Company Details
palo-alto-networks
17,868
1,667,098
541514
paloaltonetworks.com
123
PAL_3162000
Completed

Palo Alto Networks Company CyberSecurity Posture
paloaltonetworks.comPalo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.
Company Details
palo-alto-networks
17,868
1,667,098
541514
paloaltonetworks.com
123
PAL_3162000
Completed
Between 750 and 799

PAN Global Score (TPRM)XXXX

Description: Palo Alto Networks fell victim to a sophisticated **supply chain cyberattack** after threat actors (UNC6395) exploited a **vulnerability in Salesloft Drift**, a third-party sales/marketing SaaS tool integrated with Salesforce. The attackers stole **OAuth tokens**, granting unauthorized access to Palo Alto’s **Salesforce instance**. While the breach was confined to **business contact details** (names, emails, job titles, phone numbers), **sales account records**, and **case metadata**, it exposed sensitive customer data tied to major tech firms. The company **disabled the compromised integration**, revoked affected tokens, and collaborated with Salesforce/Salesloft for forensic analysis. No evidence suggested misuse of the exposed data, but the incident underscored risks in **third-party dependencies**. Customers were notified, and internal safeguards were reviewed to mitigate future threats. The attack aligns with a broader trend targeting **Salesforce ecosystems**, including TransUnion’s recent breach affecting 4.4M US consumers.
Description: A newly disclosed command injection vulnerability in Palo Alto Networks’ PAN-OS operating system poses significant security risks to enterprise firewall infrastructures worldwide. The vulnerability, catalogued as CVE-2025-4230, enables authenticated administrators with command-line interface (CLI) access to execute arbitrary commands with root-level privileges, potentially compromising entire network security architectures. This flaw allows malicious actors to exploit insufficient input validation within the PAN-OS CLI interface, enabling them to bypass system restrictions and execute unauthorized commands with elevated privileges.
Description: A critical **denial-of-service (DoS) vulnerability (CVE-TBD)** in **Palo Alto Networks’ PAN-OS** allows unauthenticated attackers to remotely reboot firewalls by sending maliciously crafted packets via the data plane. Repeated exploits can force firewalls into **maintenance mode**, disabling network protections and exposing organizations to **secondary attacks**. The flaw affects **PA-Series, VM-Series firewalls, and Prisma Access** (excluding Cloud NGFW) across multiple PAN-OS versions (10.2, 11.1, 11.2), with **no evidence of active exploitation** yet. The issue stems from **improper exception handling (CWE-754)** and **pointer manipulation (CAPEC-129)**, requiring **no authentication or user interaction**. While Palo Alto Networks assigned a **CVSS 8.7 (MEDIUM severity, MODERATE urgency)**, the vulnerability’s **network-based, no-authentication exploitability** poses significant risk to **critical infrastructure**. Affected organizations lack workarounds, making **immediate patching** essential. Unpatched systems face **operational disruption**, potential **follow-on attacks**, and **loss of firewall resilience**, though no data breaches or ransomware are reported. Remediation requires upgrades to **PAN-OS 10.2.14, 11.1.7, or 11.2.5** (or hotfixes), with Prisma Access patches pending for some deployments.
Description: Palo Alto Networks disclosed a **reflected cross-site scripting (XSS) vulnerability (CVE-2025-0133)** in its **GlobalProtect gateway and portal** (PAN-OS software). The flaw allows attackers to execute malicious JavaScript in authenticated users' browsers via crafted links, enabling **credential theft** through phishing. While the default CVSS score is **2.0 (Low)**, it escalates to **5.5 (Medium)** when **Clientless VPN** is enabled. Proof-of-concept (PoC) exploit code is already public, increasing the risk of active exploitation before patches (expected **June–August 2025**) are deployed.The vulnerability affects multiple PAN-OS versions (11.2, 11.1, 10.2, 10.1) and **Cloud NGFW**, but **Prisma Access** is unaffected. Mitigations include upgrading to patched versions, enabling Threat Prevention IDs (510003, 510004), or disabling Clientless VPN. Though no confirmed malicious exploitation exists yet, the **social engineering risk**—tricking users into clicking malicious links—poses a **significant threat to authentication integrity**, particularly for organizations relying on Clientless VPN. Urgent action is advised to prevent credential compromise and downstream attacks.
Description: Palo Alto Networks' PAN-OS software was found to contain a significant denial-of-service (DoS) vulnerability, labeled CVE-2025-0128, affecting several versions and potentially putting organizations at risk of service interruptions. Unauthenticated attackers could exploit this vulnerability to force system reboots and maintenance mode engagement, leading to service unavailability for those reliant on the company's firewall appliances. The security flaw, while rated 'MEDIUM' in severity due to a CVSS score of 6.6, has a high impact on availability, albeit not directly threatening data confidentiality or integrity. Security recommendations encourage immediate updates to patched software versions to prevent exploitation.


