“Palo Alto Networks has noticed risk exercise exploiting an unauthenticated distant command execution vulnerability towards a restricted variety of firewall administration interfaces that are uncovered to the Web,” Palo Alto Networks mentioned in one other advisory replace, including “We would not have ample details about any indicators of compromise to share at the moment.”
If a compromise is feared, prospects are suggested to observe for suspicious exercise resembling unrecognised configuration adjustments or customers.
As extra workarounds, all Expedition and firewall usernames, passwords, and API keys have to be rotated, Expedition software program needs to be shut down in inactivity, and community entry to Expedition have to be restricted to authorised customers, hosts, or networks, the corporate added.