Header image

Flaws Being Exploited in Network Security Tools

Both SonicWall and Palo Alto Networks vulnerabilities are being actively exploited.

Attackers are actively exploiting two known vulnerabilities.

According to The Register. internet-exposed SonicWall firewalls impacted by the high-severity authentication bypass vulnerability in the SonicOS SSLVPN application have been targeted.

Tracked as CVE-2024-53704, the flaw is being exploited after the release of a proof-of-concept exploit for the flaw earlier last week.

Meanwhile, researchers from GreyNoise have disclosed that Palo Alto Networks PAN-OS firewalls impacted by the recently addressed high-severity authentication bypass bug, tracked as CVE-2025-0108, have been underway since Thursday.

The company said that numerous threat actors may have been exploiting the vulnerability as indicated by the elevated traffic from several IP addresses.


Dan Raywood
Dan Raywood Senior Editor SC Media UK

Dan Raywood is a B2B journalist with more than 20 years of experience, including covering cybersecurity for the past 16 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.

He has spoken at events including 44CON, Infosecurity Europe, RANT Conference, BSides Scotland, Steelcon and ESET Security Days.

Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Dan Raywood
Dan Raywood Senior Editor SC Media UK

Dan Raywood is a B2B journalist with more than 20 years of experience, including covering cybersecurity for the past 16 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.

He has spoken at events including 44CON, Infosecurity Europe, RANT Conference, BSides Scotland, Steelcon and ESET Security Days.

Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Upcoming Events

02
Apr
Webinar

Benchmarking Security Skills and How to Ensure Secure-by-Design in the Enterprise

Consider how to prove the return on investment when implementing a secure-by-design initiative

image image