Description: A critical command injection vulnerability has been discovered in the GlobalProtect feature of Palo Alto Networks PAN-OS software. This vulnerability affects specific PAN-OS versions and configurations, allowing unauthenticated attackers to execute arbitrary code with root privileges on the firewall. Notably, Cloud NGFW, Panorama appliances, and Prisma Access are not impacted.
Affected Versions:
PAN-OS 11.1: < 11.1.0-h3, < 11.1.1-h1, < 11.1.2-h3
PAN-OS 11.0: < 11.0.2-h4, < 11.0.3-h10, < 11.0.4-h1
PAN-OS 10.2: < 10.2.5-h6, < 10.2.6-h3, < 10.2.7-h8, < 10.2.8-h3, < 10.2.9-h1
Solution:
Upgrade to fixed versions: PAN-OS 10.2.9-h1, PAN-OS 11.0.4-h1, PAN-OS 11.1.2-h3, or later.
Apply hotfixes for other commonly deployed maintenance releases.
Exploitation Status:
Increasing number of attacks leveraging the vulnerability.
Proof of concepts publicly disclosed by third parties.
Weakness Type: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
Recommended Mitigations:
Use Threat Prevention subscription to block attacks (Threat IDs: 95187, 95189, 95191).
Ensure vulnerability protection is applied to GlobalProtect interfaces.
Disabling device telemetry is no longer an effective mitigation.
Additional Information:
Threat brief: Unit 42 threat brief
Detection: Check device logs for indicators of exploit activity.
Investigation: Open a case in the Customer Support Portal for device compromise assessment.
Acknowledgments: Palo Alto Networks acknowledges Volexity for detecting and identifying this issue.
FAQ:
Exploitation: Increasing number of attacks reported.
Indicator Checks: Use provided command from PAN-OS CLI.
Compromise Assessment: Upload technical support file for investigation.
Additional Indicators: Refer to Unit42 Threat Brief and Volexity blog post.
Impact: While Cloud NGFW firewalls are not impacted, specific PAN-OS versions and configurations deployed in the cloud are affected.
This vulnerability poses a significant risk to affected systems and requires immediate attention to mitigate potential exploitation and compromise.