Dear All,
Palo Alto Networks has released hotfixes to address a critical command injection vulnerability in multiple versions of their PAN-OS software. Palo Alto Networks was alerted to the vulnerability by researchers from Volexity. The flaw is being actively exploited to place Python backdoors on vulnerable devices. According to Palo Alto Networks, the flaw affects “PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 firewalls configured with GlobalProtect gateway or GlobalProtect portal (or both) and device telemetry enabled.”
That’s about as bad as it gets.
Are *you* running Global Protect, or sending telemetry to PAN?