Summary:
The German CERT has issued a critical warning regarding the exploitation of two vulnerabilities in Palo Alto Networks’ PAN-OS, urging immediate patching to prevent unauthorized access and command execution. These vulnerabilities, CVE-2024-0012 and CVE-2024-9474, pose significant risks to organizations worldwide. The urgency for remediation is heightened as active attacks are already underway.
#PaloAlto #VulnerabilityAlert #OperationLunarPeek
#PaloAlto #VulnerabilityAlert #OperationLunarPeek
Keypoints:
- German CERT warns of active exploitation of vulnerabilities in PAN-OS.
- CVE-2024-0012 allows unauthenticated access to management interfaces.
- CVE-2024-9474 enables privilege escalation for authenticated users.
- Both vulnerabilities can be chained for remote command execution.
- Palo Alto Networks has released patches for affected versions.
- Organizations are urged to secure management interfaces and monitor for suspicious activity.
- Active exploitation observed under the banner “Operation Lunar Peek.”
- Detection rules for webshells and abnormal activities are recommended.
MITRE Techniques
- Exploitation for Client Execution (T1203): Exploits vulnerabilities in software to execute arbitrary code.
- Command and Control (T1071): Utilizes multiple command and control domains to maintain communication with compromised systems.
- Privilege Escalation (T1068): Exploits vulnerabilities to gain elevated access to resources.
- Remote File Copy (T1105): Transfers files from a remote location to a compromised system.
IoC:
- [IP Address] 41.215.28[.]241
- [IP Address] 45.32.110[.]123
- [IP Address] 103.112.106[.]17
- [IP Address] 104.28.240[.]123
- [IP Address] 182.78.17[.]137
- [IP Address] 216.73.160[.]186
- [IP Address] 91.208.197[.]167
- [IP Address] 104.28.208[.]123
- [IP Address] 136.144.17[.]146
- [IP Address] 136.144.17[.]149
- [IP Address] 136.144.17[.]154
- [IP Address] 136.144.17[.]158
- [IP Address] 136.144.17[.]161
- [IP Address] 136.144.17[.]164
- [IP Address] 136.144.17[.]166
- [IP Address] 136.144.17[.]167
- [IP Address] 136.144.17[.]170
- [IP Address] 136.144.17[.]176
- [IP Address] 136.144.17[.]177
- [IP Address] 136.144.17[.]178
- [IP Address] 136.144.17[.]180
- [IP Address] 173.239.218[.]248
- [IP Address] 173.239.218[.]251
- [IP Address] 209.200.246[.]173
- [IP Address] 209.200.246[.]184
- [IP Address] 216.73.162[.]69
- [IP Address] 216.73.162[.]71
- [IP Address] 216.73.162[.]73
- [IP Address] 216.73.162[.]74
- [File Hash] 3C5F9034C86CB1952AA5BB07B4F77CE7D8BB5CC9FE5C029A32C72ADC7E814668
Full Research: https://cyble.com/blog/german-cert-warns-attacks-are-happening/