The Information Highway

The Information Highway

Font size: +
2 minutes reading time (341 words)

RedTail exploits PAN-OS vulnerability

Threat update

Palo Alto Networks has recently disclosed a critical zero-day vulnerability, CVE-2024-3400, within its PAN-OS operating system. The flaw, found in the GlobalProtect Gateway, is currently under active exploitation. Additionally, the threat actors behind RedTail cryptocurrency mining malware have added this vulnerability to its exploit arsenal, further intensifying the threat. 

Technical Detail and Additional Info

What is the threat?

The threat is a zero-day vulnerability classified under CWE-77 for command injection. It allows unauthenticated attackers to execute arbitrary OS commands on affected systems. Cybercriminals have exploited this flaw to install a custom Python backdoor named UPSTYLE, facilitating further command execution through specific network requests. The RedTail malware, notorious for its cryptocurrency mining activities, now leverages this vulnerability to enhance its exploitation capabilities. 

Why is it noteworthy?

The vulnerability has a CVSS score of 10.0. The critical nature and active exploitation of this vulnerability highlights significant security risks for organizations using Palo Alto Networks' firewalls. The addition of this vulnerability to RedTail's toolkit, coupled with its new anti-analysis techniques and private mining pools, underscores the evolving sophistication of cyber threats targeting network infrastructure.

What is the exposure or risk?

Successful exploitation allows attackers to gain control over affected devices, leading to potential data theft, system compromise, and disruption of operations. RedTail's ability to exploit this vulnerability further increases the risk, as it can deploy a payload tailored to the victim's CPU architecture. This risk is compounded by the malware's exploitation of other known vulnerabilities in various devices and applications, making it a pervasive threat. 

What are the recommendations?

 LBT Technology Group recommends the following actions to keep your network secured:

  • Apply the upcoming hotfixes from Palo Alto Networks as soon as they are released.
  • Monitor your systems for any unusual activity that might indicate a compromise. This includes checking logs and using intrusion detection systems to identify potential exploitation attempts.

References

 For more in-depth information about the recommendations, please visit the following links:


If you have any questions, please contact LBT's Sales Engineer.

New Fog ransomware targets US education sector via...
FBI recovers 7,000 LockBit keys, urges ransomware ...

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Monday, 23 December 2024

Captcha Image

Top Breaches Of 2023

Customers Affected In T-Mobile Breach
Accounts Affected In MOVEit Breach
Customers Affected In MCNA Insurance Data Breach
Individuals Affected In PharMerica Data Breach
Users Affected In ChatGPT Major Data Breach
*Founder Shield End of Year 2023