Palo Alto Networks has 986.96% more incidents than the average of same-industry companies with at least one recorded incident.
Palo Alto Networks has 681.25% more incidents than the average of all companies with at least one recorded incident.
Palo Alto Networks reported 5 incidents this year: 0 cyber attacks, 0 ransomware, 4 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
PAN cyber incidents detection timeline including parent company and subsidiaries

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before. For more information, visit www.paloaltonetworks.com.


CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-clas
.png)
Palo Alto Networks has announced new native integrations of its security platform Prisma AIRS with leading AI agent platforms from...
Palo Alto Networks and IBM are collaborating to develop a solution designed to help organizations prepare for the coming age of quantum...
IBM and Palo Alto Networks launch a Quantum-Safe Readiness solution to help firms tackle security risks from emerging quantum computing...
Palo Alto Networks integrates Prisma AIRS with Factory, Glean, IBM, and ServiceNow for secure AI agent implementations against prompt...
Key Takeaways: Palo Alto Networks (PANW) collaborates with IBM to enhance enterprise security with a Quantum-Safe Readiness solution.
Hartford Insurance Group Inc: Xerox launches unified cybersecurity solution for SMBs powered by Palo Alto Networks and cyber insurance from...
Palo Alto Networks announced a plan with IBM to offer a new Quantum-Safe Readiness solution designed to help enterprises identify...
NORWALK, Conn. - Xerox Holdings Corporation (NASDAQ:XRX) announced Wednesday the launch of Xerox TriShield 360 Cyber Solution,...
NORWALK, Conn., November 19, 2025--Xerox today announced the launch of XeroxTM TriShield 360 Cyber Solution, a holistic cybersecurity...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Palo Alto Networks is http://www.paloaltonetworks.com.
According to Rankiteo, Palo Alto Networks’s AI-generated cybersecurity score is 777, reflecting their Fair security posture.
According to Rankiteo, Palo Alto Networks currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Palo Alto Networks is not certified under SOC 2 Type 1.
According to Rankiteo, Palo Alto Networks does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Palo Alto Networks is not listed as GDPR compliant.
According to Rankiteo, Palo Alto Networks does not currently maintain PCI DSS compliance.
According to Rankiteo, Palo Alto Networks is not compliant with HIPAA regulations.
According to Rankiteo,Palo Alto Networks is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Palo Alto Networks operates primarily in the Computer and Network Security industry.
Palo Alto Networks employs approximately 17,868 people worldwide.
Palo Alto Networks presently has no subsidiaries across any sectors.
Palo Alto Networks’s official LinkedIn profile has approximately 1,667,098 followers.
Palo Alto Networks is classified under the NAICS code 541514, which corresponds to Others.
Yes, Palo Alto Networks has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/palo-alto-networks.
Yes, Palo Alto Networks maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/palo-alto-networks.
As of November 27, 2025, Rankiteo reports that Palo Alto Networks has experienced 5 cybersecurity incidents.
Palo Alto Networks has an estimated 2,775 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach and Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with immediate updates to patched software versions, and remediation measures with upgrade to pan-os 11.2.6, 11.1.10, 10.2.14, or 10.1.14-h15, and and third party assistance with salesforce, third party assistance with salesloft, third party assistance with google’s threat intelligence group, and containment measures with disabled vulnerable salesloft-drift integration (palo alto networks), containment measures with revoked affected oauth tokens, containment measures with launched third-party risk management investigation (zscaler), and remediation measures with strengthened customer authentication protocols (zscaler), remediation measures with reviewing internal safeguards (palo alto networks), remediation measures with customer notifications, and communication strategy with public disclosures (pagerduty, zscaler, palo alto networks), communication strategy with customer advisories (e.g., palo alto networks via linkedin), communication strategy with recommendations for heightened phishing vigilance, and enhanced monitoring with heightened vigilance for phishing (recommended to customers), and containment measures with urgent patching to remediated versions, containment measures with hotfix application (e.g., 10.2.13-h3, 11.1.6-h1), and product with pan-os 10.2, action with upgrade to 10.2.14 or apply hotfix 10.2.13-h3+, product with pan-os 11.1, action with upgrade to 11.1.7 or apply hotfix 11.1.6-h1/11.1.4-h13, product with pan-os 11.2, action with upgrade to 11.2.5 or apply hotfixes, product with prisma access, action with palo alto networks completing upgrades (except conflicting maintenance windows), and communication strategy with public advisory with remediation guidance, communication strategy with customer notifications for prisma access upgrades, and third party assistance with xbow researchers (vulnerability discovery), and containment measures with disable clientless vpn functionality, containment measures with enable threat prevention ids 510003 and 510004 (applications and threats content version 8970), and remediation measures with upgrade to patched pan-os versions (expected releases: june–august 2025), remediation measures with user awareness training for suspicious links, and communication strategy with public advisory by palo alto networks, and enhanced monitoring with monitor for exploitation attempts via threat prevention signatures..
