The Palo Alto Networks vulnerability has been analyzed in depth by various sources and exploits.
We have gotten several reports of exploits being attempted against GlobalProtect installs.
We see scans for the GlobalProtect login page, but these scans predated the exploit.
VPN gateways have always been the target of exploits like brute forcing or credential stuffing attacks.
The exploit does exploit a path traversal vulnerability.
This vulnerability can create a file in a telemetry directory, and the content will be executed.
I modified the random file name in case it was specific to the target from which we received this example.
It also scanned for various other perimeter gateways.
The IP appears to be used by a US company but is assigned to a server located in Amsterdam, NL. https://labs.
This Cyber News was published on isc.sans.edu. Publication date: Tue, 16 Apr 2024 21:58:03 +0000