The following Palo Alto (Global-network) is publicly accessible and looks out-dated : https://125.18.245.162/global-protect/login.esp
It is critical to update to a safe version as soon as possible since multiple CVEs could allow remote attackers to DoS or achieve RCE (Remote code execution) on the device.
The CVE-2021-3064 prevention reports are identified and dispatched with the help of https://twitter.com/HaboubiAnis
Reference:
Found PAN-OS web frontend
Last update: 8/2019
Version: 8.1.10
Affected by CVE-2020-2034
Affected by CVE-2020-2021
Affected by CVE-2021-3064
Found PAN-OS web frontend
Last update: 8/2019
Version: 8.1.10
Affected by CVE-2020-2034
Affected by CVE-2020-2021
Affected by CVE-2021-3064
Found PAN-OS web frontend
Last update: 8/2019
Version: 8.1.10
Affected by CVE-2020-2034
Affected by CVE-2020-2021
Affected by CVE-2021-3064
Email from: kmontero@vmware.com Hello Zythop, hope you are doing well today, My name is Kendall, and I am from VMware, and I wanted to let you know that we were able to patch this issue, and for your efforts we want to give and award that will be 1 Cap + 1 Tumbler. We want to ship you these items and for thar we need the following information from your end: Name: Address1: Address2: City: State: Zip: Country: Email: Phone (REQUIRED: I will be aware of your updates on this, Greetings, Kendall, VMware INC From: Kendall Montero <kmontero@vmware.com> Date: Tuesday, 30 November 2021 at 09:32 To: fcdfe7c1-d7e8-4018-8f7b-437773bcec74+<redacted>@reports.leakix.net <fcdfe7c1-d7e8-4018-8f7b-437773bcec74+<redacted>@reports.leakix.net> Subject: Security issue detected for vmware.com : Palo Alto (Global-network) instance is outdated Dear Zythop, Thank you for your responsible disclosure. Our engineering and development teams are investigating the reported issue and will respond as soon as possible. Kendall, VMware Inc. From: fcdfe7c1-d7e8-4018-8f7b-437773bcec74+<redacted>@reports.leakix.net <fcdfe7c1-d7e8-4018-8f7b-437773bcec74+<redacted>@reports.leakix.net> Sent: Sunday, November 14, 2021 8:19 AM To: VMware Security Response Center <security@vmware.com> Subject: Security issue detected for vmware.com : Palo Alto (Global-network) instance is outdated Dear vmware.com, Security researcher zythop has identified a security issue in your infrastructure through our prevention platform. The issue has been confirmed by our team and its priority is critical. Please use this email address ( fcdfe7c1-d7e8-4018-8f7b-437773bcec74+<redacted>@reports.leakix.net ) for further communications with the involved parties. This report has been dispatched to [security@vmware.com] Report ID fcdfe7c1-d7e8-4018-8f7b-437773bcec74<https://leakix.net/reports/fcdfe7c1-d7e8-4018-8f7b-437773bcec74?key=XAGcm8BEleZ1AuFZ1zZ975Mi> Owner vmware.com Title Palo Alto (Global-network) instance is outdated Researcher report The following Palo Alto (Global-network) is publicly accessible and looks out-dated : https://125.18.245.162/global-protect/login.esp It is critical to update to a safe version as soon as possible since multiple CVEs could allow remote attackers to DoS or achieve RCE (Remote code execution) on the device. The CVE-2021-3064 prevention reports are identified and dispatched with the help of https://twitter.com/HaboubiAnis Reference: * https://security.paloaltonetworks.com/CVE-2021-3064 * https://security.paloaltonetworks.com/CVE-2020-2021 * https://security.paloaltonetworks.com/CVE-2020-2034 Related events Host Port Source Country Priority Infected Leak rows Leak size 125.18.245.162 (125.18.245.162) 443 PaloAltoPlugin India critical false 0 rows 0 B Report timeline Report created by zythop on Sun, 14 Nov 2021 10:29:15 UTC Report edited by zythop on Sun, 14 Nov 2021 10:33:18 UTC Report approved by BloodyShell on Sun, 14 Nov 2021 16:19:13 UTC New PDF report generated by system on Sun, 14 Nov 2021 16:19:14 UTC This is a free prevention report and not a sales attempt. While we do encourage rewarding researchers, we do not promote any kind of ransom or extortion scheme. Should a researcher require money from you, let us know at fraud@leakix.net, we'll take the appropriate actions and provide you guidance in the next steps. [cid:image001.gif@01D7F028.10ABEDA0] LeakIX prevention team support@leakix.net<mailto:support@leakix.net> https://leakix.net/
bip! I'm a LeakIX probe. This issue looks like it has been resolved!