Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Palo Alto firewalls found vulnerable to secure download bypass and firmware exploits
Global Security

Palo Alto firewalls found vulnerable to secure download bypass and firmware exploits

AdminBy AdminJanuary 23, 2025No Comments3 Mins Read
Palo Alto Firewalls
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 23, 2025Ravi LakshmananFirmware Security / Vulnerability

Palo Alto Firewalls

A comprehensive evaluation of three firewall models from Palo Alto Networks found numerous known security flaws affecting the devices’ firmware as well as misconfigured security features.

“These were not obscure vulnerabilities in the corner,” security vendor Eclypsium said in a report shared with The Hacker News.

“Instead, these were very well-known issues that we didn’t expect to see even on a consumer-grade laptop. These issues could allow attackers to bypass even the most basic integrity protections, such as Secure Boot, and modify the device’s firmware if used.”

The company said it analyzed three firewalls from Palo Alto Networks, the PA-3260, PA-1410 and PA-415, the first of which officially reached sale ends August 31, 2023. The other two models are fully supported firewall platforms.

Cyber ​​security

A list of detected defects with common names Pandora’s boxis as follows –

  • CVE-2020-10713 aka BootHole (affects PA-3260, PA-1410, and PA-415), refers to a buffer overflow vulnerability that allows bypassing Secure Boot on enabled Linux systems
  • CVE-2022-24030, CVE-2021-33627, CVE-2021-42060, CVE-2021-42554, CVE-2021-43323, and CVE-2021-45970 (Affects PA-3260) which addresses a set of system management mode (SMM) vulnerabilities that affect the InsydeH2O UEFI Insyde Software firmware and can lead to elevation of privilege and bypassing of secure boot.
  • Logo FAIL (Affects PA-3260), which addresses a set of critical vulnerabilities discovered in Unified Extensible Firmware Interface (UEFI) code that exploit flaws in the image parsing libraries built into the firmware to bypass secure boot and execute malicious code during system startup
  • PixieFail (Affects PA-1410 and PA-415) which addresses a set of vulnerabilities in the TCP/IP networking protocol stack included in the UEFI reference implementation that could lead to code execution and information disclosure
  • Dangerous flash access control vulnerability (Affects PA-415) which addresses the case of misconfigured SPI flash access controls that could allow an attacker to modify UEFI directly and bypass other security mechanisms
  • CVE-2023-1017 (Affects PA-415) related to an out-of-bounds write vulnerability in the Trusted Platform Module (TPM) 2.0 reference library specification
  • Leaked Intel bootguard bypass keys (Affects PA-1410)
Cyber ​​security

“These findings highlight a critically important truth: even devices designed for protection can become vectors for attack if not properly secured and maintained,” Eclypsium said. “As threat actors continue to target security devices, organizations must take a more holistic approach to supply chain security.”

“This includes careful evaluation of vendors, regular firmware updates and continuous monitoring of device integrity. By understanding and addressing these hidden vulnerabilities, organizations can better protect their networks and data against sophisticated attacks that exploit the very tools they are designed to protect.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.