FortiDAST
FortiDAST performs automated black-box dynamic application security testing of web applications to identify vulnerabilities that bad actors may exploit.
rdiwakar
Staff
Staff
Article Id 367501
Description

This outbreak alert on Palo Alto Networks covers vulnerability that is CVE-2024-9474.

 

CVE-2024-9474 is a critical privilege escalation vulnerability affecting Palo Alto Networks PAN-OS software. This vulnerability allows an authenticated attacker with administrator access to the PAN-OS management interface to execute root-level commands on the firewall, effectively granting them full control over the device.

 

This article describes the assessment of unauthenticated access and root level command execution vulnerability in Palo Alto networks software.

Scope

FortiDAST Scripting Engine updated in version 24.4.0

Solution

Detection against that vulnerability is empowered by the FortiDAST Scripting Engine (FSE).

 

This technology enables FortiDAST to assess remotely with a high level of confidence if an asset is vulnerable to a specific vulnerability by testing the disarmed exploit against the asset itself.

 

To configure the scan, it will be necessary to enable the FSE group signature 'paloalto' which will select the underlying script as per the scan requirement: 'CVE-2024-9474 Palo Alto PanOS Remote Code Execution Vulnerability.'

 

For reference, a step-by-step guide on how to configure FortiDAST to trigger FSE can be found on Fortinet’s blog:

https://www.fortinet.com/blog/business-and-technology/fortipentest-exploit-engine-a-new-security-ars...

Contributors