Company Details
palo-alto-networks
17,868
1,667,098
541514
paloaltonetworks.com
123
PAL_3162000
Completed

Palo Alto Networks Company CyberSecurity Posture
paloaltonetworks.comPalo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.
Company Details
palo-alto-networks
17,868
1,667,098
541514
paloaltonetworks.com
123
PAL_3162000
Completed
Between 750 and 799

PAN Global Score (TPRM)XXXX

Description: Palo Alto Networks fell victim to a sophisticated **supply chain cyberattack** after threat actors (UNC6395) exploited a **vulnerability in Salesloft Drift**, a third-party sales/marketing SaaS tool integrated with Salesforce. The attackers stole **OAuth tokens**, granting unauthorized access to Palo Alto’s **Salesforce instance**. While the breach was confined to **business contact details** (names, emails, job titles, phone numbers), **sales account records**, and **case metadata**, it exposed sensitive customer data tied to major tech firms. The company **disabled the compromised integration**, revoked affected tokens, and collaborated with Salesforce/Salesloft for forensic analysis. No evidence suggested misuse of the exposed data, but the incident underscored risks in **third-party dependencies**. Customers were notified, and internal safeguards were reviewed to mitigate future threats. The attack aligns with a broader trend targeting **Salesforce ecosystems**, including TransUnion’s recent breach affecting 4.4M US consumers.
Description: A newly disclosed command injection vulnerability in Palo Alto Networks’ PAN-OS operating system poses significant security risks to enterprise firewall infrastructures worldwide. The vulnerability, catalogued as CVE-2025-4230, enables authenticated administrators with command-line interface (CLI) access to execute arbitrary commands with root-level privileges, potentially compromising entire network security architectures. This flaw allows malicious actors to exploit insufficient input validation within the PAN-OS CLI interface, enabling them to bypass system restrictions and execute unauthorized commands with elevated privileges.
Description: A critical **denial-of-service (DoS) vulnerability (CVE-TBD)** in **Palo Alto Networks’ PAN-OS** allows unauthenticated attackers to remotely reboot firewalls by sending maliciously crafted packets via the data plane. Repeated exploits can force firewalls into **maintenance mode**, disabling network protections and exposing organizations to **secondary attacks**. The flaw affects **PA-Series, VM-Series firewalls, and Prisma Access** (excluding Cloud NGFW) across multiple PAN-OS versions (10.2, 11.1, 11.2), with **no evidence of active exploitation** yet. The issue stems from **improper exception handling (CWE-754)** and **pointer manipulation (CAPEC-129)**, requiring **no authentication or user interaction**. While Palo Alto Networks assigned a **CVSS 8.7 (MEDIUM severity, MODERATE urgency)**, the vulnerability’s **network-based, no-authentication exploitability** poses significant risk to **critical infrastructure**. Affected organizations lack workarounds, making **immediate patching** essential. Unpatched systems face **operational disruption**, potential **follow-on attacks**, and **loss of firewall resilience**, though no data breaches or ransomware are reported. Remediation requires upgrades to **PAN-OS 10.2.14, 11.1.7, or 11.2.5** (or hotfixes), with Prisma Access patches pending for some deployments.
Description: Palo Alto Networks disclosed a **reflected cross-site scripting (XSS) vulnerability (CVE-2025-0133)** in its **GlobalProtect gateway and portal** (PAN-OS software). The flaw allows attackers to execute malicious JavaScript in authenticated users' browsers via crafted links, enabling **credential theft** through phishing. While the default CVSS score is **2.0 (Low)**, it escalates to **5.5 (Medium)** when **Clientless VPN** is enabled. Proof-of-concept (PoC) exploit code is already public, increasing the risk of active exploitation before patches (expected **June–August 2025**) are deployed.The vulnerability affects multiple PAN-OS versions (11.2, 11.1, 10.2, 10.1) and **Cloud NGFW**, but **Prisma Access** is unaffected. Mitigations include upgrading to patched versions, enabling Threat Prevention IDs (510003, 510004), or disabling Clientless VPN. Though no confirmed malicious exploitation exists yet, the **social engineering risk**—tricking users into clicking malicious links—poses a **significant threat to authentication integrity**, particularly for organizations relying on Clientless VPN. Urgent action is advised to prevent credential compromise and downstream attacks.
Description: Palo Alto Networks' PAN-OS software was found to contain a significant denial-of-service (DoS) vulnerability, labeled CVE-2025-0128, affecting several versions and potentially putting organizations at risk of service interruptions. Unauthenticated attackers could exploit this vulnerability to force system reboots and maintenance mode engagement, leading to service unavailability for those reliant on the company's firewall appliances. The security flaw, while rated 'MEDIUM' in severity due to a CVSS score of 6.6, has a high impact on availability, albeit not directly threatening data confidentiality or integrity. Security recommendations encourage immediate updates to patched software versions to prevent exploitation.


Palo Alto Networks has 669.23% more incidents than the average of same-industry companies with at least one recorded incident.
Palo Alto Networks has 541.03% more incidents than the average of all companies with at least one recorded incident.
Palo Alto Networks reported 5 incidents this year: 0 cyber attacks, 0 ransomware, 4 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
PAN cyber incidents detection timeline including parent company and subsidiaries

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.


