Cybercriminals have found a way to hack thousands of Palo Alto Networks firewalls. Over 2,000 devices have been compromised using two newly discovered vulnerabilities. These flaws allow attackers to gain full control of the affected firewalls.
Let’s break this down and explore how this happened, why it matters, and how to protect your systems.
Hackers exploited two security flaws in Palo Alto Networks’ firewalls. These flaws, called zero-day vulnerabilities, are weaknesses discovered before the company can fix them. The vulnerabilities are:
These flaws were officially disclosed last week after being flagged by Palo Alto Networks on November 8. Hackers used them together to create an exploit chain, granting them complete control of devices.
The attackers used anonymous VPN services to hide their identities. They targeted the firewalls’ management web interfaces, which are the control panels administrators use to manage firewalls.
Once inside, they deployed malware and ran dangerous commands. Shadowserver, a free threat monitoring platform, confirmed that over 2,000 devices have been compromised so far.
Firewalls protect your network by blocking unauthorized access. When attackers gain control of firewalls, they can:
This is why these vulnerabilities have been labeled “critical.”
1. Government Action:
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added these vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. Federal agencies must patch affected systems by December 9.
2. Palo Alto Networks’ Response:
The company urged customers to restrict access to the firewalls’ management interfaces. They also advised updating software to patch the vulnerabilities immediately.
3. Ongoing Investigation:
Palo Alto Networks is investigating the attack and confirmed that public exploit tools are already available. This increases the risk of further attacks.
If your organization uses Palo Alto Networks firewalls, take these steps to secure them:
Palo Alto Networks is working to address the issue and has provided guidance for securing firewalls. However, the availability of public exploit tools means the risk isn’t going away soon. Organizations must act swiftly to protect their networks.
This incident is a sobering reminder of how critical it is to keep systems up-to-date and follow cybersecurity best practices such as protecting all administrative access to limited internal networks (not even VPNs!). Firewalls are your network’s first line of defense, and compromising them can open the door to devastating attacks.
Don’t wait for hackers to strike. Patch your systems, secure your access, and stay one step ahead of cyber threats.
Not ready to sign up yet, but want to learn more? Attend our monthly webinar to see a demo of CyberHoot, ask questions, and learn what’s new.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.