Posted on 02/25/2016 7:07:26 PM PST by Utilizer
Security vendor Palo Alto Networks has issued a security advisory covering four vulnerabilities affecting its PAN-OS operating system and is advising users to patch immediately.
Two vulnerabilities in particular appear to be particularly dangerous, according to Johannes Ullrich of security vendor SANS Institute.
Rated as "critical" by Palo Alto Networks, a buffer overflow in the PAN-OS GlobalProtect SSL VPN web interface could be abused to bypass restrictions to limit traffic to trusted IP addresses only.
"An attacker with network access to the vulnerable GlobalProtect portal may be able to perform a denial-of-service (DoS) attack on the device, and may be able to perform remote code execution on the affected device," Palo Alto Networks said.
Users can apply emergency content update 563, which contains intrusion protection system signature #38902 to their firewall rules, as a workaround to protect traffic to the GlobalProtect portal, the vendor said.
The vulnerability was discovered by Felix Wilhelm of ERNW Research.
A second vulnerability marked as "high" is found in the API for the PAN-OS management web interface and could allow attackers to execute arbitrary commands, Ullrich said.
(Excerpt) Read more at itnews.com.au ...
Wonderful. I still like me new Palo alto
Ouch. Not good for my employer.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.