Рет қаралды 229
Join Cory in today's quick 10-minute InfoSec Exec BLUF as he breaks down the recent critical vulnerability in Palo Alto's PAN-OS and the security incident involving Sisense.
Stay informed on the latest cybersecurity threats and updates in just minutes every week! Plus, don't forget to access premium content on penetration testing with our exclusive ROI calculator: risk3sixty.com/whitepaper/pen...
Palo Alto PAN-OS Critical Vulnerability
Executive Summary:
A critical command injection vulnerability was discovered in Palo Alto Networks PAN-OS software that affects firewalls running PAN-OS versions 10.2, 11.0, and 11.1. An unauthenticated attacker can exploit this vulnerability to execute arbitrary code with root privileges on the firewall, providing control over the device.
The impact of a successful exploit of this issue can be rated as ‘Critical’. Palo Alto Networks has released hotfixes to address CVE-2024-3400 for version 11.1 of PAN-OS. However, patches are not yet available for versions 10.2 or 11.0. It is recommended to update the PAN-OS device to version 11.1 if possible. In the meantime, there are a few steps that can be taken to mitigate the risk of exploitation - Specific threat signatures related to this issue should be enabled and device telemetry should be disabled.
Additional Reading:
www.bleepingcomputer.com/news...
www.bleepingcomputer.com/news...
Sisense Security Incident
Executive Summary:
In April 2024, data analytics platform provider Sisense suffered a security breach. The exact nature of the breach is still under investigation, but it is believed that attackers gained access to a Sisense GitLab code repository and used stolen credentials to compromise cloud servers storing customer data.
The full extent of the Sisense breach is unknown, but affected organizations should immediately perform password and credential resets on all assets connected to the Sisense platform including user and database passwords, revocation of certificates used for authentication, API keys, and to invalidate any Access Tokens.
Additional Reading:
krebsonsecurity.com/2024/04/w...
www.cisa.gov/news-events/aler...