A recent cybersecurity report has identified critical vulnerabilities in Palo Alto Networks firewall devices that could enable attackers to bypass Secure Boot protections, exploit firmware-level flaws, and obtain elevated privileges, allowing them to maintain persistence within the networks of targeted organizations.
Eclypsium researchers have revealed findings highlighting the growing threats to security appliances tools specifically designed to protect enterprises from cyber risks.
Ironically, attackers are increasingly targeting these devices due to lapses in supply chain security and device integrity, making organizations more vulnerable to breaches.
The vulnerabilities affect multiple Palo Alto firewall models, including the PA-3260, PA-1410, and PA-415, which are deployed widely across enterprises.
Researchers revealed a series of well-known, unpatched vulnerabilities, including Secure Boot bypass flaws, firmware-based risks, and misconfigured hardware protections.
One of the most concerning issues relates to the BootHole vulnerability, a flaw in the GRUB2 bootloader that allows attackers to bypass Secure Boot protections. Secure Boot is a critical defense mechanism designed to verify the integrity of the boot process and prevent malicious code execution.
Eclypsium found that Palo Alto failed to properly update its certificates (DBX) to block malicious or outdated bootloaders vulnerable to BootHole exploits.
Combined with other vulnerabilities (CVE-2024-0012 and CVE-2024-9474), attackers could theoretically install persistent malware or bootkits by gaining root privileges.
LogoFAIL is a set of critical UEFI vulnerabilities affecting firmware vendors and device manufacturers. These flaws in image parsing libraries, used to display boot logos, allow arbitrary code execution during the early DXE phase, compromising systems before the OS and security tools load.
The PA-3260 platform, which uses firmware from Insyde Software, was found to contain six previously disclosed vulnerabilities in the highly privileged System Management Mode (SMM). Exploiting these flaws could allow attackers to bypass Secure Boot, escalate privileges, and install stealthy malware.
The PA-1410 and PA-415 are vulnerable to the “PixieFail” issue, which targets weaknesses in DHCPv6 implementation during the PXE network boot process. This could enable remote code execution (RCE) if attackers are on the same network.
“The vulnerabilities affect the network boot process in the PXE environment, which is essential for loading operating systems from the network at boot time.”
“All discovered vulnerabilities are within the DHCPv6 functionality as PXE relies on DHCP at boot time to obtain an IP address and discover the location of the OS image to load…The PixieFail vulnerabilities are notable because they allow remote-code execution (RCE) given the attacker is on the same network.”
The PA-415 model was found to have poorly configured flash memory protections, allowing attackers to modify UEFI firmware and bypass key security mechanisms.
Leaked cryptographic keys for the Intel BootGuard feature were also highlighted, further undermining hardware-based security protections against firmware tampering.
The vulnerabilities uncovered in Palo Alto firewalls represent a significant threat to enterprise security. Attackers could exploit these flaws to achieve deep, persistent control over targeted networks, bypassing traditional defenses and accessing sensitive information.
“These aren’t minor issues. These are vulnerabilities that provide attackers a pathway to evade security controls and implant long-term threats,” said Mickey Shkatov, a lead researcher at Eclypsium.
Given the severity of these findings, organizations are urged to take immediate mitigating actions:
The vulnerabilities highlight the pressing need for vendors such as Palo Alto Networks to address gaps in supply chain security, implement stringent firmware integrity measures, and improve device resiliency against modern attack techniques. Without these safeguards, even the most sophisticated security tools can become liabilities.
As organizations evolve in a rapidly changing cyber threat environment, a proactive approach to addressing vulnerabilities in security appliances will be critical to ensuring robust defenses.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free