Monday , May 20 2024
palo alto

Palo Alto network shared latest remediation of CVE-2024-3400

Palo Alto Networks has given urgent advice to the remediation of a critical vulnerability, known as CVE-2024-3400, which attackers have used to get unauthorized access.

The cybersecurity company has provided clear steps for organizations to reduce the risks of this breach and protect their networks from future attacks.

BCSI BLOG POST
SonicWALL Vulnerability Traded; threating for Corporate network in Bangladesh

SonicWALL SSL-VPN provides secure remote access to an organization's internal network and resources through an encrypted SSL connection. This kind...
Read More
BCSI BLOG POST  SonicWALL Vulnerability Traded; threating for Corporate network in Bangladesh

Banking trojan Grandoreiro targeting about 1,500 banks over 60 countries

The banking trojan "Grandoreiro" is spreading widely through a phishing campaign in over 60 countries, aiming at customer accounts of...
Read More
Banking trojan Grandoreiro targeting about 1,500 banks over 60 countries

Australian gov.t warns of ‘large-scale ransomware data breach’

Australian police are investigating a big data breach in a healthcare company after a ransomware attack on Thursday. The website...
Read More
Australian gov.t warns of ‘large-scale ransomware data breach’

Patch Now: CISA Warns of Actively Exploited D-Link Router Vulnerabilities

he U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced that two security flaws in D-Link routers have been added to...
Read More
Patch Now: CISA Warns of Actively Exploited D-Link Router Vulnerabilities

New “Antidot” Banking Trojan disguised Fake Google Play Updates

The "Antidot" Android Banking Trojan pretends to be a Google Play update app and targets Android users in different regions....
Read More
New “Antidot” Banking Trojan disguised Fake Google Play Updates

CISA Published Encrypted DNS Implementation Guidance

CISA published a guide on using Encrypted Domain Name System (DNS) for federal civilian agencies to improve cybersecurity and meet...
Read More
CISA Published Encrypted DNS Implementation Guidance

Cyble Research
Transparent Tribe & SideCopy: A Cyber Alliance Targeting India

Cyble Research and Intelligence Labs found that two cyber threat groups, Transparent Tribe (APT36) and SideCopy, are using advanced strategies...
Read More
Cyble Research  Transparent Tribe & SideCopy: A Cyber Alliance Targeting India

Recordedfuture report
Hackers Exploit GitHub to Spread Malware targeting operating systems

Recorded Future's Insikt Group has discovered a major cyber threat campaign carried out by Russian-speaking hackers, possibly located in the...
Read More
Recordedfuture report  Hackers Exploit GitHub to Spread Malware targeting operating systems

ALERT
CISA issued Seventeen Industrial Control Systems Advisories

ISA issued seventeen advisories about Industrial Control Systems (ICS) on May 16, 2024. These advisories give important information about security...
Read More
ALERT  CISA issued Seventeen Industrial Control Systems Advisories

Intel released 41 Security Advisories Over 90 Vulnerabilities

Intel released 41 security advisories this Patch Tuesday, which contain information about over 90 vulnerabilities in their products. The company...
Read More
Intel released 41 Security Advisories Over 90 Vulnerabilities
Environment:
Palo Alto Firewalls
PAN-OS 10.2.x, 11.0.x, 11.1.x (Refer to the Palo Alto Networks Security Advisory for the affected versions)
CVE-2024-3400
GlobalProtect

Procedure:

Level 0 Probe: Unsuccessful exploitation attempt
Suggested Remediation: Update to the latest PAN-OS hotfix.
As best practice to secure running-configs, create a master key and elect AES-256-GCM.
Reason for suggested remediation: PAN-OS hotfixes sufficiently fix the vulnerability. Private Data reset or Factory reset is not suggested as there is no indication of a compromise.

Level 1 Test:
Vulnerability being tested on the device, a 0-byte file has been created and is resident on the firewall, no indication of any known unauthorized command execution.
Suggested Remediation: Update to the latest PAN-OS hotfix.
As best practice to secure running-configs, create a master key and elect AES-256-GCM.
Reason for suggested remediation: PAN-OS hotfixes sufficiently fix the vulnerability. Private data reset or factory reset is not suggested as there is no indication of any known unauthorized command execution or exfiltration of files.

Level 2 Potential Exfiltration:
A file on the device has been copied to a location accessible via a web request, though the file may or may not have been subsequently downloaded. Typically, the file we have observed being copied is running_config.xml. The suggested remediation will eliminate the possibility of capturing forensic artifacts.
Suggested Remediation: Update to the latest PAN-OS hotfix and perform a Private Data Reset
How To Perform Private Data Reset and Factory Reset as part of CVE-2024-3400 Level 2 and Level 3 Remediation
Reason for suggested remediation: Performing a private data reset eliminates risks of potential misuse of device data.

Level 3 Interactive access:
Interactive command execution: May include shell-based back doors, introduction of code, pulling files, running commands. The suggested remediation will eliminate the possibility of capturing Forensic Artifacts.
Suggested Remediation: Update to the latest PAN-OS hotfix and perform a Factory Reset
How to Perform Private Data Reset and Factory Reset as part of CVE-2024-3400 Level 2 and Level 3 Remediation
Reason for suggested remediation: A factory reset is recommended due to evidence of more invasive threat actor activity.

Palo Alto Networks has highlighted the importance of regular security audits and advanced threat detection tools to find and prevent vulnerabilities from being exploited.

Check Also

Flag

Cyble Research
Transparent Tribe & SideCopy: A Cyber Alliance Targeting India

Cyble Research and Intelligence Labs found that two cyber threat groups, Transparent Tribe (APT36) and …

Leave a Reply

Your email address will not be published. Required fields are marked *