Title: Palo Alto Networks PAN-OS DoS Vulnerability
Description: Palo Alto Networks' PAN-OS software was found to contain a significant denial-of-service (DoS) vulnerability, labeled CVE-2025-0128, affecting several versions and potentially putting organizations at risk of service interruptions. Unauthenticated attackers could exploit this vulnerability to force system reboots and maintenance mode engagement, leading to service unavailability for those reliant on the company's firewall appliances. The security flaw, while rated 'MEDIUM' in severity due to a CVSS score of 6.6, has a high impact on availability, albeit not directly threatening data confidentiality or integrity. Security recommendations encourage immediate updates to patched software versions to prevent exploitation.
Type: Denial of Service (DoS)
Attack Vector: Unauthenticated Exploitation
Vulnerability Exploited: CVE-2025-0128
Threat Actor: Unauthenticated Attackers
Title: PAN-OS Admin Command Injection Vulnerability
Description: A newly disclosed command injection vulnerability in Palo Alto Networks’ PAN-OS operating system poses significant security risks to enterprise firewall infrastructures worldwide.
Date Publicly Disclosed: 2025-06-11
Type: Command Injection
Attack Vector: Authenticated administrator with CLI access
Vulnerability Exploited: CVE-2025-4230
Title: Supply Chain Breach via Salesloft Drift Exploit Targeting Salesforce Data
Description: Hackers exploited the Salesloft Drift app to steal OAuth tokens and access Salesforce data, exposing customer details at major tech firms including Palo Alto Networks, Zscaler, and PagerDuty. The attack was a supply chain breach targeting a third-party sales/marketing SaaS application, leading to unauthorized access to Salesforce accounts of hundreds of companies. Exposed data included business contact details (names, emails, job titles, phone numbers) but no core products or infrastructure were compromised.
Date Detected: 2025-08-20
Date Publicly Disclosed: 2025-08-23
Type: Supply Chain Attack
Attack Vector: Third-Party Vulnerability ExploitationOAuth Token TheftSalesforce Integration Abuse
Vulnerability Exploited: Unspecified vulnerability in Salesloft Drift's OAuth token management
Threat Actor: UNC6395
Motivation: Data TheftPotential Phishing/Follow-on AttacksFinancial Gain (likely)
Title: Critical Denial-of-Service Vulnerability in Palo Alto Networks PAN-OS Software
Description: A critical denial-of-service vulnerability (CVE-TBD) has been identified in Palo Alto Networks PAN-OS software that allows unauthenticated attackers to remotely reboot firewalls by crafting specially designed packets through the data plane. Repeated reboot attempts can force affected firewalls into maintenance mode, disabling network protection capabilities and leaving organizations vulnerable to secondary attacks. The vulnerability impacts PA-Series firewalls, VM-Series firewalls, and Prisma Access deployments across multiple PAN-OS versions (excluding Cloud NGFW). It manifests only on firewalls with URL proxy or any decrypt policy configured (including explicit decrypt, explicit no-decrypt, or no-matching policies). The issue stems from improper checks for unusual conditions (CWE-754) and pointer manipulation (CAPEC-129). Palo Alto Networks assigned a CVSS base score of 8.7 (MEDIUM severity, MODERATE urgency) and reports no evidence of active exploitation in the wild. Remediation requires patching to specific versions (e.g., PAN-OS 10.2.14, 11.1.7, or 11.2.5) or applying hotfixes, with no workarounds available for unpatched systems.
Type: Denial-of-Service (DoS)
Attack Vector: Network-based (no authentication or user interaction required)
Vulnerability Exploited: CVE-TBDCWE-754 (Improper Check for Unusual or Exceptional Conditions)CAPEC-129 (Pointer Manipulation)Cvss Score: {'base': 8.7, 'behavioral': 6.6}, Severity: MEDIUM, Urgency: MODERATE.
Title: Palo Alto Networks GlobalProtect Reflected XSS Vulnerability (CVE-2025-0133)
Description: Palo Alto Networks has disclosed a reflected cross-site scripting (XSS) vulnerability, tracked as CVE-2025-0133, affecting the GlobalProtect gateway and portal features of its PAN-OS software. The flaw enables execution of malicious JavaScript in authenticated Captive Portal user browsers when victims click specially crafted links. It poses a significant threat to organizations utilizing the Clientless VPN feature. The vulnerability is rated low severity (CVSS Base Score 2.0) under default configurations but elevates to MEDIUM (CVSS 5.5) when Clientless VPN is enabled. XBOW researchers identified this vulnerability, which enables attackers to create convincing phishing and credential-stealing links that appear legitimately hosted on the GlobalProtect portal. Proof-of-concept exploit code is already available in the wild, increasing urgency for mitigation.
Type: Vulnerability
Attack Vector: Social EngineeringMalicious LinksPhishing
Vulnerability Exploited: Cve Id: CVE-2025-0133, Cwe Id: CWE-79, Capec Id: CAPEC-591, Cvss Score: {'default': 2.0, 'clientless_vpn_enabled': 5.5}, Cvss Vector: None, Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GlobalProtect gateway/portal Captive Portal.
Motivation: Credential TheftPhishingSession Hijacking
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through CLI access and Salesloft Drift (third-party SaaS application).

