Palo Alto Firewalls Hacked: Zero-Day Vulnerability Exploited
State-sponsored hackers exploited a critical vulnerability in Palo Alto Networks firewalls for almost a month, exposing thousands of companies.

Palo Alto Firewalls Hacked: Zero-Day Vulnerability Exploited
Palo Alto Networks has issued a critical alert to its customers, reporting that a critical severity zero-day vulnerability in its PAN-OS operating system has been actively exploited by malicious actors, allegedly state-sponsored, since April 9th. The breach, which allows for Remote Code Execution (RCE), remained undetected and unpatched for approximately one month, putting thousands of organizations worldwide at risk.
A Critical and Long-Standing Vulnerability
The cybersecurity company identified that the flaw, tracked as CVE-2024-3400, specifically affects the partial URL configuration function within the GlobalProtect module of PAN-OS series firewalls. Attackers reportedly used this backdoor to gain unauthorized access to corporate networks, facilitating potential malware propagation, theft of sensitive data, or even the deployment of ransomware attacks.
The Danger of Active Exploitation
The fact that this vulnerability has been exploited for such an extended period is a cause for significant concern. Sophisticated attackers, often linked to state-sponsored groups, actively seek out these flaws to infiltrate critical systems. The lack of an immediate patch and the duration of the exploitation suggest a considerable level of skill and stealth on the part of the perpetrators. These types of attacks can be a prelude to more complex operations, similar to those seen in the past with the MuddyWater group, which has been associated with ransomware tactics as part of disinformation or false flag strategies.
Urgent Recommendations for PAN-OS Users
Palo Alto Networks has released security updates to mitigate the risk. The primary recommendation is to apply the patches as soon as possible. For those unable to update immediately, workarounds and detection measures have been provided. The company has also strengthened its internal defenses and is collaborating with security researchers to trace the origin and scope of the hack.
"We are actively working to protect our customers and are committed to providing the most up-to-date information on this threat."
Palo Alto Networks' rapid response and transparency are crucial in situations like this. However, the existence of such vulnerabilities underscores the constant battle in cyberspace and the need for continuous vigilance and robust defense strategies by companies.
Sources:
- BleepingComputer: PAN-OS firewall RCE zero-day exploited in attacks since April 9
Related articles
17 de mayo de 2026
Vulnerabilitat crítica a NGINX: CVE-2026-42945 sota atac actiu
Una fallada de desbordament de memòria intermèdia a NGINX està sent explotada activament, posant en risc servidors web globals davant de possibles atacs remots.
17 de mayo de 2026
Critical NGINX vulnerability: CVE-2026-42945 under active attack
A buffer overflow flaw in NGINX is being actively exploited, putting global web servers at risk of potential remote attacks.
17 de mayo de 2026
Vulnerabilidad crítica en NGINX: CVE-2026-42945 bajo ataque activo
Una falla de desbordamiento de búfer en NGINX está siendo explotada activamente, poniendo en riesgo servidores web globales ante posibles ataques remotos.
15 de mayo de 2026
Turla evoluciona Kazuar: el perill d'una botnet P2P persistent
El grup estatal Turla ha convertit la seva porta del darrere (backdoor) Kazuar en una sofisticada botnet P2P, elevant el risc de persistència i espionatge en xarxes compromeses.
Loading comments...