palo-alto

Palo Alto Networks has issued a security advisory warning of an actively exploited high-severity vulnerability impacting PAN-OS, the operating system used by the company’s networking hardware products.

The issue, tracked as CVE-2022-0028 (CVSS v3 – 8.6), is an URL filtering policy misconfiguration that could allow an unauthenticated, remote attacker to carry out amplified TCP denial-of-service (DoS) attacks.

The PAN-OS versions vulnerable to this vulnerability are the following:

  • PAN-OS prior to 10.2.2-h2 (patch ETA: next week)
  • PAN-OS prior to 10.1.6-h6 (patch available)
  • PAN-OS prior to 10.0.11-h1 (patch ETA: next week)
  • PAN-OS prior to 9.1.14-h4 (patch ETA: next week)
  • PAN-OS prior to 9.0.16-h3 (patch ETA: next week)
  • PAN-OS prior to 8.1.23-h1 (patch ETA: next week)

Using the vulnerability, a hacker could enlist a Palo Alto Networks PAN-OS device for DDoS attacks, obfuscating the original IP of the threat actor and making remediation more challenging. Threat actors could use these attacks for various malicious behavior, such as extortion or to disrupt a company’s business operations.

Palo Alto Networks states that they discovered this vulnerability after they were notified one of their devices was being used as part of an attempted reflected denial-of-service (RDoS) attack, meaning that the bug is actively used in attacks.

However, the vendor states that CVE-2022-0028 does not impact the products’ confidentiality, integrity, or availability, so the attack potential is limited to DoS. 

Vulnerability prerequisites

The vulnerable PAN-OS versions run inside PA-Series, VM-Series, and CN-Series devices, but the exploit only works when the following three conditions apply:

  1. The security policy on the firewall that allows traffic to pass from Zone A to Zone B includes a URL filtering profile with one or more blocked categories.
  2. Packet-based attack protection is not enabled in a Zone Protection profile for Zone A, including both (Packet Based Attack Protection > TCP Drop > TCP Syn With Data) and (Packet Based Attack Protection > TCP Drop > Strip TCP Options > TCP Fast Open).
  3. Flood protection through SYN cookies is not enabled in a Zone Protection profile for Zone A (Flood Protection > SYN > Action > SYN Cookie) with an activation threshold of 0 connections.

As the security advisory comments, the first firewall configuration is unusual and typically results from an administration error, so the number of vulnerable endpoints should be small.

“The URL filtering policies are intended to be triggered when a user inside a protected network request to visit dangerous or disallowed sites on the Internet in traffic destined to the Internet,” explains the advisory.

“Such URL filtering is not meant to be used in the other direction for traffic coming from the Internet to the protected network.”

“URL filtering in that direction offers no benefits. Hence any firewall configuration that is doing this is likely unintentional and considered a misconfiguration.”

While a misconfiguration is required to remotely use a PAN-OS device to perform RDoS attacks, Palo Alto Networks is fixing the bug to prevent it from being abused both remotely and internally.

Since a security update isn’t available for most PAN-OS version branches, system administrators are advised to ensure that at least one of the three prerequisites isn’t met.

The vendor recommends applying a packet-based attack protection workaround to mitigate the issue, for which they have a detailed technical guide.

Source: www.bleepingcomputer.com