Systems Affected: Firewall appliances
Downtime: System reboots and maintenance mode engagement
Operational Impact: Service unavailability

Systems Affected: PAN-OS 11.2 versions prior to 11.2.6, PAN-OS 11.1 versions before 11.1.10, PAN-OS 10.2 versions earlier than 10.2.14, and PAN-OS 10.1 versions before 10.1.14-h15

Data Compromised: Business contact details (names, email addresses, job titles, phone numbers), Sales account records, Case metadata
Systems Affected: Salesforce instances (via third-party integration)Salesloft Drift app
Operational Impact: Heightened vigilance required for phishingThird-party risk investigationsCustomer notificationsAuthentication protocol reviews
Brand Reputation Impact: Potential erosion of trust in third-party integrationsReputational risk for affected firms (Palo Alto Networks, Zscaler, PagerDuty)
Identity Theft Risk: ['Low (business contact details only)', 'Phishing risk elevated']

Systems Affected: Type: PA-Series Firewalls, Versions: 10.2 (all ≤ 10.2.13), 11.1 (all ≤ 11.1.6), 11.2 (< 11.2.5), Type: VM-Series Firewalls, Versions: 10.2 (all ≤ 10.2.13), 11.1 (all ≤ 11.1.6), 11.2 (< 11.2.5), Type: Prisma Access, Versions: Underlying PAN-OS versions (see above).
Downtime: Potential extended downtime due to forced maintenance mode and secondary attack exposure
Operational Impact: Loss of firewall protection, network disruption, vulnerability to follow-on attacks
Brand Reputation Impact: Potential reputational damage due to security posture degradation