## Our core business We manage linux / unix server infrastructures and build the efficient and secure networking environments using hardware cutting edge technologies suited to the needs of the project and the client. We believe in quality, opposed to quantity. Our company consists of highly

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-clas
.png)
Data Security Council of India (DSCI) along with Palo Alto Networks, today released the State of AI Adoption for Cybersecurity in India...
Palo Alto Networks in partnership with the Data Security Council of India (DSCI) released the State of AI Adoption for Cybersecurity in...
Nikesh Arora who is today the Chairman and CEO of Palo Alto Networks and the second highest paid CEO in the world was born on February 9,...
Palo Alto Networks CEO Nikesh Arora said growing AI threats make new detection methods a more pressing need than simply doubling down on...
Learn practical XDR implementation strategies from security experts. Reduce alert fatigue, expand beyond EDR, and measure real security...
CrowdStrike, Palo Alto Networks, and Fortinet are the three Cybersecurity stocks to watch today, according to MarketBeat's stock screener...
Significant cybersecurity M&A deals announced by Arctic Wolf, Bugcrowd, Huntress, Palo Alto Networks, and Zscaler.
Today, the conversation in every boardroom is most likely centered on a single, transformative force: artificial intelligence (AI).
Nir Zuk tells the story of how, frustrated by cybersecurity, he set out on his own with a an idea to transform the industry: the Next-Gen Firewall.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Palo Alto Networks is http://www.paloaltonetworks.com.
According to Rankiteo, Palo Alto Networks’s AI-generated cybersecurity score is 779, reflecting their Fair security posture.
According to Rankiteo, Palo Alto Networks currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Palo Alto Networks is not certified under SOC 2 Type 1.
According to Rankiteo, Palo Alto Networks does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Palo Alto Networks is not listed as GDPR compliant.
According to Rankiteo, Palo Alto Networks does not currently maintain PCI DSS compliance.
According to Rankiteo, Palo Alto Networks is not compliant with HIPAA regulations.
According to Rankiteo,Palo Alto Networks is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Palo Alto Networks operates primarily in the Computer and Network Security industry.
Palo Alto Networks employs approximately 17,868 people worldwide.
Palo Alto Networks presently has no subsidiaries across any sectors.
Palo Alto Networks’s official LinkedIn profile has approximately 1,667,098 followers.
Palo Alto Networks is classified under the NAICS code 541514, which corresponds to Others.
Yes, Palo Alto Networks has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/palo-alto-networks.
Yes, Palo Alto Networks maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/palo-alto-networks.
As of December 11, 2025, Rankiteo reports that Palo Alto Networks has experienced 5 cybersecurity incidents.
Palo Alto Networks has an estimated 3,057 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with immediate updates to patched software versions, and remediation measures with upgrade to pan-os 11.2.6, 11.1.10, 10.2.14, or 10.1.14-h15, and and third party assistance with salesforce, third party assistance with salesloft, third party assistance with google’s threat intelligence group, and containment measures with disabled vulnerable salesloft-drift integration (palo alto networks), containment measures with revoked affected oauth tokens, containment measures with launched third-party risk management investigation (zscaler), and remediation measures with strengthened customer authentication protocols (zscaler), remediation measures with reviewing internal safeguards (palo alto networks), remediation measures with customer notifications, and communication strategy with public disclosures (pagerduty, zscaler, palo alto networks), communication strategy with customer advisories (e.g., palo alto networks via linkedin), communication strategy with recommendations for heightened phishing vigilance, and enhanced monitoring with heightened vigilance for phishing (recommended to customers), and containment measures with urgent patching to remediated versions, containment measures with hotfix application (e.g., 10.2.13-h3, 11.1.6-h1), and product with pan-os 10.2, action with upgrade to 10.2.14 or apply hotfix 10.2.13-h3+, product with pan-os 11.1, action with upgrade to 11.1.7 or apply hotfix 11.1.6-h1/11.1.4-h13, product with pan-os 11.2, action with upgrade to 11.2.5 or apply hotfixes, product with prisma access, action with palo alto networks completing upgrades (except conflicting maintenance windows), and communication strategy with public advisory with remediation guidance, communication strategy with customer notifications for prisma access upgrades, and third party assistance with xbow researchers (vulnerability discovery), and containment measures with disable clientless vpn functionality, containment measures with enable threat prevention ids 510003 and 510004 (applications and threats content version 8970), and remediation measures with upgrade to patched pan-os versions (expected releases: june–august 2025), remediation measures with user awareness training for suspicious links, and communication strategy with public advisory by palo alto networks, and enhanced monitoring with monitor for exploitation attempts via threat prevention signatures..
