ThreatMon Blog
  • Platform
  • Intelligence Modules
    • Cyber Threat Intelligence
    • Attack Surface Management
    • Digital Risk Protection
  • Resources
    • Blog
    • Reports
  • Company
    • About Us
    • Term & Use
    • Privacy Policy
  • Platform
  • Intelligence Modules
    • Cyber Threat Intelligence
    • Attack Surface Management
    • Digital Risk Protection
  • Resources
    • Blog
    • Reports
  • Company
    • About Us
    • Term & Use
    • Privacy Policy
No Result
View All Result
ThreatMon Blog
No Result
View All Result

Home » CISA Warning Against Active Exploitation of Palo Alto Networks’ PAN-OS Vulnerability

CISA Warning Against Active Exploitation of Palo Alto Networks’ PAN-OS Vulnerability

A budget tells us what we can't afford, but it doesn't keep us from buying it.

ibrahim mestav by ibrahim mestav
August 5, 2023
in Security News
0
cisa-warning-against-active-exploitation-of-palo-alto-networks-pan-os-vulnerability
597
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

CISA added Palo Alto Networks PAN-OS to its Catalog of Known Exploited Vulnerabilities based on evidence of active exploitation

This critical vulnerability is tracked with code CVE-2022-0028 (CVSS: 8.6 High). The vulnerability is the misconfiguration of a URL filtering policy. Misconfiguration of the PAN-OS URL filtering policy could allow a network-based attacker to perform mirrored and amplified TCP denial-of-service (RDoS) attacks.

Palo Alto Networks said that exploiting this issue will not affect the confidentiality, integrity, or availability of its products.

“However, the resulting denial of service (DoS) attack can help disguise the identity of the attacker and expose the firewall as the source of the attack,” Palto Alto Networks added.

Customers are encouraged to apply patches for affected products to mitigate potential threats.

References:

https://nvd.nist.gov/vuln/detail/CVE-2022-0028

https://www.cisa.gov/known-exploited-vulnerabilities-catalog

https://security.paloaltonetworks.com/CVE-2022-0028

Previous Post

Iranian Threat Actor MERCURY Exploits Log4j 2 Vulnerabilities in Unpatched Systems

Next Post

WordPress Sites Hacked with Fake Cloudflare DDoS Alerts

Next Post
WordPress Sites Hacked with Fake Cloudflare DDoS Alerts

WordPress Sites Hacked with Fake Cloudflare DDoS Alerts

Recommended

nobelium-apt29-envyscout

NOBELIUM APT29 – EnvyScout

September 7, 2023
usa-offers-10m-bounty-for-providing-information-on-the-conti-ransomware-gang

USA Offers $10M Bounty for Providing Information on the Conti Ransomware Gang

August 5, 2023

Popular Story

  • chatgpt-and-malware-analysis-threatmon

    ChatGPT and Malware Analysis – ThreatMon

    977 shares
    Share 391 Tweet 244
  • ChatGPT and Cyber Security in 15 Questions: Impacts, Benefits and Harms

    777 shares
    Share 311 Tweet 194
  • TA558 APT Group Uses Malicious Microsoft Compiled HTML Help Files

    751 shares
    Share 300 Tweet 188
  • What is SMTP Open Mail Relay Vulnerability?

    727 shares
    Share 291 Tweet 182
  • The Importance of Attack Surface Management for Organizations

    678 shares
    Share 271 Tweet 170

Intelligence Modules

Cyber Threat Intelligence Attack Surface Management Digital Risk Protection

Resources

Blog Reports

Platform

Discover the platform

Company

About Us Terms & Use Privacy Policy

Blog

The Importance of Attack Surface Management for Organizations ChatGPT and Malware Analysis – ThreatMon TA558 APT Group Uses Malicious Microsoft Compiled HTML Help Files
threatmon-logo

Copyright © 2023

No Result
View All Result
  • Platform
  • Intelligence Modules
    • Cyber Threat Intelligence
    • Attack Surface Management
    • Digital Risk Protection
  • Resources
    • Blog
    • Reports
  • Company
    • About Us
    • Term & Use
    • Privacy Policy

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Advanced Threat Intelligence Platform
Get 30 Days Free Trial
Get 30 Days Free Trial