{"id":798,"date":"2024-04-13T20:45:25","date_gmt":"2024-04-13T20:45:25","guid":{"rendered":"http:\/\/localhost:9000\/?p=798"},"modified":"2024-04-19T12:16:31","modified_gmt":"2024-04-19T12:16:31","slug":"kriticka-zranitelnost-v-softveri-palo-alto-pan-os","status":"publish","type":"post","link":"http:\/\/localhost:9000\/posts\/798","title":{"rendered":"Kritick\u00e1 zranite\u013enos\u0165 v\u00a0softv\u00e9ri Palo Alto PAN-OS"},"content":{"rendered":"\n
Spolo\u010dnos\u0165 Palo Alto Networks vydala bezpe\u010dnostn\u00e9 aktualiz\u00e1cie, ktor\u00e9 opravuj\u00fa akt\u00edvne zneu\u017e\u00edvan\u00fa kritick\u00fa zranite\u013enosti v softv\u00e9ri PAN-OS. Verzie 10.2, 11.0 a 11.1 vo funkcii GlobalProtect obsahuj\u00fa zranite\u013enos\u0165, ktor\u00e1 umo\u017e\u0148uje vzdialen\u00e9 vykonanie k\u00f3du. Zranite\u013enos\u0165 je mo\u017en\u00e9 zneu\u017ei\u0165 len na firewalloch, na ktor\u00fdch je zapnut\u00e1 aspo\u0148 jedna z funkci\u00ed GlobalProtect Gateway alebo GlobalProtect Portal.<\/strong><\/p>\n\n\n\n Zranite\u013en\u00e9 syst\u00e9my:<\/strong><\/p>\n\n\n\n Opis \u010dinnosti:<\/strong><\/p>\n\n\n\n CVE-2024-3400 (CVSS sk\u00f3re 10.0)<\/p>\n\n\n\n Kritick\u00e1 zranite\u013enos\u0165<\/strong> s ozna\u010den\u00edm CVE-2024-3400 sa nach\u00e1dza vo funkcii GlobalProtect, spo\u010d\u00edva v nespr\u00e1vnej neutraliz\u00e1cii \u0161peci\u00e1lnych prvkov v r\u00e1mci pr\u00edkazov a vzdialen\u00fd neautentifikovan\u00fd \u00fato\u010dn\u00edk<\/strong> by ju mohol zneu\u017ei\u0165 na vykonanie \u0161kodliv\u00e9ho k\u00f3du.<\/strong> Zranite\u013enos\u0165 je v s\u00fa\u010dasnosti akt\u00edvne zneu\u017e\u00edvan\u00e1 \u00fato\u010dn\u00edkmi.<\/strong><\/p>\n\n\n\n Z\u00e1va\u017enos\u0165 zranite\u013enosti: Kritick\u00e1<\/strong><\/p>\n\n\n\n Mo\u017en\u00e9 \u0161kody:<\/strong><\/p>\n\n\n\n Odpor\u00fa\u010dania:<\/strong><\/p>\n\n\n\n V\u00fdrobca odpor\u00fa\u010da bezodkladne aktualizova\u0165 zranite\u013en\u00e9 syst\u00e9my.<\/strong> V pr\u00edpade, \u017ee aktualiz\u00e1ciu syst\u00e9mov nie je mo\u017en\u00e9 vykona\u0165, odpor\u00fa\u010dame postupova\u0165 pod\u013ea pokynov v\u00fdrobcu:<\/p>\n\n\n\n Vzh\u013eadom na akt\u00edvne zneu\u017e\u00edvanie zranite\u013enosti odpor\u00fa\u010dame d\u00f4kladne preveri\u0165 pr\u00edtomnos\u0165 dostupn\u00fdch indik\u00e1torov kompromit\u00e1cie (IOC) v logoch sie\u0165ov\u00fdch a bezpe\u010dnostn\u00fdch prvkov.<\/strong><\/p>\n\n\n\n Pokusy o zneu\u017eitie zranite\u013enosti na firewalloch mo\u017eno preveri\u0165 pomocou pr\u00edkazov\u00e9ho riadka PAN-OS CLI zadan\u00edm pr\u00edkazu:<\/p>\n\n\n\n grep pattern “failed to unmarshal session(.\\+.\\\/” mp-log gpsvc.log*<\/em><\/p>\n\n\n\n Ak v\u00fdsledky vyh\u013ead\u00e1vania medzi \u010das\u0165ami \u201esession(\u201c a \u201e)\u201c obsahuj\u00fa namiesto GUID, re\u0165azce obsahuj\u00face syst\u00e9mov\u00e9 cesty alebo shell-ov\u00e9 pr\u00edkazy, m\u00f4\u017ee sa jedna\u0165 o aktivitu spojen\u00fa s pokusmi o zneu\u017eitie zranite\u013enosti.<\/p>\n\n\n\n Indik\u00e1tory kompromit\u00e1cie (IOC):<\/strong><\/p>\n\n\n\n SHA256 hashe s\u00faborov:<\/strong><\/p>\n\n\n\n IP adresy:<\/strong><\/p>\n\n\n\n Dom\u00e9ny:<\/strong><\/p>\n\n\n\n URL:<\/p>\n\n\n\n Aktualizovan\u00e9 19.04.2024: dostupn\u00e9 aktualiz\u00e1cie, predpoklady zneu\u017eitia zranite\u013enosti, zoznam zasiahnut\u00fdch syst\u00e9mov, odpor\u00fa\u010dania<\/em><\/strong><\/p>\n\n\n\n Odkazy:<\/strong><\/p>\n\n\n\n https:\/\/security.paloaltonetworks.com\/CVE-2024-3400<\/a><\/p>\n\n\n\n https:\/\/unit42.paloaltonetworks.com\/cve-2024-3400\/<\/a><\/p>\n\n\n\n\n
\n
\n
\n
\n
\n
\n