TLDR:
- Palo Alto Networks patched a critical flaw in its Expedition migration tool that could lead to an admin account takeover.
- A newly disclosed flaw in the RADIUS protocol called BlastRADIUS was also fixed by the American cybersecurity firm.
Palo Alto Networks has released security updates to address five security flaws impacting its products, including a critical bug in its Expedition migration tool that could lead to an authentication bypass. Cataloged as CVE-2024-5910, the vulnerability could allow an attacker with network access to Expedition to take over an admin account. The flaw impacts all versions of Expedition prior to version 1.2.92. Another flaw in the RADIUS protocol called BlastRADIUS, could allow an adversary-in-the-middle (AitM) attack between a PAN-OS firewall and a RADIUS server, allowing privilege escalation to ‘superuser’. These vulnerabilities affect various versions of PAN-OS and Prisma Access. Users are advised to update to the latest versions to secure against potential threats.
Furthermore, Palo Alto Networks recommends restricting network access to Expedition to authorized users, hosts, or networks as a workaround for the Expedition migration tool flaw. The company also stated that neither CHAP nor PAP should be used without TLS encryption when used in conjunction with a TLS tunnel to avoid the BlastRADIUS vulnerability. It’s important to note that PAN-OS firewalls configured to use EAP-TTLS with PAP as the authentication protocol for a RADIUS server are not susceptible to the attack.