Blog Post

The Human Connection Blog
1 MIN READ

New CTI Labs: CVE-2024-0012 and CVE-2024-9474 (Palo Alto PAN-OS) – Offensive and Defensive

BenMcCarthy's avatar
BenMcCarthy
Icon for Immerser rankImmerser
20 days ago

Today, we’ve released two brand-new labs focusing on defending against and exploiting two new vulnerabilities in Palo Alto Firewalls! Learn how to attack a Palo Alto Firewall by exploiting these vulnerabilities, as well as how to identify attack remnants and detect them effectively

On November 19, 2024, Palo Alto patched a critical vulnerability (rated 9.3) that let unauthenticated attackers bypass authentication and gain code execution on exposed devices running PAN-OS. Palo Alto and watchTowr Labs released technical details on the exploit and the associated in-the-wild exploitation detected by Unit42.

Why have we created this content?
Palo Alto is one of the most popular firewall solutions, and with a vulnerability of this magnitude, this content was created to highlight these vulnerabilities and provide administrators with some guidance on how to identify and mitigate these vulnerabilities.

What are we publishing?
All customers on a CyberPro License have immediate access to two new labs.

Who is this content for?
These labs are focused on upskilling and increasing the defensive capabilities of the following roles:

  • Firewall Administrators
  • Incident Responders
  • Threat Hunters
  • Security Analysts
  • Penetration Testers
  • Red Teamers
Updated 20 days ago
Version 1.0
No CommentsBe the first to comment