Title: Palo Alto Networks PAN-OS DoS Vulnerability
Description: Palo Alto Networks' PAN-OS software was found to contain a significant denial-of-service (DoS) vulnerability, labeled CVE-2025-0128, affecting several versions and potentially putting organizations at risk of service interruptions. Unauthenticated attackers could exploit this vulnerability to force system reboots and maintenance mode engagement, leading to service unavailability for those reliant on the company's firewall appliances. The security flaw, while rated 'MEDIUM' in severity due to a CVSS score of 6.6, has a high impact on availability, albeit not directly threatening data confidentiality or integrity. Security recommendations encourage immediate updates to patched software versions to prevent exploitation.
Type: Denial of Service (DoS)
Attack Vector: Unauthenticated Exploitation
Vulnerability Exploited: CVE-2025-0128
Threat Actor: Unauthenticated Attackers
Title: PAN-OS Admin Command Injection Vulnerability
Description: A newly disclosed command injection vulnerability in Palo Alto Networks’ PAN-OS operating system poses significant security risks to enterprise firewall infrastructures worldwide.
Date Publicly Disclosed: 2025-06-11
Type: Command Injection
Attack Vector: Authenticated administrator with CLI access
Vulnerability Exploited: CVE-2025-4230
Title: Supply Chain Breach via Salesloft Drift Exploit Targeting Salesforce Data
Description: Hackers exploited the Salesloft Drift app to steal OAuth tokens and access Salesforce data, exposing customer details at major tech firms including Palo Alto Networks, Zscaler, and PagerDuty. The attack was a supply chain breach targeting a third-party sales/marketing SaaS application, leading to unauthorized access to Salesforce accounts of hundreds of companies. Exposed data included business contact details (names, emails, job titles, phone numbers) but no core products or infrastructure were compromised.
Date Detected: 2025-08-20
Date Publicly Disclosed: 2025-08-23
Type: Supply Chain Attack
Attack Vector: Third-Party Vulnerability ExploitationOAuth Token TheftSalesforce Integration Abuse
Vulnerability Exploited: Unspecified vulnerability in Salesloft Drift's OAuth token management
Threat Actor: UNC6395
Motivation: Data TheftPotential Phishing/Follow-on AttacksFinancial Gain (likely)
Title: Critical Denial-of-Service Vulnerability in Palo Alto Networks PAN-OS Software
Description: A critical denial-of-service vulnerability (CVE-TBD) has been identified in Palo Alto Networks PAN-OS software that allows unauthenticated attackers to remotely reboot firewalls by crafting specially designed packets through the data plane. Repeated reboot attempts can force affected firewalls into maintenance mode, disabling network protection capabilities and leaving organizations vulnerable to secondary attacks. The vulnerability impacts PA-Series firewalls, VM-Series firewalls, and Prisma Access deployments across multiple PAN-OS versions (excluding Cloud NGFW). It manifests only on firewalls with URL proxy or any decrypt policy configured (including explicit decrypt, explicit no-decrypt, or no-matching policies). The issue stems from improper checks for unusual conditions (CWE-754) and pointer manipulation (CAPEC-129). Palo Alto Networks assigned a CVSS base score of 8.7 (MEDIUM severity, MODERATE urgency) and reports no evidence of active exploitation in the wild. Remediation requires patching to specific versions (e.g., PAN-OS 10.2.14, 11.1.7, or 11.2.5) or applying hotfixes, with no workarounds available for unpatched systems.
Type: Denial-of-Service (DoS)
Attack Vector: Network-based (no authentication or user interaction required)
Vulnerability Exploited: CVE-TBDCWE-754 (Improper Check for Unusual or Exceptional Conditions)CAPEC-129 (Pointer Manipulation)Cvss Score: {'base': 8.7, 'behavioral': 6.6}, Severity: MEDIUM, Urgency: MODERATE.
Title: Palo Alto Networks GlobalProtect Reflected XSS Vulnerability (CVE-2025-0133)
Description: Palo Alto Networks has disclosed a reflected cross-site scripting (XSS) vulnerability, tracked as CVE-2025-0133, affecting the GlobalProtect gateway and portal features of its PAN-OS software. The flaw enables execution of malicious JavaScript in authenticated Captive Portal user browsers when victims click specially crafted links. It poses a significant threat to organizations utilizing the Clientless VPN feature. The vulnerability is rated low severity (CVSS Base Score 2.0) under default configurations but elevates to MEDIUM (CVSS 5.5) when Clientless VPN is enabled. XBOW researchers identified this vulnerability, which enables attackers to create convincing phishing and credential-stealing links that appear legitimately hosted on the GlobalProtect portal. Proof-of-concept exploit code is already available in the wild, increasing urgency for mitigation.
Type: Vulnerability
Attack Vector: Social EngineeringMalicious LinksPhishing
Vulnerability Exploited: Cve Id: CVE-2025-0133, Cwe Id: CWE-79, Capec Id: CAPEC-591, Cvss Score: {'default': 2.0, 'clientless_vpn_enabled': 5.5}, Cvss Vector: None, Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GlobalProtect gateway/portal Captive Portal.
Motivation: Credential TheftPhishingSession Hijacking
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through CLI access and Salesloft Drift (third-party SaaS application).

