Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits

The Hacker News by The Hacker News
January 23, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Jan 23, 2025Ravie LakshmananFirmware Security / Vulnerability

An exhaustive evaluation of three firewall models from Palo Alto Networks has uncovered a host of known security flaws impacting the devices’ firmware as well as misconfigured security features.

“These weren’t obscure, corner-case vulnerabilities,” security vendor Eclypsium said in a report shared with The Hacker News.

“Instead these were very well-known issues that we wouldn’t expect to see even on a consumer-grade laptop. These issues could allow attackers to evade even the most basic integrity protections, such as Secure Boot, and modify device firmware if exploited.”

The company said it analyzed three firewall appliances from Palo Alto Networks, PA-3260, PA-1410, and PA-415, the first of which officially reached end-of-sale on August 31, 2023. The other two models are fully supported firewall platforms.

Cybersecurity

The list of identified flaws, collectively named PANdora’s Box, is as follows –

  • CVE-2020-10713 aka BootHole (Affects PA-3260, PA-1410, and PA-415), refers to a buffer overflow vulnerability that allows for a Secure Boot bypass on Linux systems with the feature enabled
  • CVE-2022-24030, CVE-2021-33627, CVE-2021-42060, CVE-2021-42554, CVE-2021-43323, and CVE-2021-45970 (Affects PA-3260), which refers to a set of System Management Mode (SMM) vulnerabilities affecting Insyde Software’s InsydeH2O UEFI firmware that could lead to privilege escalation and Secure Boot bypass
  • LogoFAIL (Affects PA-3260), which refers to a set of critical vulnerabilities discovered in the Unified Extensible Firmware Interface (UEFI) code that exploit flaws in image parsing libraries embedded in the firmware to bypass Secure Boot and execute malicious code during system startup
  • PixieFail (Affects PA-1410 and PA-415), which refers to a set of vulnerabilities in the TCP/IP network protocol stack incorporated in the UEFI reference implementation that could lead to code execution and information disclosure
  • Insecure flash access control vulnerability (Affects PA-415), which refers to a case of misconfigured SPI flash access controls that could permit an attacker to modify UEFI directly and bypass other security mechanisms
  • CVE-2023-1017 (Affects PA-415), which refers to an out-of-bounds write vulnerability in the Trusted Platform Module (TPM) 2.0 reference library specification
  • Intel bootguard leaked keys bypass (Affects PA-1410)
Cybersecurity

“These findings underscore a critical truth: even devices designed to protect can become vectors for attack if not properly secured and maintained,” Eclypsium said. “As threat actors continue to target security appliances, organizations must adopt a more comprehensive approach to supply chain security.”

“This includes rigorous vendor assessments, regular firmware updates, and continuous device integrity monitoring. By understanding and addressing these hidden vulnerabilities, organizations can better protect their networks and data from sophisticated attacks that exploit the very tools meant to safeguard them.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
SonderMind to Fast-Track Nationwide Healthcare Partnerships with Addition of Jen Meyer as President of Commercial and Consumer Business

SonderMind to Fast-Track Nationwide Healthcare Partnerships with Addition of Jen Meyer as President of Commercial and Consumer Business

Recommended.

Huawei’s MoM-based Multi-Agent Collaboration System Empowers Core Networks’ Transitioning to L4 High Stability

Huawei’s MoM-based Multi-Agent Collaboration System Empowers Core Networks’ Transitioning to L4 High Stability

December 22, 2025
Datalink Networks and Clip Training Partner to Advance Office 365 Skills for Organizations Nationwide

Datalink Networks and Clip Training Partner to Advance Office 365 Skills for Organizations Nationwide

August 12, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio