When an ample number of digital gates, which protect essential networks, are suddenly opened up, allowing intruders to come in without any detection, what are the possible outcomes? This is the frightening truth about “Operation Lunar Peek,” a cyberattack that recently occurred. More than 2,000 Palo Alto Networks firewalls, which protect countless organizations, fell victim to an attack that started in early November 2024. The attackers took advantage of two serious flaws in the firewall software. One vulnerability worked like a skeleton key getting around security measures, while the other gave the attackers complete power over the system. Together, these vulnerabilities turned once-secure devices into open doors for cybercriminals, leaving critical networks at their mercy.
To understand the threat, imagine your office building’s main door is left unlocked (authentication bypass [CVE-2024-0012]), and someone gains access to the security room (privilege escalation [CVE-2024-9474]). They now control the entire building, including alarms and cameras. That’s what happened here: attackers chained the vulnerabilities to infiltrate networks.
Shadowserver reported tracking over 2,700 vulnerable PAN-OS devices, with 2,000 confirmed as compromised. Although Palo Alto Networks downplayed the numbers, emphasizing that less than 0.5% of their firewalls have exposed management interfaces, the impact remains significant.
The affected devices include next-gen firewalls, Panorama management appliances, and WildFire sandbox systems. Attackers reportedly dropped malware and manipulated systems, indicating the existence of a public exploit.
Palo Alto Networks has released patches for PAN-OS 11.2, 11.1, 11.0, 10.2 and 10.1 and urged customers to limit management interface access to trusted internal IPs. For example, configuring firewalls like locking your doors and windows ensures that only authorized individuals can enter.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has mandated federal agencies to patch these vulnerabilities by December 9, 2024.
This particular incident emphasizes the need for prompt updates in addition to the protection of externally visible internet systems. It is recommended that organizations promptly patch their devices and adhere to the best practices to mitigate such attacks. In the face of rising cyber threats, the need for the protection of critical infrastructure becomes more than just a passive approach; it becomes an active one utilizing all available means.