Systems Affected: Firewall appliances
Downtime: System reboots and maintenance mode engagement
Operational Impact: Service unavailability

Systems Affected: PAN-OS 11.2 versions prior to 11.2.6, PAN-OS 11.1 versions before 11.1.10, PAN-OS 10.2 versions earlier than 10.2.14, and PAN-OS 10.1 versions before 10.1.14-h15

Data Compromised: Business contact details (names, email addresses, job titles, phone numbers), Sales account records, Case metadata
Systems Affected: Salesforce instances (via third-party integration)Salesloft Drift app
Operational Impact: Heightened vigilance required for phishingThird-party risk investigationsCustomer notificationsAuthentication protocol reviews
Brand Reputation Impact: Potential erosion of trust in third-party integrationsReputational risk for affected firms (Palo Alto Networks, Zscaler, PagerDuty)
Identity Theft Risk: ['Low (business contact details only)', 'Phishing risk elevated']

Systems Affected: Type: PA-Series Firewalls, Versions: 10.2 (all ≤ 10.2.13), 11.1 (all ≤ 11.1.6), 11.2 (< 11.2.5), Type: VM-Series Firewalls, Versions: 10.2 (all ≤ 10.2.13), 11.1 (all ≤ 11.1.6), 11.2 (< 11.2.5), Type: Prisma Access, Versions: Underlying PAN-OS versions (see above).
Downtime: Potential extended downtime due to forced maintenance mode and secondary attack exposure
Operational Impact: Loss of firewall protection, network disruption, vulnerability to follow-on attacks
Brand Reputation Impact: Potential reputational damage due to security posture degradation

Data Compromised: User session cookies, Credentials
Systems Affected: GlobalProtect GatewayGlobalProtect PortalClientless VPN
Operational Impact: Increased Phishing RiskCompromised User Sessions
Brand Reputation Impact: Potential Loss of Trust Due to Phishing Risks
Identity Theft Risk: ['High (if credentials are stolen)']
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Business Contact Details, Sales Account Records, Case Metadata, Social Security Numbers (Transunion Only), , Session Tokens, Credentials and .

Entity Name: Palo Alto Networks
Entity Type: Organization
Industry: Cybersecurity

Entity Name: Palo Alto Networks
Entity Type: Enterprise
Industry: Network Security

Entity Name: Palo Alto Networks
Entity Type: Public Company
Industry: Cybersecurity
Location: Santa Clara, California, USA
Size: Large Enterprise
Customers Affected: Not specified (business contact details exposed)

Entity Name: Zscaler
Entity Type: Public Company
Industry: Cybersecurity
Location: San Jose, California, USA
Size: Large Enterprise
Customers Affected: Not specified (business contact details exposed)

Entity Name: PagerDuty
Entity Type: Public Company
Industry: IT Operations/Incident Response
Location: San Francisco, California, USA
Size: Mid-to-Large Enterprise
Customers Affected: Not specified (business contact details exposed)

Entity Name: TransUnion
Entity Type: Public Company
Industry: Credit Reporting
Location: Chicago, Illinois, USA
Size: Large Enterprise
Customers Affected: 4.4 million US consumers (including Social Security numbers)

Entity Name: Salesloft (Drift integration)
Entity Type: Private Company (SaaS)
Industry: Sales Engagement Platform
Location: Atlanta, Georgia, USA
Size: Mid-to-Large Enterprise
Customers Affected: Hundreds of companies (via OAuth token theft)

Entity Name: Palo Alto Networks
Entity Type: Cybersecurity Vendor
Industry: Network Security
Location: Santa Clara, California, USA
Customers Affected: Organizations using vulnerable PAN-OS versions (PA-Series, VM-Series, Prisma Access)

Entity Name: Organizations using affected PAN-OS versions
Entity Type: Enterprises, Government Agencies, Service Providers
Location: Global

Entity Name: Palo Alto Networks
Entity Type: Organization
Industry: Cybersecurity
Location: Santa Clara, California, USA

Remediation Measures: Immediate updates to patched software versions

Remediation Measures: Upgrade to PAN-OS 11.2.6, 11.1.10, 10.2.14, or 10.1.14-h15

Incident Response Plan Activated: True
Third Party Assistance: Salesforce, Salesloft, Google’S Threat Intelligence Group.
Containment Measures: Disabled vulnerable Salesloft-Drift integration (Palo Alto Networks)Revoked affected OAuth tokensLaunched third-party risk management investigation (Zscaler)
Remediation Measures: Strengthened customer authentication protocols (Zscaler)Reviewing internal safeguards (Palo Alto Networks)Customer notifications
Communication Strategy: Public disclosures (PagerDuty, Zscaler, Palo Alto Networks)Customer advisories (e.g., Palo Alto Networks via LinkedIn)Recommendations for heightened phishing vigilance
Enhanced Monitoring: Heightened vigilance for phishing (recommended to customers)

Containment Measures: Urgent patching to remediated versionsHotfix application (e.g., 10.2.13-h3, 11.1.6-h1)
Remediation Measures: Product: PAN-OS 10.2, Action: Upgrade to 10.2.14 or apply hotfix 10.2.13-h3+, Product: PAN-OS 11.1, Action: Upgrade to 11.1.7 or apply hotfix 11.1.6-h1/11.1.4-h13, Product: PAN-OS 11.2, Action: Upgrade to 11.2.5 or apply hotfixes, Product: Prisma Access, Action: Palo Alto Networks completing upgrades (except conflicting maintenance windows),
Communication Strategy: Public advisory with remediation guidanceCustomer notifications for Prisma Access upgrades

Third Party Assistance: Xbow Researchers (Vulnerability Discovery).
Containment Measures: Disable Clientless VPN functionalityEnable Threat Prevention IDs 510003 and 510004 (Applications and Threats content version 8970)
Remediation Measures: Upgrade to patched PAN-OS versions (expected releases: June–August 2025)User awareness training for suspicious links
Communication Strategy: Public Advisory by Palo Alto Networks
Enhanced Monitoring: Monitor for exploitation attempts via Threat Prevention signatures
Third-Party Assistance: The company involves third-party assistance in incident response through Salesforce, Salesloft, Google’s Threat Intelligence Group, , XBOW Researchers (Vulnerability Discovery), .

