Palo Alto 安全中心 2024年07月04日
CVE-2024-3383 PAN-OS: Improper Group Membership Change Vulnerability in Cloud Identity Engine (CIE) (Severity: HIGH)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks PAN-OS 软件在处理来自云身份引擎 (CIE) 代理的数据时存在漏洞,攻击者可以利用此漏洞修改用户 ID 组。这会影响用户对网络资源的访问,可能会导致用户被错误地拒绝或允许访问资源,具体取决于现有的安全策略规则。

🤔 **漏洞概述**:PAN-OS 软件在处理来自云身份引擎 (CIE) 代理的数据时存在漏洞,攻击者可以利用此漏洞修改用户 ID 组。

💻 **影响范围**:该漏洞影响使用云身份引擎 (CIE) 的 PAN-OS 防火墙配置。如果您的防火墙启用了 CIE,则可能受到该漏洞的影响。

🛡️ **解决方案**:Palo Alto Networks 已在 PAN-OS 10.1.11、PAN-OS 10.2.5、PAN-OS 11.0.3 及更高版本的 PAN-OS 中修复了此问题。建议尽快升级到受影响的 PAN-OS 版本。

🤝 **致谢**:Palo Alto Networks 感谢 Insight.com 的 Rodgers Moore (CCIE# 8153) 发现并报告了此问题。

Palo Alto Networks Security Advisories /CVE-2024-3383CVE-2024-3383 PAN-OS: Improper Group Membership Change Vulnerability in Cloud Identity Engine (CIE)UrgencyMODERATEResponse EffortLOWRecoveryUSERValue DensityDIFFUSEAttack VectorNETWORKAttack ComplexityLOWAttack RequirementsPRESENTAutomatableYESUser InteractionNONEProduct ConfidentialityNONEProduct IntegrityHIGHProduct AvailabilityHIGHPrivileges RequiredNONESubsequent ConfidentialityNONESubsequent IntegrityNONESubsequent AvailabilityNONENVDJSON Published2024-04-10 Updated2024-04-10ReferencePAN-211764 andPAN-218522Discoveredin production useDescriptionA vulnerability in how Palo Alto Networks PAN-OS software processes data received from Cloud Identity Engine (CIE) agents enables modification of User-ID groups. This impacts user access to network resources where users may be inappropriately denied or allowed access to resources based on your existing Security Policy rules.Product StatusVersionsAffectedUnaffectedCloud NGFW NoneAllPAN-OS 11.1NoneAllPAN-OS 11.0< 11.0.3>= 11.0.3PAN-OS 10.2< 10.2.5>= 10.2.5PAN-OS 10.1< 10.1.11>= 10.1.11PAN-OS 9.1NoneAllPAN-OS 9.0NoneAllPrisma Access NoneAllRequired Configuration for ExposureThis issue applies only to PAN-OS firewall configurations with Cloud Identity Engine (CIE) enabled. You should verify whether CIE is configured on your firewall web interface (Device > User Identification > Cloud Identity Engine).Severity:HIGHCVSSv4.0Base Score:8.3 (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:D/RE:L/U:Amber)Exploitation StatusPalo Alto Networks is not aware of any malicious exploitation of this issue.Weakness TypeCWE-282: Improper Ownership ManagementSolutionThis issue is fixed in PAN-OS 10.1.11, PAN-OS 10.2.5, PAN-OS 11.0.3, and all later PAN-OS versions.AcknowledgmentsPalo Alto Networks thanks Rodgers Moore, CCIE# 8153 of Insight.com, for discovering and reporting this issue.Timeline2024-04-10Initial publication

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

PAN-OS 云身份引擎 漏洞 安全 网络安全
相关文章