Palo Alto networks warn of the other protection wall vulnerability under attack by infiltrators


Palo Alto Networks giant for cybersecurity in the United States has warned that infiltrators are taking advantage of another gap in its protection wall program to storm unpleasant customer networks.

The California-based company confirmed on Tuesday that the attackers are taking advantage of a recently unveiled security vulnerability in the Pan-OS, the operating system that runs the Palo Alto Networks Firewalls, according to the California-based company on Tuesday.

Assetnote Security Company first find out Weakness, tracking Cve-2025-0108Earlier this month while analyzing two weaknesses in the Balu Alto protection wall, which was used in previous attacks.

Palo Alto Networks issued a consultant on the same day and urgently urged customers to correct for the latest errors. Company Her consultant update Tuesday to warn that weakness is under active attack.

The company said that the malicious attackers are vulnerable to the pre-unveiled defects-Cve-2024-9474 and CVE-2025-0111-to target the uninterrupted and unfinished web facades. Cve-2024-9474 It has been exploited in the attacks since November 2024We have previously informed us.

Palo Alto networks did not explain how the three weaknesses were linked to chains by the infiltrators, but I noticed that the complexity of the attack is “low”.

The exploitation volume is not yet known, but the threat of starting start He said in a blog post On Tuesday, I noticed 25 IP addresses taking advantage of Pan-OS weakness, an increase in IP addresses on February 13, indicating high exploitation activity. The attempts to exploit by Greynoise have been marked as “harmful”, indicating that the actors are threats behind exploitation instead of security researchers.

“This highly popular defects allow the non -hugged attackers to implement specific php texts, which may lead to unauthorized access to weak systems,” said Genoyez.

Greynoise says it has noticed the highest traffic levels in the United States, Germany and the Netherlands.

It is not known who is behind these attacks, or whether any sensitive data has been stolen from customer networks. Palo Alto networks did not immediately answer Techcrunch questions.

The CISA, the US government’s cybersecurity agency, added The well -known weakening points (KEV) is listed on the list Tuesday.

Leave a Reply

Your email address will not be published. Required fields are marked *