Hackers primed to exploit CVSS 10-rated flaw in Palo Alto's PAN-OS

The SAML-based authentication flaw in the firm’s networking services allows an attacker to gain access to assets

US Cyber Command has urged Palo Alto customers to their patch PAN-OS networking systems before cyber criminals have the opportunity to exploit a highly critical authentication vulnerability.

Assigned a rare CVSS score of 10/10, the flaw dubbed CVE-2020-2021 can allow an attacker to bypass authentication procedures and access a device without needing to provide credentials.

Advertisement - Article continues below

The vulnerability is triggered when the Security Assertion Markup Language (SAML) is enabled and the ‘validate identity provider certificate’ option is disabled. This causes the improper verification of signatures in PAN-OS, allowing an attacker with network access to the vulnerable server to access protected resources. 

“Please patch all devices affected by CVE-2020-2021 immediately, especially if SAML is in use,” US Cyber Command has tweeted. “Foreign APTs will likely attempt exploit soon. We appreciate Palo Alto Networks’ proactive response to this vulnerability.”

PAN-OS is the software that runs all Palo Alto firewalls, offering customers complete visibility and control of the apps in use by all users in all locations across an enterprise network. 

The flaw, which has been fixed, affects PAN-OS 9.1 versions earlier than PAN-OS 9.1.3, PAN-OS 9.0 versions earlier than PAN-OS 9.0.9, PAN-OS 8.1 versions earlier than PAN-OS 8.1.15, and all versions of PAN-OS 8.0, which has reached end-of-life. 

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Moreover, the flaw can only be exploited if SAML is in use for authentication. Elements of PAN-OS overseen by SAML-based authentication include virtual private network (VPN), GlobalProtect Gateways, GlobalProtect Portal, Captive Portal and Prisma Access. 

Vulnerabilities assigned a 10/10 rating on the CVSS scale are rare, and normally mean the exploit is highly exploitable, easy to trigger, and require little or no additional privileges and user interaction.

Related Resource

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

Nevertheless, the company has not yet seen evidence of active exploitation in the wild, despite warnings from US Cyber Command of imminent attempts by foreign APTs

Palo Alto has urged customers to ensure the signing certificate for their SAML Identity Provider is configured as the ‘Identity Provider Certificate’ before they upgrade to a fixed version of PAN-OS.

As short-term mitigation, restarting firewalls and the Panorama web interface eliminates any unauthorised sessions on the web interface. 

For evidence of a compromise, the company has urged customers to examine Authentication Logs, User-ID Logs, ACC NEtwork Activity Source/Destination Regions, Customers Reports, and GlobalProtect Logs in PAN-OS 9.1.0 and above.

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Most Popular

Visit/mobile/google-android/356373/over-2-dozen-additional-android-apps-found-stealing-user-data
Google Android

Over two dozen Android apps found stealing user data

7 Jul 2020
Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/cloud/356260/the-road-to-recovery
Sponsored

The road to recovery

30 Jun 2020