April 17, 2024, 9:29 a.m. | Zeljka Zorz

Help Net Security www.helpnetsecurity.com

While it initially seemed that protecting Palo Alto Network firewalls from attacks leveraging CVE-2024-3400 would be possible by disabling the devices’ telemetry, it has now been confirmed that this mitigation is ineffectual. “Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability,” Palo Alto Networks noted on Tuesday, and said they are aware of an “increasing number of attacks that leverage the exploitation of this … More →


The post …

alto attacks cve cve-2024 cve-2024-3400 device devices don't miss enterprise exploit exploits exposed firewall firewalls greynoise hot stuff mitigation network network firewalls palo palo alto palo alto network palo alto networks pan pan-os poc protecting public rising security update telemetry trustedsec volexity vulnerability watchtowr

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Sr. Staff Firmware Engineer – Networking & Firewall

@ Axiado | Bengaluru, India

Compliance Architect / Product Security Sr. Engineer/Expert (f/m/d)

@ SAP | Walldorf, DE, 69190

SAP Security Administrator

@ FARO Technologies | EMEA-Portugal