Type of Data Compromised: Business contact details, Sales account records, Case metadata, Social security numbers (transunion only)
Number of Records Exposed: Undisclosed (Palo Alto Networks, Zscaler, PagerDuty), 4.4 million (TransUnion)
Sensitivity of Data: Moderate (business contacts)High (SSNs for TransUnion)
Personally Identifiable Information: NamesEmail addressesJob titlesPhone numbersSocial Security numbers (TransUnion only)

Type of Data Compromised: Session tokens, Credentials
Sensitivity of Data: High (authenticated session data)
Data Exfiltration: Potential (if credentials are stolen)
Personally Identifiable Information: Potential (if credentials include PII)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Immediate updates to patched software versions, Upgrade to PAN-OS 11.2.6, 11.1.10, 10.2.14, or 10.1.14-h15, Strengthened customer authentication protocols (Zscaler), Reviewing internal safeguards (Palo Alto Networks), Customer notifications, , product: PAN-OS 10.2, action: Upgrade to 10.2.14 or apply hotfix 10.2.13-h3+, product: PAN-OS 11.1, action: Upgrade to 11.1.7 or apply hotfix 11.1.6-h1/11.1.4-h13, product: PAN-OS 11.2, action: Upgrade to 11.2.5 or apply hotfixes, product: Prisma Access, action: Palo Alto Networks completing upgrades (except conflicting maintenance windows), , Upgrade to patched PAN-OS versions (expected releases: June–August 2025), User awareness training for suspicious links, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by disabled vulnerable salesloft-drift integration (palo alto networks), revoked affected oauth tokens, launched third-party risk management investigation (zscaler), , urgent patching to remediated versions, hotfix application (e.g., 10.2.13-h3, 11.1.6-h1), , disable clientless vpn functionality, enable threat prevention ids 510003 and 510004 (applications and threats content version 8970) and .

Data Exfiltration: True

Lessons Learned: Third-party SaaS integrations introduce significant supply chain risk, even for cybersecurity firms., OAuth token management requires stricter oversight and monitoring., Rapid revocation of compromised tokens is critical to limiting exposure., Customer communication and transparency are essential to maintaining trust post-breach.

Lessons Learned: Criticality of prompt patching for network infrastructure vulnerabilities, Risks of DoS vulnerabilities enabling secondary attacks, Importance of maintenance windows for security updates

Lessons Learned: Clientless VPN introduces elevated risk for reflected XSS vulnerabilities., Proof-of-concept exploits in the wild necessitate proactive mitigation even before active exploitation is observed., User training remains critical for mitigating social engineering-based attacks.

Recommendations: Immediate updates to patched software versions

Recommendations: Implement additional access controls limiting CLI access to essential personnel only.

Recommendations: Conduct third-party risk assessments for all SaaS integrations, especially those with OAuth access., Implement least-privilege access controls for third-party apps connected to CRM systems like Salesforce., Monitor for anomalous OAuth token usage or unexpected API calls from integrated apps., Enhance authentication protocols for customer support interactions to prevent social engineering., Educate employees and customers on phishing risks following data breaches involving contact details.Conduct third-party risk assessments for all SaaS integrations, especially those with OAuth access., Implement least-privilege access controls for third-party apps connected to CRM systems like Salesforce., Monitor for anomalous OAuth token usage or unexpected API calls from integrated apps., Enhance authentication protocols for customer support interactions to prevent social engineering., Educate employees and customers on phishing risks following data breaches involving contact details.Conduct third-party risk assessments for all SaaS integrations, especially those with OAuth access., Implement least-privilege access controls for third-party apps connected to CRM systems like Salesforce., Monitor for anomalous OAuth token usage or unexpected API calls from integrated apps., Enhance authentication protocols for customer support interactions to prevent social engineering., Educate employees and customers on phishing risks following data breaches involving contact details.Conduct third-party risk assessments for all SaaS integrations, especially those with OAuth access., Implement least-privilege access controls for third-party apps connected to CRM systems like Salesforce., Monitor for anomalous OAuth token usage or unexpected API calls from integrated apps., Enhance authentication protocols for customer support interactions to prevent social engineering., Educate employees and customers on phishing risks following data breaches involving contact details.Conduct third-party risk assessments for all SaaS integrations, especially those with OAuth access., Implement least-privilege access controls for third-party apps connected to CRM systems like Salesforce., Monitor for anomalous OAuth token usage or unexpected API calls from integrated apps., Enhance authentication protocols for customer support interactions to prevent social engineering., Educate employees and customers on phishing risks following data breaches involving contact details.

