Upcoming Virtual Event: Cloud Security Summit | July 17 - Register Now
Connect with us

Hi, what are you looking for?


Network Security

Palo Alto Networks Addresses BlastRADIUS Vulnerability, Fixes Critical Bug in Expedition Tool

Palo Alto Networks patched a critical vulnerability in its Expedition tool and addressed the impact of the recently disclosed BlastRADIUS vulnerability.

Palo Alto Networks

Palo Alto Networks on Wednesday released patches for multiple vulnerabilities, including a critical-severity bug in its Expedition migration tool.

Tracked as CVE-2024-5910 (CVSS score of 9.3), the security defect is described as a missing authentication for a critical function, which could allow attackers to take over administrative accounts. Palo Alto Networks addressed the flaw in Expedition version 1.2.92.

On Wednesday, the cybersecurity giant also resolved a high-severity arbitrary file upload issue in Panorama software that could lead to a denial-of-service (DoS) condition.

Tracked as CVE-2024-5911, the vulnerability requires that an attacker is authenticated to the web interface as a read-write administrator.

“Repeated attacks eventually cause the Panorama to enter maintenance mode, which requires manual intervention to bring the Panorama back online,” Palo Alto Networks explained.

The company also released patches for medium-severity security defects in Cortex XDR agent and PAN-OS software that could allow attackers to run untrusted code on a device and to tamper with the physical file system to elevate privileges, respectively.

Palo Alto Networks also published an advisory on Wednesday detailing the impact of the recently disclosed BlastRADIUS vulnerability on its PAN-OS firewalls configured to use the CHAP or PAP protocols for authentication with a RADIUS server.

“This vulnerability allows an attacker performing a meddler-in-the-middle attack between Palo Alto Networks PAN-OS firewall and a RADIUS server to bypass authentication and escalate privileges to ‘superuser’ when RADIUS authentication is in use and either CHAP or PAP is selected in the RADIUS server profile,” the company explained.

Advertisement. Scroll to continue reading.

Palo Alto Networks has included fixes for the bug in PAN-OS versions 11.1.3, 11.0.4-h4, 10.2.10, 10.1.14, and 9.1.19 and plans to release fixes for Prisma Access by the end of the month.

The cybersecurity firm says it is not aware of any of these vulnerabilities being exploited in the wild. Additional information can be found on Palo Alto Networks’ security advisories page.

Related: Palo Alto Networks Shares Remediation Advice for Hacked Firewalls

Related: ICS Patch Tuesday: Siemens Addresses Palo Alto Networks Product Vulnerabilities

Related: Citrix Patches Critical NetScaler Console Vulnerability

Written By

Ionut Arghire is an international correspondent for SecurityWeek.


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how to utilize tools, controls, and design models needed to properly secure cloud environments.


Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.


People on the Move

Craig Boundy has left Experian to join McAfee as President and CEO.

Forcepoint has promoted Ryan Windham from Chief Customer and Strategy Officer to Chief Executive Officer.

ICS and OT cybersecurity solutions provider TXOne Networks appointed Stephen Driggers as its new CRO.

More People On The Move

Expert Insights