<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Critical RCE Vulnerability in Palo Alto Networks’ GlobalProtect in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Critical-RCE-Vulnerability-in-Palo-Alto-Networks-GlobalProtect/m-p/69584#M1178</link>
    <description>&lt;P&gt;That’s about as bad as it gets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are *you* running Global Protect, or sending telemetry to PAN?&lt;/P&gt;</description>
    <pubDate>Wed, 17 Apr 2024 16:13:49 GMT</pubDate>
    <dc:creator>Early_Adopter</dc:creator>
    <dc:date>2024-04-17T16:13:49Z</dc:date>
    <item>
      <title>Critical RCE Vulnerability in Palo Alto Networks’ GlobalProtect</title>
      <link>https://community.isc2.org/t5/Threats/Critical-RCE-Vulnerability-in-Palo-Alto-Networks-GlobalProtect/m-p/69558#M1177</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Palo Alto Networks has released hotfixes to address a critical command injection vulnerability in multiple versions of their PAN-OS software.&amp;nbsp;Palo Alto Networks was alerted to the vulnerability by researchers from Volexity.&amp;nbsp;The flaw is being actively exploited to place Python backdoors on vulnerable devices. According to Palo Alto Networks, the flaw affects “PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 firewalls configured with GlobalProtect gateway or GlobalProtect portal (or both) and device telemetry enabled.”&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400?is=2e17210a000df3b23714ee0b7fabf90d53a139a7fd871f741a8f77fe7ad94a1a" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2024-3400?is=2e17210a000df3b23714ee0b7fabf90d53a139a7fd871f741a8f77fe7ad94a1a&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/exploit-released-for-palo-alto-pan-os-bug-used-in-attacks-patch-now/?traffic_source=Connatix" target="_blank" rel="noopener"&gt;https://www.bleepingcomputer.com/news/security/exploit-released-for-palo-alto-pan-os-bug-used-in-attacks-patch-now/?traffic_source=Connatix&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisa.gov/news-events/alerts/2024/04/12/cisa-adds-one-known-exploited-vulnerability-catalog" target="_blank" rel="noopener"&gt;https://www.cisa.gov/news-events/alerts/2024/04/12/cisa-adds-one-known-exploited-vulnerability-catalog&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2024 04:25:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Critical-RCE-Vulnerability-in-Palo-Alto-Networks-GlobalProtect/m-p/69558#M1177</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-04-17T04:25:16Z</dc:date>
    </item>
    <item>
      <title>Re: Critical RCE Vulnerability in Palo Alto Networks’ GlobalProtect</title>
      <link>https://community.isc2.org/t5/Threats/Critical-RCE-Vulnerability-in-Palo-Alto-Networks-GlobalProtect/m-p/69584#M1178</link>
      <description>&lt;P&gt;That’s about as bad as it gets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are *you* running Global Protect, or sending telemetry to PAN?&lt;/P&gt;</description>
      <pubDate>Wed, 17 Apr 2024 16:13:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Critical-RCE-Vulnerability-in-Palo-Alto-Networks-GlobalProtect/m-p/69584#M1178</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2024-04-17T16:13:49Z</dc:date>
    </item>
  </channel>
</rss>

