CVE-2024-0009 Report - Details, Severity, & Advisories
Twingate Team
•
May 13, 2024
CVE-2024-0009 is a medium-severity vulnerability affecting the GlobalProtect gateway feature of Palo Alto Networks PAN-OS software. This improper verification issue allows a malicious user with stolen credentials to establish a VPN connection from an unauthorized IP address. Systems running Palo Alto Networks PAN-OS software and using the GlobalProtect gateway feature could be at risk.
How do I know if I'm affected?
If you're using the GlobalProtect gateway feature of Palo Alto Networks PAN-OS software, you might be affected by the CVE-2024-0009 vulnerability. This issue allows a malicious user with stolen credentials to establish a VPN connection from an unauthorized IP address. The affected versions of PAN-OS are 11.0 versions less than 11.0.1 and 10.2 versions less than 10.2.4. To determine if you're affected, check your PAN-OS version and ensure it's not within the vulnerable range.
What should I do if I'm affected?
If you're affected by the CVE-2024-0009 vulnerability, update your PAN-OS software to version 10.2.4, 11.0.1, or later to fix the issue. To do this, check your current PAN-OS version, and if it's within the vulnerable range, follow Palo Alto Networks' instructions to update your software.
Is CVE-2024-0009 in CISA’s Known Exploited Vulnerabilities Catalog?
The CVE-2024-0009 vulnerability, which affects the GlobalProtect gateway feature of Palo Alto Networks PAN-OS software, is not listed in CISA's Known Exploited Vulnerabilities Catalog. This issue allows a malicious user with stolen credentials to establish a VPN connection from an unauthorized IP address. It was added to the National Vulnerability Database on February 14, 2024. No due date or required action is provided, as the vulnerability is still awaiting analysis.
Weakness enumeration
The weakness enumeration for this vulnerability is categorized as CWE-940, which involves improper verification of the source of a communication channel, allowing unauthorized VPN connections.
For more details
For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, refer to the NVD or the links provided below.
Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.
CVE-2024-0009 Report - Details, Severity, & Advisories
Twingate Team
•
May 13, 2024
CVE-2024-0009 is a medium-severity vulnerability affecting the GlobalProtect gateway feature of Palo Alto Networks PAN-OS software. This improper verification issue allows a malicious user with stolen credentials to establish a VPN connection from an unauthorized IP address. Systems running Palo Alto Networks PAN-OS software and using the GlobalProtect gateway feature could be at risk.
How do I know if I'm affected?
If you're using the GlobalProtect gateway feature of Palo Alto Networks PAN-OS software, you might be affected by the CVE-2024-0009 vulnerability. This issue allows a malicious user with stolen credentials to establish a VPN connection from an unauthorized IP address. The affected versions of PAN-OS are 11.0 versions less than 11.0.1 and 10.2 versions less than 10.2.4. To determine if you're affected, check your PAN-OS version and ensure it's not within the vulnerable range.
What should I do if I'm affected?
If you're affected by the CVE-2024-0009 vulnerability, update your PAN-OS software to version 10.2.4, 11.0.1, or later to fix the issue. To do this, check your current PAN-OS version, and if it's within the vulnerable range, follow Palo Alto Networks' instructions to update your software.
Is CVE-2024-0009 in CISA’s Known Exploited Vulnerabilities Catalog?
The CVE-2024-0009 vulnerability, which affects the GlobalProtect gateway feature of Palo Alto Networks PAN-OS software, is not listed in CISA's Known Exploited Vulnerabilities Catalog. This issue allows a malicious user with stolen credentials to establish a VPN connection from an unauthorized IP address. It was added to the National Vulnerability Database on February 14, 2024. No due date or required action is provided, as the vulnerability is still awaiting analysis.
Weakness enumeration
The weakness enumeration for this vulnerability is categorized as CWE-940, which involves improper verification of the source of a communication channel, allowing unauthorized VPN connections.
For more details
For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, refer to the NVD or the links provided below.
Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.
CVE-2024-0009 Report - Details, Severity, & Advisories
Twingate Team
•
May 13, 2024
CVE-2024-0009 is a medium-severity vulnerability affecting the GlobalProtect gateway feature of Palo Alto Networks PAN-OS software. This improper verification issue allows a malicious user with stolen credentials to establish a VPN connection from an unauthorized IP address. Systems running Palo Alto Networks PAN-OS software and using the GlobalProtect gateway feature could be at risk.
How do I know if I'm affected?
If you're using the GlobalProtect gateway feature of Palo Alto Networks PAN-OS software, you might be affected by the CVE-2024-0009 vulnerability. This issue allows a malicious user with stolen credentials to establish a VPN connection from an unauthorized IP address. The affected versions of PAN-OS are 11.0 versions less than 11.0.1 and 10.2 versions less than 10.2.4. To determine if you're affected, check your PAN-OS version and ensure it's not within the vulnerable range.
What should I do if I'm affected?
If you're affected by the CVE-2024-0009 vulnerability, update your PAN-OS software to version 10.2.4, 11.0.1, or later to fix the issue. To do this, check your current PAN-OS version, and if it's within the vulnerable range, follow Palo Alto Networks' instructions to update your software.
Is CVE-2024-0009 in CISA’s Known Exploited Vulnerabilities Catalog?
The CVE-2024-0009 vulnerability, which affects the GlobalProtect gateway feature of Palo Alto Networks PAN-OS software, is not listed in CISA's Known Exploited Vulnerabilities Catalog. This issue allows a malicious user with stolen credentials to establish a VPN connection from an unauthorized IP address. It was added to the National Vulnerability Database on February 14, 2024. No due date or required action is provided, as the vulnerability is still awaiting analysis.
Weakness enumeration
The weakness enumeration for this vulnerability is categorized as CWE-940, which involves improper verification of the source of a communication channel, allowing unauthorized VPN connections.
For more details
For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, refer to the NVD or the links provided below.
Solutions
Solutions
The VPN replacement your workforce will love.
Solutions