Toot

Written by The Shadowserver Foundation on 2024-11-21 at 09:12

We have started to report Palo Alto Networks devices still vulnerable to CVE-2024-0012 in our Vulnerable HTTP reports (filtered by network/constituency of recipient): https://shadowserver.org/what-we-do/network-reporting/vulnerable-http-report/

~2700 found vulnerable on 2024-11-20: https://dashboard.shadowserver.org/statistics/combined/tree/?day=2024-11-20&source=http_vulnerable&source=http_vulnerable6&tag=cve-2024-0012%2B&geo=all&data_set=count&scale=log

Top affected: US & India

Thanks to @watchtowrcyber for the insights!

Please check for compromise if you receive a report from us for your device.

Patch info: https://security.paloaltonetworks.com/CVE-2024-0012

https://security.paloaltonetworks.com/CVE-2024-9474

=> View attached media

=> More informations about this toot | View the thread | More toots from shadowserver@infosec.exchange

Mentions

=> View watchtowrcyber@bird.makeup profile

Tags

Proxy Information
Original URL
gemini://mastogem.picasoft.net/toot/113520173255632825
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
232.979537 milliseconds
Gemini-to-HTML Time
0.686687 milliseconds

This content has been proxied by September (3851b).