Palo Alto Networks Fixes Critical Bug in Expedition Migration Tool

July 12, 2024
1 min read




Article Summary

TLDR:

  • Palo Alto Networks patched a critical flaw in its Expedition migration tool that could lead to an admin account takeover.
  • A newly disclosed flaw in the RADIUS protocol called BlastRADIUS was also fixed by the American cybersecurity firm.

Palo Alto Networks has released security updates to address five security flaws impacting its products, including a critical bug in its Expedition migration tool that could lead to an authentication bypass. Cataloged as CVE-2024-5910, the vulnerability could allow an attacker with network access to Expedition to take over an admin account. The flaw impacts all versions of Expedition prior to version 1.2.92. Another flaw in the RADIUS protocol called BlastRADIUS, could allow an adversary-in-the-middle (AitM) attack between a PAN-OS firewall and a RADIUS server, allowing privilege escalation to ‘superuser’. These vulnerabilities affect various versions of PAN-OS and Prisma Access. Users are advised to update to the latest versions to secure against potential threats.

Furthermore, Palo Alto Networks recommends restricting network access to Expedition to authorized users, hosts, or networks as a workaround for the Expedition migration tool flaw. The company also stated that neither CHAP nor PAP should be used without TLS encryption when used in conjunction with a TLS tunnel to avoid the BlastRADIUS vulnerability. It’s important to note that PAN-OS firewalls configured to use EAP-TTLS with PAP as the authentication protocol for a RADIUS server are not susceptible to the attack.


Latest from Blog

Top 20 Linux Admin Tools for 2024

TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary

Bogus job tempts aerospace, energy workers

TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives