Skip to main content
Back to Blogs Intelligence Digest

Vulnerability Opens the Door to Zero-Day Threats and Data Breaches – Skyhigh Security Intelligence Digest

By Rodman Ramezanian - Global Cloud Threat Lead, Skyhigh Security

April 29, 2024 2 Minute Read

High-severity vulnerabilities in legacy VPN systems across multiple vendors have sounded an alarm in cybersecurity circles. Businesses all over the world that use SSL VPN products from Ivanti, Fortinet, Cisco, Palo Alto Networks, and other vendors are prime targets for emerging threats and potential data breaches. By exploiting the inherent design flaws in internet-facing assets like firewalls and VPNs, attackers can gain access to networks and move laterally, potentially stealing sensitive data and compromising critical applications.

A vulnerability found within the Palo Alto Networks GlobalProtect VPN product is the most recent discovery, reported on by Volexity Threat Research in mid-April, 2024. By exploiting a security flaw in Palo Alto Networks PAN-OS, attackers gain full control with root privileges of the firewall and the VPN connectivity it facilitates. Without needing a username and password, attackers leverage the firewalls as an entry point to move laterally within targeted organizations. This zero-day threat has the highest possible severity score of 10 out of 10.

While patching these types of vulnerabilities is an essential short-term fix, adopting a Zero Trust architecture is one of the best ways to prevent exposure. Unlike traditional security architectures that rely on firewalls and VPNs, Zero Trust creates secure connections directly between users who work remotely, in branch offices, or at headquarters and the applications, workloads, and industrial control systems they need to access.

Instead of directing users or devices to the corporate network, they are continually verified before access is granted to sensitive resources, following the Zero Trust principle of “never trust, always verify.” To safeguard data at all times—without impacting availability or performance for users—trust is never granted by default. Whether users are remote or outside the network perimeter, they can only access authorized applications and services and never the entire network. This approach prevents attackers from entering the network through their usual entry points and halts lateral movement of threats.

Once you decide to switch from legacy VPN and firewall to a Zero Trust framework, where do you begin? Find out how Skyhigh Security can help you modernize your security infrastructure to safeguard your organization against vulnerabilities like these. Read our most recent Intelligence Digest.

Back to Blogs

Trending Blogs

Industry Perspectives

Weighing the Benefits and Risks of AI Autopilots

Sekhar Sarukkai October 25, 2024

Industry Perspectives

In Defense of Critical Assets: New Edge Security Guidance from ACSC

Rodman Ramezanian October 22, 2024

Industry Perspectives

Security Risks and Challenges with AI Copilots

Sekhar Sarukkai October 16, 2024

Industry Perspectives

Foundational AI: A Critical Layer with Security Challenges

Sekhar Sarukkai October 10, 2024