Data Compromised: User session cookies, Credentials
Systems Affected: GlobalProtect GatewayGlobalProtect PortalClientless VPN
Operational Impact: Increased Phishing RiskCompromised User Sessions
Brand Reputation Impact: Potential Loss of Trust Due to Phishing Risks
Identity Theft Risk: ['High (if credentials are stolen)']
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Business Contact Details, Sales Account Records, Case Metadata, Social Security Numbers (Transunion Only), , Session Tokens, Credentials and .

Entity Name: Palo Alto Networks
Entity Type: Organization
Industry: Cybersecurity

Entity Name: Palo Alto Networks
Entity Type: Enterprise
Industry: Network Security

Entity Name: Palo Alto Networks
Entity Type: Public Company
Industry: Cybersecurity
Location: Santa Clara, California, USA
Size: Large Enterprise
Customers Affected: Not specified (business contact details exposed)

Entity Name: Zscaler
Entity Type: Public Company
Industry: Cybersecurity
Location: San Jose, California, USA
Size: Large Enterprise
Customers Affected: Not specified (business contact details exposed)

Entity Name: PagerDuty
Entity Type: Public Company
Industry: IT Operations/Incident Response
Location: San Francisco, California, USA
Size: Mid-to-Large Enterprise
Customers Affected: Not specified (business contact details exposed)

Entity Name: TransUnion
Entity Type: Public Company
Industry: Credit Reporting
Location: Chicago, Illinois, USA
Size: Large Enterprise
Customers Affected: 4.4 million US consumers (including Social Security numbers)

Entity Name: Salesloft (Drift integration)
Entity Type: Private Company (SaaS)
Industry: Sales Engagement Platform
Location: Atlanta, Georgia, USA
Size: Mid-to-Large Enterprise
Customers Affected: Hundreds of companies (via OAuth token theft)

Entity Name: Palo Alto Networks
Entity Type: Cybersecurity Vendor
Industry: Network Security
Location: Santa Clara, California, USA
Customers Affected: Organizations using vulnerable PAN-OS versions (PA-Series, VM-Series, Prisma Access)

Entity Name: Organizations using affected PAN-OS versions
Entity Type: Enterprises, Government Agencies, Service Providers
Location: Global

Entity Name: Palo Alto Networks
Entity Type: Organization
Industry: Cybersecurity
Location: Santa Clara, California, USA

Remediation Measures: Immediate updates to patched software versions

Remediation Measures: Upgrade to PAN-OS 11.2.6, 11.1.10, 10.2.14, or 10.1.14-h15

Incident Response Plan Activated: True
Third Party Assistance: Salesforce, Salesloft, Google’S Threat Intelligence Group.
Containment Measures: Disabled vulnerable Salesloft-Drift integration (Palo Alto Networks)Revoked affected OAuth tokensLaunched third-party risk management investigation (Zscaler)
Remediation Measures: Strengthened customer authentication protocols (Zscaler)Reviewing internal safeguards (Palo Alto Networks)Customer notifications
Communication Strategy: Public disclosures (PagerDuty, Zscaler, Palo Alto Networks)Customer advisories (e.g., Palo Alto Networks via LinkedIn)Recommendations for heightened phishing vigilance
Enhanced Monitoring: Heightened vigilance for phishing (recommended to customers)

Containment Measures: Urgent patching to remediated versionsHotfix application (e.g., 10.2.13-h3, 11.1.6-h1)
Remediation Measures: Product: PAN-OS 10.2, Action: Upgrade to 10.2.14 or apply hotfix 10.2.13-h3+, Product: PAN-OS 11.1, Action: Upgrade to 11.1.7 or apply hotfix 11.1.6-h1/11.1.4-h13, Product: PAN-OS 11.2, Action: Upgrade to 11.2.5 or apply hotfixes, Product: Prisma Access, Action: Palo Alto Networks completing upgrades (except conflicting maintenance windows),
Communication Strategy: Public advisory with remediation guidanceCustomer notifications for Prisma Access upgrades

