The following Palo Alto (Global-network) is publicly accessible and looks out-dated : https://80.255.163.15/global-protect/login.esp
It is critical to update to a safe version as soon as possible since multiple CVEs could allow remote attackers to DoS or achieve RCE (Remote code execution) on the device.
Reference:
Found PAN-OS web frontend
Last update: 6/2020
Version: 8.1.15
Affected by CVE-2021-3064
Found PAN-OS web frontend
Last update: 6/2020
Version: 8.1.15
Affected by CVE-2021-3064
Found PAN-OS web frontend
Last update: 6/2020
Version: 8.1.15
Affected by CVE-2021-3064
Email from: Dear Sender, Please note that I will not be able to reply to your messages. Your mail is not forwarded. If you need assistance regarding Marketing subjects, please contact St�phane Basinski (00 352 4797 3580). If your query concerns the Intranet Group Project, please contact Marcelo Zambrano (00 352 4797 3704). Kind regards, Giorgio Libotte -------------------------------------------------------------------------------- This e-mail is intended only for the addressee named above. It does not bind the sender, except in the case of an existing written convention with the addressee. This e-mail may contain material that is confidential and privileged for the sole use of the intended recipient. Any review, reliance or distribution by others or forwarding without express permission is strictly prohibited and may be unlawful. If you are not the intended recipient, please contact the sender and delete all copies. While reasonable precautions have been taken to ensure that this e-mail and any attachments are free from any computer virus or similar defect, no liability will be accepted in that respect. Anyone accessing this e-mail must take their own precautions as to security and virus protection. Quintet Private Bank (Europe) S.A., 43 boulevard Royal L-2955 Luxembourg, R.C.S. Luxembourg B 6395, T +352 47 97 1
bip! I'm a LeakIX probe. This issue looks like it has been resolved!