Recommendations: Immediately upgrade to patched PAN-OS versions (10.2.14, 11.1.7, 11.2.5+) or apply hotfixes, Prioritize remediation during next maintenance window for Prisma Access, Monitor for signs of exploitation (unexpected reboots, maintenance mode), Review decrypt policies and URL proxy configurations for exposure, Assess secondary attack surfaces exposed during firewall downtimeImmediately upgrade to patched PAN-OS versions (10.2.14, 11.1.7, 11.2.5+) or apply hotfixes, Prioritize remediation during next maintenance window for Prisma Access, Monitor for signs of exploitation (unexpected reboots, maintenance mode), Review decrypt policies and URL proxy configurations for exposure, Assess secondary attack surfaces exposed during firewall downtimeImmediately upgrade to patched PAN-OS versions (10.2.14, 11.1.7, 11.2.5+) or apply hotfixes, Prioritize remediation during next maintenance window for Prisma Access, Monitor for signs of exploitation (unexpected reboots, maintenance mode), Review decrypt policies and URL proxy configurations for exposure, Assess secondary attack surfaces exposed during firewall downtimeImmediately upgrade to patched PAN-OS versions (10.2.14, 11.1.7, 11.2.5+) or apply hotfixes, Prioritize remediation during next maintenance window for Prisma Access, Monitor for signs of exploitation (unexpected reboots, maintenance mode), Review decrypt policies and URL proxy configurations for exposure, Assess secondary attack surfaces exposed during firewall downtimeImmediately upgrade to patched PAN-OS versions (10.2.14, 11.1.7, 11.2.5+) or apply hotfixes, Prioritize remediation during next maintenance window for Prisma Access, Monitor for signs of exploitation (unexpected reboots, maintenance mode), Review decrypt policies and URL proxy configurations for exposure, Assess secondary attack surfaces exposed during firewall downtime

Recommendations: Prioritize patching PAN-OS versions based on Clientless VPN usage., Disable Clientless VPN if not essential to operations., Deploy Threat Prevention signatures (IDs 510003, 510004) for affected systems., Conduct phishing simulation exercises to raise user awareness., Monitor for unusual activity in GlobalProtect portals/gateways.Prioritize patching PAN-OS versions based on Clientless VPN usage., Disable Clientless VPN if not essential to operations., Deploy Threat Prevention signatures (IDs 510003, 510004) for affected systems., Conduct phishing simulation exercises to raise user awareness., Monitor for unusual activity in GlobalProtect portals/gateways.Prioritize patching PAN-OS versions based on Clientless VPN usage., Disable Clientless VPN if not essential to operations., Deploy Threat Prevention signatures (IDs 510003, 510004) for affected systems., Conduct phishing simulation exercises to raise user awareness., Monitor for unusual activity in GlobalProtect portals/gateways.Prioritize patching PAN-OS versions based on Clientless VPN usage., Disable Clientless VPN if not essential to operations., Deploy Threat Prevention signatures (IDs 510003, 510004) for affected systems., Conduct phishing simulation exercises to raise user awareness., Monitor for unusual activity in GlobalProtect portals/gateways.Prioritize patching PAN-OS versions based on Clientless VPN usage., Disable Clientless VPN if not essential to operations., Deploy Threat Prevention signatures (IDs 510003, 510004) for affected systems., Conduct phishing simulation exercises to raise user awareness., Monitor for unusual activity in GlobalProtect portals/gateways.
Key Lessons Learned: The key lessons learned from past incidents are Third-party SaaS integrations introduce significant supply chain risk, even for cybersecurity firms.,OAuth token management requires stricter oversight and monitoring.,Rapid revocation of compromised tokens is critical to limiting exposure.,Customer communication and transparency are essential to maintaining trust post-breach.Criticality of prompt patching for network infrastructure vulnerabilities,Risks of DoS vulnerabilities enabling secondary attacks,Importance of maintenance windows for security updatesClientless VPN introduces elevated risk for reflected XSS vulnerabilities.,Proof-of-concept exploits in the wild necessitate proactive mitigation even before active exploitation is observed.,User training remains critical for mitigating social engineering-based attacks.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Implement additional access controls limiting CLI access to essential personnel only. and Immediate updates to patched software versions.

Source: Palo Alto Networks Customer Notification (via LinkedIn)
Date Accessed: 2025-08-23

Source: Google’s Threat Intelligence Group Investigation

Source: Palo Alto Networks Security Advisory

Source: Palo Alto Networks Security Advisory

Source: XBOW Research
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: PagerDuty Public ReportDate Accessed: 2025-08-23, and Source: Zscaler Official BlogDate Accessed: 2025-08-23, and Source: Palo Alto Networks Customer Notification (via LinkedIn)Date Accessed: 2025-08-23, and Source: Google’s Threat Intelligence Group Investigation, and Source: Palo Alto Networks Security Advisory, and Source: Palo Alto Networks Security Advisory, and Source: XBOW Research.

Investigation Status: Ongoing (Google’s Threat Intelligence Group and affected companies)

Investigation Status: Ongoing (no active exploitation detected; patches released)

Investigation Status: Ongoing (no confirmed malicious exploitation reported as of disclosure)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Disclosures (Pagerduty, Zscaler, Palo Alto Networks), Customer Advisories (E.G., Palo Alto Networks Via Linkedin), Recommendations For Heightened Phishing Vigilance, Public Advisory With Remediation Guidance, Customer Notifications For Prisma Access Upgrades and Public Advisory By Palo Alto Networks.