Third Party Assistance: Xbow Researchers (Vulnerability Discovery).
Containment Measures: Disable Clientless VPN functionalityEnable Threat Prevention IDs 510003 and 510004 (Applications and Threats content version 8970)
Remediation Measures: Upgrade to patched PAN-OS versions (expected releases: June–August 2025)User awareness training for suspicious links
Communication Strategy: Public Advisory by Palo Alto Networks
Enhanced Monitoring: Monitor for exploitation attempts via Threat Prevention signatures
Third-Party Assistance: The company involves third-party assistance in incident response through Salesforce, Salesloft, Google’s Threat Intelligence Group, , XBOW Researchers (Vulnerability Discovery), .

Type of Data Compromised: Business contact details, Sales account records, Case metadata, Social security numbers (transunion only)
Number of Records Exposed: Undisclosed (Palo Alto Networks, Zscaler, PagerDuty), 4.4 million (TransUnion)
Sensitivity of Data: Moderate (business contacts)High (SSNs for TransUnion)
Personally Identifiable Information: NamesEmail addressesJob titlesPhone numbersSocial Security numbers (TransUnion only)

Type of Data Compromised: Session tokens, Credentials
Sensitivity of Data: High (authenticated session data)
Data Exfiltration: Potential (if credentials are stolen)
Personally Identifiable Information: Potential (if credentials include PII)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Immediate updates to patched software versions, Upgrade to PAN-OS 11.2.6, 11.1.10, 10.2.14, or 10.1.14-h15, Strengthened customer authentication protocols (Zscaler), Reviewing internal safeguards (Palo Alto Networks), Customer notifications, , product: PAN-OS 10.2, action: Upgrade to 10.2.14 or apply hotfix 10.2.13-h3+, product: PAN-OS 11.1, action: Upgrade to 11.1.7 or apply hotfix 11.1.6-h1/11.1.4-h13, product: PAN-OS 11.2, action: Upgrade to 11.2.5 or apply hotfixes, product: Prisma Access, action: Palo Alto Networks completing upgrades (except conflicting maintenance windows), , Upgrade to patched PAN-OS versions (expected releases: June–August 2025), User awareness training for suspicious links, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by disabled vulnerable salesloft-drift integration (palo alto networks), revoked affected oauth tokens, launched third-party risk management investigation (zscaler), , urgent patching to remediated versions, hotfix application (e.g., 10.2.13-h3, 11.1.6-h1), , disable clientless vpn functionality, enable threat prevention ids 510003 and 510004 (applications and threats content version 8970) and .

Data Exfiltration: True

Lessons Learned: Third-party SaaS integrations introduce significant supply chain risk, even for cybersecurity firms., OAuth token management requires stricter oversight and monitoring., Rapid revocation of compromised tokens is critical to limiting exposure., Customer communication and transparency are essential to maintaining trust post-breach.

Lessons Learned: Criticality of prompt patching for network infrastructure vulnerabilities, Risks of DoS vulnerabilities enabling secondary attacks, Importance of maintenance windows for security updates

Lessons Learned: Clientless VPN introduces elevated risk for reflected XSS vulnerabilities., Proof-of-concept exploits in the wild necessitate proactive mitigation even before active exploitation is observed., User training remains critical for mitigating social engineering-based attacks.

Recommendations: Immediate updates to patched software versions

Recommendations: Implement additional access controls limiting CLI access to essential personnel only.

