home.social

#knownexploitedvulnerabilitiescatalog — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #knownexploitedvulnerabilitiescatalog, aggregated by home.social.

  1. Palo Alto Networks released additional details about CVE-2024-3400: the fact that it is a combination of two bugs in PAN-OS; how an attacker was exploiting it; how disabling telemetry initially worked; and how they fixed it. The timeline from discovery to remediation encompasses the whole blog post. Overall a comprehensive after-action review from a company that notified the public almost immediately of an exploited zero-day. 🔗paloaltonetworks.com/blog/2024

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #PANOS #IOC

  2. Zscaler observed exploitation of the Palo Alto Networks PAN-OS command injection zero-day vulnerability CVE-2024-3400 following the release of the PoC exploit code. Zscaler provides an attack flow diagram, and a technical analysis of the Upstyle backdoor and its layers. IOC provided. 🔗 zscaler.com/blogs/security-res

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #threatintel #IOC

  3. TrustedSec CTO Justin Elze shared CVE-2024-3400 exploit in the wild on Twitter yesterday, reports that 149.28.194.95 was attempting to exploit CVE-2024-3400

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept #threatintel #IOC

  4. In case you missed it, Palo Alto Networks updated their security advisory in terms of product and mitigation guidance, exploit status, and PAN-OS fix availability: 🔗 security.paloaltonetworks.com/

    • Exploitation status: Proof of concepts for this vulnerability have been publicly disclosed by third parties.
    • Workarounds and mitigations: In earlier versions of this advisory, disabling device telemetry was listed as a secondary mitigation action. Disabling device telemetry is no longer an effective mitigation. Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability.
    • Solution:
      • - 10.2.6-h3 (Released 4/16/24)
      • - 11.0.3-h10 (Released 4/16/24)
      • - 11.0.2-h4 (Released 4/16/24)
      • - 11.1.0-h3 (Released 4/16/24)

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #ProofofConcept

  5. watchTowr may have successfully replicated CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 by Palo Alto Networks as an exploited zero-day, CWE-77: Command Injection; OS Command Injection Vulnerability in GlobalProtect Gateway, added to CISA KEV Catalog). Instead of releasing a Proof of Concept, they provided a "detection artefact generator tool" 🔗 labs.watchtowr.com/palo-alto-p

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #threatintel #IOC

  6. @jullrich of SANS ISC warns that the widely shared GitHub exploit is almost certainly fake (cc: @mttaggart ) and two IP addresses were attempting CVE-2024-3400 exploitation: 173.255.223.159 and 146.70.192.174 🔗 isc.sans.edu/diary/rss/30838

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #threatintel #IOC

  7. Happy hotfix day from Palo Alto Networks who released 3 hotfixes for CVE-2024-3400 (10.0 critical, disclosed 12 April 2024 as an exploited zero-day) with 15 more hotfixes expected in the coming days: 🔗 security.paloaltonetworks.com/

    • PAN-OS 10.2:
      • 10.2.9-h1 (Released 14 April)
      • 10.2.8-h3 (Released 15 April)
      • 10.2.7-h8 (Released 15 April)
      • 10.2.6-h3 (Released 16 April)
      • 10.2.5-h6 (Released 16 April)
      • 10.2.3-h13 (Released 18 April)
      • 10.2.1-h2 (Released 18 April)
      • 10.2.2-h5 (Released 18 April)
      • 10.2.0-h3 (Released 18 April)
      • 10.2.4-h16 (Released 18 April)
    • PAN-OS 11.0:
      • 11.0.4-h1 (Released 14 April)
      • 11.0.4-h2 (Released 17 April)
      • 11.0.3-h10 (Released: 16 April)
      • 11.0.2-h4 (Released 16 April)
      • 11.0.1-h4 (Released 18 April)
      • 11.0.0-h3 (Released 18 April)
    • PAN-OS 11.1:
      • 11.1.2-h3 (Released 14 April)
      • 11.1.1-h1 (Released 16 April)
      • 11.1.0-h3 (Released: 16 April)

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #threatintel #IOC

  8. It should come as no surprise that Palo Alto Networks did not release hotfixes* for affected versions of PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11 by the self-imposed deadline of Sunday 14 April 2024 like they estimated in their security advisory. 48 hours to develop/test/release is a tight delivery window with the whole infosec community breathing down their necks.

    EDIT: A hotfix is now available for select affected versions of PAN-OS: security.paloaltonetworks.com/

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #threatintel #IOC

  9. Just to make it easier to read through the various reports (saying almost the same exact thing), I've assembled a Palo Alto Networks zero-day MEGA list:

    UPDATE: Volexity and Unit 42 talk about the threat actor, campaign, and include indicators of compromise:

    Here's the rest of the related reporting:

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability #threatintel #IOC

  10. Hot off the press! CISA adds CVE-2024-3400 (10.0 critical, disclosed 12 April 2024, PAN-OS: OS Command Injection Vulnerability in GlobalProtect Gateway) to the Known Exploited Vulnerabilities (KEV) Catalog 🔗 cisa.gov/news-events/alerts/20

    #CVE_2024_3400 #PaloAltoNetworks #zeroday #activeexploitation #eitw #kev #KnownExploitedVulnerabilitiesCatalog #vulnerability

  11. @jgreig of The Record writes that CISA confirmed reports by cybersecurity companies and researchers that some older D-Link devices are being exploited by threat actors, and added CVE-2024-3273 and CVE-2024-3272 to its Known Exploited Vulnerabilities list on Thursday 🔗 therecord.media/dlink-devices-

    #CVE_2024_3272 #CVE_2024_3273 #eitw #activeexploitation #CISA #KEV #KnownExploitedVulnerabilitiesCatalog #DLink

  12. Hot off the press! CISA adds D-Link vulnerabilities CVE-2024-3273 (7.3 high, Command Injection) and CVE-2024-3272 (9.8 critical, Hard-coded Credentials), both disclosed 03 April 2024, to the Known Exploited Vulnerabilities (KEV) Catalog 🔗 cisa.gov/news-events/alerts/20

    #CVE_2024_3272 #CVE_2024_3273 #eitw #activeexploitation #CISA #KEV #KnownExploitedVulnerabilitiesCatalog #DLink

  13. Red Canary reported that in late March 2024, threat actors exploited CVE-2023-48788 (9.8 critical, disclosed 12 March 2024 by Fortinet, Proof of Concept by Horizon3) in FortiClient enterprise management servers (FortiClient EMS) to install unauthorized remote management and monitoring (RMM) tools and PowerShell backdoors. While no IOC are listed, they provide detection methods for post-exploitation activity. 🔗 redcanary.com/blog/cve-2023-48

    #threatintel #CVE_2023_48788 #Fortinet #CISA #KEV #eitw #activeexploitation #KnownExploitedVulnerabilitiesCatalog