Palo Alto has recently released vulnerability findings regarding PAN-OS, the Palo Alto operating system, wherein an unauthenticated attacker could execute code with root privileges.
Why Should You Be Concerned?
Quality hardware and software vendors (like Palo Alto) do their best to monitor and quickly remediate any vulnerabilities found in their products. Without patching those vulnerabilities, you leave yourself, your company, and your clients susceptible to attacks, potentially permitting threat actors access to your environment and data.
What Can Be Done?
We at Helient monitor vulnerability release information from the security community and our vendors in order to stay on top of current threats and to ensure our client’s environments are patched and secured as quickly as possible.
Remember, timely updates are your first line of defense against potential cyber threats!
Don’t Delay—Reach Out for Expert Assistance
What Is Affected?
This CVE affects the following:
This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 firewalls with the configurations for both GlobalProtect gateway and device telemetry enabled.
You can verify whether you have a GlobalProtect gateway configured by checking for entries in your firewall web interface (Network > GlobalProtect > Gateways) and verify whether you have device telemetry enabled by checking your firewall web interface (Device > Setup > Telemetry).
You can view Palo Alto’s security release here.
We recognize the challenges that can accompany implementing critical security updates. That’s why our team of industry-leading networking experts stands ready to offer guidance and support.
For a smooth and effective upgrade process, contact us at service@helient.com.