“Palo Alto Networks has noticed risk exercise exploiting an unauthenticated distant command execution vulnerability towards a restricted variety of firewall administration interfaces that are uncovered to the Web,” Palo Alto Networks stated in one other advisory replace, including “We shouldn’t have ample details about any indicators of compromise to share at the moment.”
If a compromise is feared, prospects are suggested to watch for suspicious exercise comparable to unrecognised configuration adjustments or customers.
As further workarounds, all Expedition and firewall usernames, passwords, and API keys should be rotated, Expedition software program must be shut down in inactivity, and community entry to Expedition should be restricted to authorised customers, hosts, or networks, the corporate added.