icon

Digital safety starts here for both commercial and personal Use...

Defend Your Business Against the Latest WNY Cyber Threats We offer Safe, Secure and Affordable Solutions for your Business and Personal Networks and Devices.



WNYCyber is there to help you to choose the best service providers in Western New York... We DO NOT provide the services ourselves, as we are Internet Programmers who have to deak daily with Cyber Threats... (Ugghhh)... So we know what it's like and what it takes to protect OUR and OUR CUSTOMERS DATA... We built this Website to help steer you to those that can give you the best service at realistic and non-inflated prices. We do charge or collect any fees.

Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-0012

Summary:
Palo Alto Networks is aware of active exploitation attempts in the wild leveraging an authentication bypass vulnerability impacting its PAN-OS firewall management interface. The vulnerability, tracked as CVE-2024-0012, requires no user interaction or privileges to exploit and can enable unauthenticated actors to execute commands remotely. CVE-2024-0012 has been assigned a CVSS score of 9.3, indicating a critical level of severity. However, according to the vendor, the risk of this issue is reduced significantly (CVSS: 5.9) if access to the management web interface is restricted to only trusted internal IP addresses.

Analyst Comments:
Palo Alto Networks has released a set of IP addresses which were observed targeting PAN-OS management web interfaces exposed to internet traffic. According to the vendor, many of these IPs have been known to proxy / tunnel traffic for anonymous VPN services, which may include legitimate user activity originating from these IPs to other destinations

The activity is being tracked under the name ‘Lunar Peek.’ While the whereabouts of the actor behind these attacks or victims have not been disclosed, Palo Alto Networks also provided a webshell checksum, indicating that the actors are exploiting the vulnerability to deploy webshells for persistent access.

Suggested Corrections:
CVE-2024-0012 is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability. The issue has been fixed in PAN-OS 10.2.12-h2, PAN-OS 11.0.6-h1, PAN-OS 11.1.5-h1, PAN-OS 11.2.4-h1, and all later PAN-OS versions. Customers have advised to update to the latest versions and secure access to the management interface to only trusted internal IP addresses to prevent external access from the internet.

IOCs:
https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/

Link(s):
https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/