Researchers unearthed that Palo Alto Networks appliances they purchased had vulnerabilities in the software and hardware. The American multinational cybersecurity company that offers a wide range of firewalls and cloud offerings was found not maintaining basic protective measures.
Eclypsium, a platform that scans hardware, firmware, and software components in the IT infrastructure detailed that from the three Palo Alto Networks appliances, one reached end-of-sale on August 31, 2023. It is scheduled for end-of-life on August 31, 2028.
They inspected the Palo Alto Networks Enterprise Firewall PA-3260 sold as the world’s first ML-powered next generation product, PA-1410, and PA-415.
And found several vulnerabilities in the version of the software used in the devices including InsydeH2O from Insyde Software. They were:
These vulnerabilities could allow privilege escalation, memory corruption, and running arbitrary codes.
“Even if the device was configured with Secure Boot enabled (and configured properly) and the GRUB bootloader was updated to patch the BootHole vulnerabilities, attackers with high privileges on the system could exploit the vulnerabilities listed above to bypass Secure Boot and various other security protections and implant malware early in the boot process,” researchers argued.
These security gaps could expose data to hackers besides bypassing safety mechanisms. Exploiting the insecure glass access control vulnerability in PA-415, hackers can modify UEFI.
The BootHole CVE-2020-10713 impacting all the three tested appliances could allow Secure Boot bypass on Linux systems. Threat actors can launch malware, and access even the protected environment.
Responding to the research, Palo Alto Networks replied by saying that its Security Incident Response Team evaluated the vulnerabilities.
"It determined that the scenarios required for successful exploitation do not exist on up-to-date PAN-OS software under normal conditions with secured management interfaces deployed according to best practice guidelines," they further added.
The company assured that it did not find any instance of exploitation of the vulnerabilities. And they were working with their third-party vendor to mitigate any issues.
The security issues posed to clients and their data despite opting for some of the most promising cybersecurity tools and appliances is concerning. These findings point towards the need to pay a higher attention to detail and consistently working on issues that may seem routine.