Palo Alto Networks has warned its users about 34 vulnerabilities in their products and released four security advisories. They haven’t found any attacks yet, but it’s important for users to update their systems quickly.
Certain Palo Alto products, specifically PAN-OS and GlobalProtect App, are affected by vulnerabilities. Some of these security gaps stem from third-party software, underscoring the interconnected nature of today’s digital ecosystem.
By infosecbulletin
/ Wednesday , March 12 2025
GreyNoise warns of a coordinated increase in the exploitation of Server-Side Request Forgery (SSRF) vulnerabilities across various platforms. "At least...
Read More
By infosecbulletin
/ Wednesday , March 12 2025
NVIDIA has released a software update for Riva to fix security vulnerabilities that could allow privilege escalation, data tampering, denial...
Read More
By infosecbulletin
/ Wednesday , March 12 2025
On Tuesday, Apple fixed a critical zero-day vulnerability affecting nearly all supported iPhones and iPads. The company noted that it...
Read More
By infosecbulletin
/ Wednesday , March 12 2025
Microsoft's March 2025 Patch Tuesday update fixes 57 flaws, including seven zero-day exploits, six of which are actively being exploited....
Read More
By infosecbulletin
/ Tuesday , March 11 2025
Cato CRTL team said, a new botnet campaign dubbed Ballista target the unpatched TP-Link Archer routers. CVE-2023-1389 is a serious...
Read More
By infosecbulletin
/ Tuesday , March 11 2025
A critical vulnerability, CVE-2025-24813, has been found in Apache Tomcat, which could let attackers execute remote code, leak sensitive data,...
Read More
By infosecbulletin
/ Tuesday , March 11 2025
CISA included three vulnerabilities in Ivanti Endpoint Manager—CVE-2024-13159, CVE-2024-13160, and CVE-2024-13161—in its Known Exploited Vulnerabilities catalog. Federal agencies must address...
Read More
By infosecbulletin
/ Sunday , March 9 2025
Ransomware attacks reached a record high in February, surpassing previous months, according to a Cyble report. The Cyble report tracked...
Read More
By infosecbulletin
/ Saturday , March 8 2025
NTT Communications Corporation discovered illegal access to its facilities on February 5 and confirmed on February 6 that some information...
Read More
By infosecbulletin
/ Friday , March 7 2025
India's Maharashtra Deputy Chief Minister Devendra Fadnavis disclosed alarming cyber fraud figures for Pune in 2024 during the Assembly session....
Read More
Prisma Access Browser Update:
The Prisma Access Browser, based on Chromium, has been updated to version 127.100.2858.4. This update includes fixes for 31 vulnerabilities from four “Chromium” updates between July 16 and August 6.
Of particular concern are CVE-2024-7532 and CVE-2024-6990, labeled as “Critical” by Google. Though Palo Alto assigns these a slightly lower CVSSv4.0 base score of 8.6, they still carry a “High” severity rating, emphasizing the need for swift action.
Cortex XSOAR Patch:
Cortex XSOAR version 1.12.33 fixed a command injection vulnerability (CVE-2024-5914) in the CommonScripts Pack. This flaw has a CVSS score of 7.0 and could allow an attacker to execute arbitrary commands without authentication, potentially compromising the system.
Additional Vulnerabilities Addressed:
The advisories also tackled:
CVE-2024-5916 (CVSS 6):
A fixed vulnerability in PAN-OS and Cloud NGFW versions that unintentionally exposed sensitive data
CVE-2024-5915 (CVSS 5.2):
The GlobalProtect app on Windows has a vulnerability that allows local users to run programs with higher privileges. The issue will be fixed in future app updates.
Call to Action:
Palo Alto Networks advises users to update their systems with the latest patches to protect against potential cyber threats. It’s important to stay proactive in cybersecurity to ensure strong defense.