Stakeholder Advisories: Customers Advised To Monitor For Phishing Attempts (Zscaler, Pagerduty)., Palo Alto Networks Notified Impacted Customers Directly., Transunion Disclosed Breach To Affected 4.4 Million Us Consumers..
Customer Advisories: PagerDuty: 'We will never contact anyone by phone to request a password or any other secure details.'Zscaler: 'No evidence of misuse found, but customers should maintain heightened vigilance for phishing.'Palo Alto Networks: Reviewing internal safeguards to prevent future incidents.

Stakeholder Advisories: Public Security Advisory Issued By Palo Alto Networks.
Customer Advisories: Direct notifications to Prisma Access customers for patch scheduling

Stakeholder Advisories: Palo Alto Networks Customers Using Affected Pan-Os Versions.
Customer Advisories: Apply mitigations immediately if Clientless VPN is enabled.Await official patches for long-term remediation.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Customers Advised To Monitor For Phishing Attempts (Zscaler, Pagerduty)., Palo Alto Networks Notified Impacted Customers Directly., Transunion Disclosed Breach To Affected 4.4 Million Us Consumers., Pagerduty: 'We Will Never Contact Anyone By Phone To Request A Password Or Any Other Secure Details.', Zscaler: 'No Evidence Of Misuse Found, But Customers Should Maintain Heightened Vigilance For Phishing.', Palo Alto Networks: Reviewing Internal Safeguards To Prevent Future Incidents., , Public Security Advisory Issued By Palo Alto Networks, Direct Notifications To Prisma Access Customers For Patch Scheduling, , Palo Alto Networks Customers Using Affected Pan-Os Versions, Apply Mitigations Immediately If Clientless Vpn Is Enabled., Await Official Patches For Long-Term Remediation. and .

Entry Point: CLI access

Entry Point: Salesloft Drift (third-party SaaS application)
High Value Targets: Salesforce Instances Of Cybersecurity/Tech Firms,
Data Sold on Dark Web: Salesforce Instances Of Cybersecurity/Tech Firms,

Root Causes: Insufficient input validation within the PAN-OS CLI interface
Corrective Actions: Patching and restricting administrative access

Root Causes: Inadequate Security Controls For Oauth Tokens In Salesloft Drift., Over-Permissive Third-Party App Integrations With Salesforce., Lack Of Real-Time Monitoring For Anomalous Token Usage.,
Corrective Actions: Disabled Vulnerable Integrations (Palo Alto Networks)., Revoked Compromised Oauth Tokens., Enhanced Authentication Protocols (Zscaler)., Third-Party Risk Management Investigations Launched.,

Root Causes: Improper Checks For Unusual Conditions (Cwe-754), Pointer Manipulation Vulnerability (Capec-129), Lack Of Input Validation In Data Plane Packet Handling,
Corrective Actions: Code Fixes In Patched Pan-Os Versions To Validate Data Plane Inputs, Enhanced Testing For Dos Resilience In Firewall Software, Proactive Hotfix Distribution For Critical Vulnerabilities,

