Vulnerability in Palo Alto Networks Prisma Access Browser Let Attackers Trigger RCE

Palo Alto Networks has issued a high-severity safety change for the Prisma Gain admission to Browser, addressing a pair of vulnerabilities learned within the underlying Chromium engine. This change, identified as PAN-SA-2024-0007, supersedes the Talon Browser and contains extreme safety fixes from fresh Chromium updates.
The vulnerabilities essentially fill “command after free” problems, form confusion, and insufficient records validation interior a amount of ingredients of the Chromium engine, equivalent to V8, Media Circulate, and WebAudio.
These flaws would possibly perchance perchance well presumably doubtlessly allow attackers to manufacture arbitrary code, ensuing in a compromise of confidentiality, integrity, and availability of the affected programs.
- Severity: Excessive (CVSSv4.0 Nasty Receive: 8.6)
- Urgency: Life like
- Response Effort: Low
- Recovery: Automatic
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Packed with life
Affected Versions:
- Prisma Gain admission to Browser: Versions beneath 126.183.2844.1 are affected.
- Unaffected Versions: Version 127.100.2858.4 and later are no longer affected.
Customers are strongly urged to interchange to Prisma Gain admission to Browser version 127.100.2858.4 or later to mitigate these vulnerabilities. The change entails fixes for all listed CVEs and enhances the browser’s safety posture.
Other Vulnerabilities:
Moreover to the Prisma Gain admission to Browser vulnerabilities, several diversified safety problems fill been identified and addressed at some level of a amount of Palo Alto Networks products.
These encompass CVE-2024-5914, a say injection vulnerability within the Cortex XSOAR CommonScripts pack, affecting versions beneath 1.12.33. This flaw enables unauthenticated attackers to manufacture arbitrary commands interior an integration container.
One other vulnerability, CVE-2024-5915, impacts the GlobalProtect App on Windows, ensuing in local privilege escalation. This vulnerability impacts versions beneath 6.3.1, permitting local customers to manufacture programs with elevated privileges.
Lastly, CVE-2024-5916 entails the cleartext exposure of exterior design secrets and tactics in PAN-OS, affecting versions 11.0 beneath 11.0.4 and 10.2 beneath 10.2.8. This vulnerability enables local design administrators to say secrets and tactics, passwords, and tokens of exterior programs.
Timeline:
- August 14, 2024: Initial publication of the vulnerability advisory.
- August 15, 2024: Clarification of affected and unaffected versions.
For further necessary parts on the thunder CVEs addressed, customers can talk about with the Chromium stable channel updates from July and August 2024. These updates highlight the protection enhancements incorporated into the Prisma Gain admission to Browser to provide protection to in opposition to attainable exploits.
Source credit : cybersecuritynews.com



