HomeVulnerabilityCISOs who delayed patching Palo Alto vulnerabilities now face actual risk

CISOs who delayed patching Palo Alto vulnerabilities now face actual risk

“Palo Alto Networks has noticed risk exercise exploiting an unauthenticated distant command execution vulnerability towards a restricted variety of firewall administration interfaces that are uncovered to the Web,” Palo Alto Networks stated in one other advisory replace, including “We do not need enough details about any indicators of compromise to share at the moment.”

If a compromise is feared, clients are suggested to observe for suspicious exercise resembling unrecognised configuration modifications or customers.

As extra workarounds, all Expedition and firewall usernames, passwords, and API keys should be rotated, Expedition software program needs to be shut down in inactivity, and community entry to Expedition should be restricted to authorised customers, hosts, or networks, the corporate added.

See also  Corporations are already feeling the strain from upcoming US SEC cyber guidelines
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular