- Eclypsium security researchers find several errors in multiple Palo Alto Networks Firewalls
- They claim that vulnerabilities are quite severe
- Palo Alto Networks says that if the operating system is updated, and the nominal safety configuration, there is no risk
Security researchers have criticized Palo Alto Reds Firewalls, claiming to have discovered severe vulnerabilities that undermine the entire point of the products.
Cybersecurity researchers Eclypsium published a report detailing a series of security defects that affect the Palo Alto Networks Firewall firmware, as well as poorly configured security features.
The company responded by saying that vulnerabilities were exaggerated, which are almost impossible to take advantage of in nature and have not seen them abuse anywhere.
Logofail, pixiefail and other problems
“These were not dark vulnerabilities, in the corner,” the researchers said. “On the other hand, these were well -known problems that we would not expect to see even on a laptop of degree of consumption. These problems could allow the attackers to even evade the most basic integrity protections, such as the safe start, and modify the firmware of the device If it is exploited “
Eclypisum said the defects were found in PA-3260, PA-1410 and PA-415. The first reached the end of the sale in mid -2023, while the other two are still fully compatible.
Errors are traced as CVE-2020-10713, CVE-2022-24030, CVE-2021-33627, CVE-2021-42060, CVE-2021-42554, CVE-2021-43323 and CVE-2021-45970, Logofail, Pixiefail , CVE-2023-1017 and Intel Bootguard leaked the Bypass keys.
After the news was known, The hacker news Communicated with the company to comment. Palo Alto Networks responded by saying that “the necessary scenarios for successful exploitation do not exist in the PAN -os software updated under normal conditions with safe management interfaces implemented according to the best practices guidelines.”
In other words, if the Firewalls operating system is updated and insured management interfaces are correctly implemented, there is no risk.
“Palo Alto Networks is not aware of any malicious exploitation of these problems. We support the quality and integrity of our technology, ”he added.
“While the conditions required to exploit these vulnerabilities are not available for users or administrators of the PAN-OS software, we are working with the third party supplier to develop any mitigation that may be necessary. We will provide more updates and guidance to affected customers as they are available. “