Root Causes: Improper Input Neutralization In Globalprotect Captive Portal Web Page Generation., Lack Of Default Protections Against Reflected Xss In Clientless Vpn Configurations.,
Corrective Actions: Code-Level Fixes In Upcoming Pan-Os Patches., Enhanced Threat Prevention Signatures For Xss Detection.,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Salesforce, Salesloft, Google’S Threat Intelligence Group, , Heightened Vigilance For Phishing (Recommended To Customers), , Xbow Researchers (Vulnerability Discovery), , Monitor For Exploitation Attempts Via Threat Prevention Signatures, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Patching and restricting administrative access, Disabled Vulnerable Integrations (Palo Alto Networks)., Revoked Compromised Oauth Tokens., Enhanced Authentication Protocols (Zscaler)., Third-Party Risk Management Investigations Launched., , Code Fixes In Patched Pan-Os Versions To Validate Data Plane Inputs, Enhanced Testing For Dos Resilience In Firewall Software, Proactive Hotfix Distribution For Critical Vulnerabilities, , Code-Level Fixes In Upcoming Pan-Os Patches., Enhanced Threat Prevention Signatures For Xss Detection., .
Last Attacking Group: The attacking group in the last incident were an Unauthenticated Attackers and UNC6395.
Most Recent Incident Detected: The most recent incident detected was on 2025-08-20.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-08-23.
Most Significant Data Compromised: The most significant data compromised in an incident were Business contact details (names, email addresses, job titles, phone numbers), Sales account records, Case metadata, , User Session Cookies, Credentials and .
Most Significant System Affected: The most significant system affected in an incident were Salesforce instances (via third-party integration)Salesloft Drift app and T, y, p, e, :, , P, A, -, S, e, r, i, e, s, , F, i, r, e, w, a, l, l, s, ,, V, e, r, s, i, o, n, s, :, , 1, 0, ., 2, , (, a, l, l, , ≤, , 1, 0, ., 2, ., 1, 3, ), ,, , 1, 1, ., 1, , (, a, l, l, , ≤, , 1, 1, ., 1, ., 6, ), ,, , 1, 1, ., 2, , (, <, , 1, 1, ., 2, ., 5, ), ,, T, y, p, e, :, , V, M, -, S, e, r, i, e, s, , F, i, r, e, w, a, l, l, s, ,, V, e, r, s, i, o, n, s, :, , 1, 0, ., 2, , (, a, l, l, , ≤, , 1, 0, ., 2, ., 1, 3, ), ,, , 1, 1, ., 1, , (, a, l, l, , ≤, , 1, 1, ., 1, ., 6, ), ,, , 1, 1, ., 2, , (, <, , 1, 1, ., 2, ., 5, ), ,, T, y, p, e, :, , P, r, i, s, m, a, , A, c, c, e, s, s, ,, V, e, r, s, i, o, n, s, :, , U, n, d, e, r, l, y, i, n, g, , P, A, N, -, O, S, , v, e, r, s, i, o, n, s, , (, s, e, e, , a, b, o, v, e, ), ,, and GlobalProtect GatewayGlobalProtect PortalClientless VPN.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was salesforce, salesloft, google’s threat intelligence group, , xbow researchers (vulnerability discovery), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Disabled vulnerable Salesloft-Drift integration (Palo Alto Networks)Revoked affected OAuth tokensLaunched third-party risk management investigation (Zscaler), Urgent patching to remediated versionsHotfix application (e.g., 10.2.13-h3, 11.1.6-h1) and Disable Clientless VPN functionalityEnable Threat Prevention IDs 510003 and 510004 (Applications and Threats content version 8970).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Business contact details (names, email addresses, job titles, phone numbers), User Session Cookies, Sales account records, Credentials and Case metadata.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 4.4M.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was User training remains critical for mitigating social engineering-based attacks.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Implement least-privilege access controls for third-party apps connected to CRM systems like Salesforce., Monitor for anomalous OAuth token usage or unexpected API calls from integrated apps., Conduct third-party risk assessments for all SaaS integrations, especially those with OAuth access., Assess secondary attack surfaces exposed during firewall downtime, Monitor for unusual activity in GlobalProtect portals/gateways., Disable Clientless VPN if not essential to operations., Conduct phishing simulation exercises to raise user awareness., Enhance authentication protocols for customer support interactions to prevent social engineering., Immediately upgrade to patched PAN-OS versions (10.2.14, 11.1.7, 11.2.5+) or apply hotfixes, Review decrypt policies and URL proxy configurations for exposure, Prioritize patching PAN-OS versions based on Clientless VPN usage., Implement additional access controls limiting CLI access to essential personnel only., Immediate updates to patched software versions, Deploy Threat Prevention signatures (IDs 510003, 510004) for affected systems., Prioritize remediation during next maintenance window for Prisma Access, Monitor for signs of exploitation (unexpected reboots, maintenance mode) and Educate employees and customers on phishing risks following data breaches involving contact details..
Most Recent Source: The most recent source of information about an incident are PagerDuty Public Report, Palo Alto Networks Customer Notification (via LinkedIn), Palo Alto Networks Security Advisory, Zscaler Official Blog, XBOW Research and Google’s Threat Intelligence Group Investigation.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (Google’s Threat Intelligence Group and affected companies).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Customers advised to monitor for phishing attempts (Zscaler, PagerDuty)., Palo Alto Networks notified impacted customers directly., TransUnion disclosed breach to affected 4.4 million US consumers., Public security advisory issued by Palo Alto Networks, Palo Alto Networks customers using affected PAN-OS versions, .
Most Recent Customer Advisory: The most recent customer advisory issued were an PagerDuty: 'We will never contact anyone by phone to request a password or any other secure details.'Zscaler: 'No evidence of misuse found, but customers should maintain heightened vigilance for phishing.'Palo Alto Networks: Reviewing internal safeguards to prevent future incidents., Direct notifications to Prisma Access customers for patch scheduling and Apply mitigations immediately if Clientless VPN is enabled.Await official patches for long-term remediation.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Salesloft Drift (third-party SaaS application) and CLI access.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Insufficient input validation within the PAN-OS CLI interface, Inadequate security controls for OAuth tokens in Salesloft Drift.Over-permissive third-party app integrations with Salesforce.Lack of real-time monitoring for anomalous token usage., Improper checks for unusual conditions (CWE-754)Pointer manipulation vulnerability (CAPEC-129)Lack of input validation in data plane packet handling, Improper input neutralization in GlobalProtect Captive Portal web page generation.Lack of default protections against reflected XSS in Clientless VPN configurations..
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Patching and restricting administrative access, Disabled vulnerable integrations (Palo Alto Networks).Revoked compromised OAuth tokens.Enhanced authentication protocols (Zscaler).Third-party risk management investigations launched., Code fixes in patched PAN-OS versions to validate data plane inputsEnhanced testing for DoS resilience in firewall softwareProactive hotfix distribution for critical vulnerabilities, Code-level fixes in upcoming PAN-OS patches.Enhanced Threat Prevention signatures for XSS detection..
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.