🚨 If you use Palo-Alto GlobalProtect VPN, there’s an in the wild zero day being used to gain access to organisations.
CVE-2024-3400, patch out now https://security.paloaltonetworks.com/CVE-2024-3400
Thread throughout the day as more info drops.
🚨 If you use Palo-Alto GlobalProtect VPN, there’s an in the wild zero day being used to gain access to organisations.
CVE-2024-3400, patch out now https://security.paloaltonetworks.com/CVE-2024-3400
Thread throughout the day as more info drops.
Appreciate the rollup and awareness, have been lost in the sauce all day dealing with it, but it's nice to know you're keeping the world in-tune.
Agreed on response, while we'd all love more details; I'm glad we could report up and action first, then get to looking backwards.
@GossiTheDog Did they open patching publically like WatchGuard did or do you need an active contract?
That "active contract" thing makes everything so much less safe.
@GossiTheDog Ohhhhhhhhhhhhhhh
@GossiTheDog No reason to make it personal. We’ve all introduced bugs, especially over a long open source career. Please don’t.
Fun times ahead:
"This pull request is an exploit module for https://security.paloaltonetworks.com/CVE-2024-3400, affecting PAN-OS GlobalProtect Gateway and GlobalProtect Portal deployments with the default telemetry service enabled."
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.