April 17, 2024, 9:29 a.m. | Zeljka Zorz

Help Net Security www.helpnetsecurity.com

While it initially seemed that protecting Palo Alto Network firewalls from attacks leveraging CVE-2024-3400 would be possible by disabling the devices’ telemetry, it has now been confirmed that this mitigation is ineffectual. “Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability,” Palo Alto Networks noted on Tuesday, and said they are aware of an “increasing number of attacks that leverage the exploitation of this … More →


The post …

alto attacks cve cve-2024 cve-2024-3400 device devices don't miss enterprise exploit exploits exposed firewall firewalls greynoise hot stuff mitigation network network firewalls palo palo alto palo alto network palo alto networks pan pan-os poc protecting public rising security update telemetry trustedsec volexity vulnerability watchtowr

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Threat Analysis Engineer

@ Gen | IND - Tamil Nadu, Chennai

Head of Security

@ Hippocratic AI | Palo Alto

IT Security Vulnerability Management Specialist (15.10)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

Security Engineer - Netskope/Proofpoint

@ Sainsbury's | Coventry, West Midlands, United Kingdom

Journeyman Cybersecurity Analyst

@ ISYS Technologies | Kirtland AFB, NM, United States