“Palo Alto Networks has noticed risk exercise exploiting an unauthenticated distant command execution vulnerability towards a restricted variety of firewall administration interfaces that are uncovered to the Web,” Palo Alto Networks stated in one other advisory replace, including “We do not need enough details about any indicators of compromise to share at the moment.”
If a compromise is feared, clients are suggested to observe for suspicious exercise resembling unrecognised configuration modifications or customers.
As extra workarounds, all Expedition and firewall usernames, passwords, and API keys should be rotated, Expedition software program needs to be shut down in inactivity, and community entry to Expedition should be restricted to authorised customers, hosts, or networks, the corporate added.