响。Palo Alto Networks 正在与第三方供应商合作开发必要的固件更新,并建议用户将设备升级到最新版本并遵循最佳实践指南。

⚠️ Palo Alto Networks 硬件防火墙的固件和引导加载程序中存在多个潜在漏洞,但这些漏洞在正常情况下难以被利用。

🔒 攻击者需要先攻破 PAN-OS 系统并获取 root Linux 权限,才能利用这些固件漏洞,这些漏洞本身并不会直接威胁 PAN-OS 软件。

🛠️ 部分漏洞影响 PA-3500、PA-5200 和 PA-7200 系列,Palo Alto Networks 正在与第三方合作开发固件更新。其他硬件防火墙以及 PAN-OS CN 系列、VM 系列等产品不受影响。

🛡️ 建议用户将设备升级到最新版本,并限制对管理界面的访问,遵循最佳实践指南,以降低被利用的风险。

Palo Alto Networks Security Advisories /PAN-SA-2025-0003PAN-SA-2025-0003 Informational: PAN-OS BIOS and Bootloader Security BulletinInformationalJSONCSAF Published2025-01-23 Updated2025-01-23DescriptionPalo Alto Networks is aware of claims of multiple vulnerabilities in hardware device firmware and bootloaders included in our PA-Series (hardware) firewalls. It is not possible for malicious actors or PAN-OS administrators to exploit these vulnerabilities under normal conditions on PAN-OS versions with up-to-date, secured management interfaces deployed according to the best practices guidelines. Users and administrators do not have access to the BIOS firmware or permissions to modify it. An attacker would need to first compromise the system and then get the root Linux privileges necessary to perform these actions before they could exploit these vulnerabilities. These vulnerabilities themselves do not allow an attacker to compromise the PAN-OS software on the firewall.None of the concerns are applicable to PAN-OS CN-Series, PAN-OS VM-Series, Cloud NGFW and Prisma Access.CVESummaryCVE-2020-10713The BootHole vulnerability may allow an attacker to hijack and tamper the GRUB verification process. It is not possible for malicious actors or PAN-OS administrators to exploit this vulnerability under normal conditions on PAN-OS versions with up-to-date, secured management interfaces deployed according to the best practices guidelines.CVE-2021-33627Insyde InsydeH2O Kernel do not check address of a buffer is valid. We are working with the third-party vendors to develop any firmware updates that may be needed for PA-3500 series, PA-5200 series and PA-7200 series with Switch Management Card (SMC-B) installed. All other hardware firewalls are not affected.CVE-2021-42060Privilege escalation in InsydeH2O Kernel. We are working with the third-party vendors to develop any firmware updates that may be needed for PA-3500 series, PA-5200 series and PA-7200 series with Switch Management Card (SMC-B) installed. All other hardware firewalls are not affected.CVE-2021-42554Memory corruption in Insyde InsydeH2O with Kernel. We are working with the third-party vendors to develop any firmware updates that may be needed for PA-3500 series, PA-5200 series and PA-7200 series with Switch Management Card (SMC-B) installed. All other hardware firewalls are not affected.CVE-2021-43323Privilege escalation in UsbCoreDxe in Insyde InsydeH2O with kernel. We are working with the third-party vendors to develop any firmware updates that may be needed for PA-3500 series, PA-5200 series and PA-7200 series with Switch Management Card (SMC-B) installed. All other hardware firewalls are not affected.CVE-2021-45970Insufficient validation of the allocated buffer pointer in IdeBusDxe in Insyde InsydeH2O with kernel. We are working with the third-party vendors to develop any firmware updates that may be needed for PA-3500 series, PA-5200 series and PA-7200 series with Switch Management Card (SMC-B) installed. All other hardware firewalls are not affected.CVE-2022-24030Memory corruption in AhciBusDxe in Insyde InsydeH2O with kernel. We are working with the third-party vendors to develop any firmware updates that may be needed for PA-3500 series, PA-5200 series and PA-7200 series with Switch Management Card (SMC-B) installed. All other hardware firewalls are not affected.CVE-2023-40238Also known as LogoFail, some BIOS are susceptible to malicious logo images written to the BIOS’s filesystem. PAN-OS is not affected as the conditions required to exploit this vulnerability do not exist in PAN-OS.CVE-2023-1017An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end. This issue is not applicable to any of our products.CVE-2023-45229PixieFAIL: EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing the IA_NA or IA_TA option in a DHCPv6 Advertise message. Our products are unaffected since the BIOS network stack is disabled.CVE-2023-45230PixieFAIL: EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. Our products are unaffected since the BIOS network stack is disabled.CVE-2023-45231PixieFAIL: EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing Neighbor Discovery Redirect messages. Our products are unaffected since the BIOS network stack is disabled.CVE-2023-45232PixieFAIL: EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. Our products are unaffected since the BIOS network stack is disabled.CVE-2023-45233PixieFAIL: EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing a PadN option in the Destination Options header of IPv6. Our products are unaffected since the BIOS network stack is disabled.CVE-2023-45234PixieFAIL: EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. Our products are unaffected since the BIOS network stack is disabled.CVE-2023-45235PixieFAIL: EDK2's Network Package is susceptible to a buffer overflow vulnerability when handling Server ID option from a DHCPv6 proxy Advertise message. Our products are unaffected since the BIOS network stack is disabled.CVE-2023-45236PixieFAIL: EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. PAN-OS is not affected as the conditions required to exploit this vulnerability do not exist in PAN-OS.CVE-2023-45237PixieFAIL: EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. PAN-OS is not affected as the conditions required to exploit this vulnerability do not exist in PAN-OS.Insecure Flash Access Control VulnerabilityMisconfigured or missing SPI flash access controls could permit an attacker to write to UEFI. This requires physical access to the system and tampering hardware. Conditions to exploit this vulnerability do not exist in PAN-OS. We recommend restricting physical access to the firewalls as a best practice.Intel Bootguard Leaked Keys BypassIntel Bootguard had private keys leaked that they have concluded are pre-production or test keys.These keys are not used in any of the BIOS firmware used in Palo Alto Networks firewalls. This issue does not affect PAN-OS.Product StatusVersionsAffectedUnaffectedCloud NGFWNoneAllPAN-OS CN-SeriesNoneAllPAN-OS PA-Series As listed in the CVE table aboveAll others not listed in the CVE table abovePAN-OS VM-SeriesNoneAllPrisma AccessNoneAllRequired Configuration for ExposureSome of these vulnerabilities are exploitable only when an attacker has already compromised the PAN-OS software and gained root Linux privileges on the system or privileged access to the management networks or physical access to open the device. This is not possible under normal conditions on PAN-OS versions that are up-to-date and deployed according to best practices.Exploitation StatusPalo Alto Networks is not aware of any malicious exploitation of these issues in our products. We are aware of a blog post discussing these issues.SolutionWhile the conditions required to exploit these vulnerabilities are not available to users protected by PAN-OS or administrators of PAN-OS software, we are working with the third-party vendors to develop any firmware updates that may be needed. We will provide further updates and guidance as they become available.Workarounds and MitigationsThese vulnerabilities require an attacker to compromise PAN-OS software before they can successfully exploit it. The risk of exploitation on PAN-OS software is reduced by upgrading your appliances to the latest versions.Additionally secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines.Timeline2025-01-23Initial publication

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Palo Alto Networks 安全漏洞 固件安全 防火墙 PAN-OS
相关文章