Palo Alto Networks has released a security bulletin covering an actively exploited vulnerability for internet-facing firewall web management interfaces.
Threat activity exploiting an unauthenticated remote command execution vulnerability has been observed by Palo Alto Networks. Currently, Palo Alto believes Prisma Access or Cloud NGFWs are not affected. Update to an unaffected version if possible, otherwise, the recommendation provided is to secure access to your web management interface in accordance with Palo Alto's best practice deployment guidelines. In particular, Palo Alto recommends that you immediately ensure that access to the management interface is possible only from trusted internal IPs.
Some of the potential impacts when this vulnerability is successfully exploited include:
Update to one of the following unaffected versions of PAN-OS:
- 11.2.4-h1
- 11.1.5-h1
- 11.0.6-h1
- 10.2.12-h2
For more in-depth workaround and mitigation guidance please visit the linked resource bulletin
https://security.paloaltonetworks.com/PAN-SA-2024-0015
Immediate attention to this matter is highly recommended.
Please reach out to your CSM if you have immediate questions or concerns.