Новости компьютерной безопасности:

  Latest News

Critical Palo Alto Firewall Vulnerabilities Let Hackers Bypass Secure Boot & Exploit Firmware

С сайта: Vulnerability(cybersecuritynews.com)

Critical Palo Alto Firewall Vulnerabilities Let Hackers Bypass Secure Boot & Exploit Firmware

Author: Balaji N

A recent cybersecurity report has identified critical vulnerabilities in Palo Alto Networks firewall devices that could enable attackers to bypass Secure Boot protections, exploit firmware-level flaws, and obtain elevated privileges, allowing them to maintain persistence within the networks of targeted organizations.

Eclypsium researchers have revealed findings highlighting the growing threats to security appliances tools specifically designed to protect enterprises from cyber risks.

Ironically, attackers are increasingly targeting these devices due to lapses in supply chain security and device integrity, making organizations more vulnerable to breaches.

Key Vulnerabilities Targeting Palo Alto Devices
The vulnerabilities affect multiple Palo Alto firewall models, including the PA-3260 , PA-1410 , and PA-415 , which are deployed widely across enterprises.


Researchers revealed a series of well-known, unpatched vulnerabilities, including Secure Boot bypass flaws, firmware-based risks, and misconfigured hardware protections.

One of the most concerning issues relates to the BootHole vulnerability, a flaw in the GRUB2 bootloader that allows attackers to bypass Secure Boot protections. Secure Boot is a critical defense mechanism designed to verify the integrity of the boot process and prevent malicious code execution.

Eclypsium found that Palo Alto failed to properly update its certificates (DBX) to block malicious or outdated bootloaders vulnerable to BootHole exploits.

Combined with other vulnerabilities (CVE-2024-0012 and CVE-2024-9474), attackers could theoretically install persistent malware or bootkits by gaining root privileges.

LogoFAIL is a set of critical UEFI vulnerabilities affecting firmware vendors and device manufacturers. These flaws in image parsing libraries, used to display boot logos, allow arbitrary code execution during the early DXE phase, compromising systems before the OS and security tools load.

cyber security news
The PA-3260 platform, which uses firmware from Insyde Software, was found to contain six previously disclosed vulnerabilities in the highly privileged System Management Mode (SMM). Exploiting these flaws could allow attackers to bypass Secure Boot, escalate privileges, and install stealthy malware.

The PA-1410 and PA-415 are vulnerable to the “PixieFail” issue, which targets weaknesses in DHCPv6 implementation during the PXE network boot process. This could enable remote code execution (RCE) if attackers are on the same network.

cyber security news
“The vulnerabilities affect the network boot process in the PXE environment, which is essential for loading operating systems from the network at boot time.”

“All discovered vulnerabilities are within the DHCPv6 functionality as PXE relies on DHCP at boot time to obtain an IP address and discover the location of the OS image to load…The PixieFail vulnerabilities are notable because they allow remote-code execution (RCE) given the attacker is on the same network.”

The PA-415 model was found to have poorly configured flash memory protections, allowing attackers to modify UEFI firmware and bypass key security mechanisms.

Leaked cryptographic keys for the Intel BootGuard feature were also highlighted, further undermining hardware-based security protections against firmware tampering.

cyber security news
The vulnerabilities uncovered in Palo Alto firewalls represent a significant threat to enterprise security. Attackers could exploit these flaws to achieve deep, persistent control over targeted networks, bypassing traditional defenses and accessing sensitive information.

“These aren’t minor issues. These are vulnerabilities that provide attackers a pathway to evade security controls and implant long-term threats,” said Mickey Shkatov, a lead researcher at Eclypsium.

Given the severity of these findings, organizations are urged to take immediate mitigating actions:

  1. Firmware Updates : Ensure all devices are updated with the latest firmware and patches provided by the manufacturer.
  2. Supply Chain Security : Conduct rigorous assessments of vendor hardware and software components.
  3. Monitor Device Integrity : Implement continuous monitoring to detect unauthorized firmware changes or tampering.
  4. Network Segmentation : Limit the exposure of security appliances to external threats by properly segmenting networks.
  5. Administrative Access Controls : Restrict root or elevated privileges to minimize the risk of exploitation.

The vulnerabilities highlight the pressing need for vendors such as Palo Alto Networks to address gaps in supply chain security, implement stringent firmware integrity measures, and improve device resiliency against modern attack techniques. Without these safeguards, even the most sophisticated security tools can become liabilities.

As organizations evolve in a rapidly changing cyber threat environment, a proactive approach to addressing vulnerabilities in security appliances will be critical to ensuring robust defenses.





#Cyber_Security_News #Vulnerability #Vulnerability_News #cyber_security #cyber_security_news #vulnerability

Оригинальная версия на сайте: Critical Palo Alto Firewall Vulnerabilities Let Hackers Bypass Secure Boot & Exploit Firmware
Вернуться к списку новостей К свежим новостям Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.

Вернуться к списку новостей Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.


Новости проекта CSN:

✉ CSN.net4me.net

Обновление сайта csn.net4me.net

Обновление сайта csn.net4me.net 💻
cyber security news
  • Физически мы переехали на новый сервер. Благодарим наших подписчиков и постоянных читателей за терпение и понимание.
  • Сайт csn.net4me.net полностью адаптирован для работы по шифрованному SSL соединению.
  • Изменен механизм обработки и отображения опасных и критических уязвимостей.

Благодарим что вы с нами.


#CSN_обновление_сайта
https://csn.net4me.net/cyber_security_8301.html

Дополнительный материал

О проекте CSN

Проект CSN.net4me.net родился 16 Марта 2018 года.
Проект находится в самом начале своего развития. Конечно оформление, наполнение будет меняться. Одно останется неизменным - самые свежие новости компьютерной и сетевой безопасности.

О проекте net4me

Проект net4me.net развивался как сборник готовых решений и документации по темам компьютерной безопасности, сетевых решений и СПО (в часности linux). Темпы развития IT отрасли оказались столь быстрыми, что некоторые знания, технологии и информация о них устаревали мгновенно. Тем не менее, некоторый материал net4me.net до сих пор востребован.

Об источниках

Новости берутся CSN из открытых и доступных каждому источников. Авторы проекта стараются подбирать авторитетные и проверенные источники. Но, тем не менее, не несут ответственности за содержимое новостей. В каждой новости указывается источник этой новости, её автор и ссылка на оригинал новости.

Информация

Если вы желаете чтобы новости вашего ресурса были размещены на сайте CSN, то свяжитесь с авторами проекта csn@net4me.net и предложите ссылку на rss или xml ленту новостей вашего ресурса. Любая предложенная информация будет рассмотрена редакцией.