Recommendations: Conduct third-party risk assessments for all SaaS integrations, especially those with OAuth access., Implement least-privilege access controls for third-party apps connected to CRM systems like Salesforce., Monitor for anomalous OAuth token usage or unexpected API calls from integrated apps., Enhance authentication protocols for customer support interactions to prevent social engineering., Educate employees and customers on phishing risks following data breaches involving contact details.Conduct third-party risk assessments for all SaaS integrations, especially those with OAuth access., Implement least-privilege access controls for third-party apps connected to CRM systems like Salesforce., Monitor for anomalous OAuth token usage or unexpected API calls from integrated apps., Enhance authentication protocols for customer support interactions to prevent social engineering., Educate employees and customers on phishing risks following data breaches involving contact details.Conduct third-party risk assessments for all SaaS integrations, especially those with OAuth access., Implement least-privilege access controls for third-party apps connected to CRM systems like Salesforce., Monitor for anomalous OAuth token usage or unexpected API calls from integrated apps., Enhance authentication protocols for customer support interactions to prevent social engineering., Educate employees and customers on phishing risks following data breaches involving contact details.Conduct third-party risk assessments for all SaaS integrations, especially those with OAuth access., Implement least-privilege access controls for third-party apps connected to CRM systems like Salesforce., Monitor for anomalous OAuth token usage or unexpected API calls from integrated apps., Enhance authentication protocols for customer support interactions to prevent social engineering., Educate employees and customers on phishing risks following data breaches involving contact details.Conduct third-party risk assessments for all SaaS integrations, especially those with OAuth access., Implement least-privilege access controls for third-party apps connected to CRM systems like Salesforce., Monitor for anomalous OAuth token usage or unexpected API calls from integrated apps., Enhance authentication protocols for customer support interactions to prevent social engineering., Educate employees and customers on phishing risks following data breaches involving contact details.

Recommendations: Immediately upgrade to patched PAN-OS versions (10.2.14, 11.1.7, 11.2.5+) or apply hotfixes, Prioritize remediation during next maintenance window for Prisma Access, Monitor for signs of exploitation (unexpected reboots, maintenance mode), Review decrypt policies and URL proxy configurations for exposure, Assess secondary attack surfaces exposed during firewall downtimeImmediately upgrade to patched PAN-OS versions (10.2.14, 11.1.7, 11.2.5+) or apply hotfixes, Prioritize remediation during next maintenance window for Prisma Access, Monitor for signs of exploitation (unexpected reboots, maintenance mode), Review decrypt policies and URL proxy configurations for exposure, Assess secondary attack surfaces exposed during firewall downtimeImmediately upgrade to patched PAN-OS versions (10.2.14, 11.1.7, 11.2.5+) or apply hotfixes, Prioritize remediation during next maintenance window for Prisma Access, Monitor for signs of exploitation (unexpected reboots, maintenance mode), Review decrypt policies and URL proxy configurations for exposure, Assess secondary attack surfaces exposed during firewall downtimeImmediately upgrade to patched PAN-OS versions (10.2.14, 11.1.7, 11.2.5+) or apply hotfixes, Prioritize remediation during next maintenance window for Prisma Access, Monitor for signs of exploitation (unexpected reboots, maintenance mode), Review decrypt policies and URL proxy configurations for exposure, Assess secondary attack surfaces exposed during firewall downtimeImmediately upgrade to patched PAN-OS versions (10.2.14, 11.1.7, 11.2.5+) or apply hotfixes, Prioritize remediation during next maintenance window for Prisma Access, Monitor for signs of exploitation (unexpected reboots, maintenance mode), Review decrypt policies and URL proxy configurations for exposure, Assess secondary attack surfaces exposed during firewall downtime

Recommendations: Prioritize patching PAN-OS versions based on Clientless VPN usage., Disable Clientless VPN if not essential to operations., Deploy Threat Prevention signatures (IDs 510003, 510004) for affected systems., Conduct phishing simulation exercises to raise user awareness., Monitor for unusual activity in GlobalProtect portals/gateways.Prioritize patching PAN-OS versions based on Clientless VPN usage., Disable Clientless VPN if not essential to operations., Deploy Threat Prevention signatures (IDs 510003, 510004) for affected systems., Conduct phishing simulation exercises to raise user awareness., Monitor for unusual activity in GlobalProtect portals/gateways.Prioritize patching PAN-OS versions based on Clientless VPN usage., Disable Clientless VPN if not essential to operations., Deploy Threat Prevention signatures (IDs 510003, 510004) for affected systems., Conduct phishing simulation exercises to raise user awareness., Monitor for unusual activity in GlobalProtect portals/gateways.Prioritize patching PAN-OS versions based on Clientless VPN usage., Disable Clientless VPN if not essential to operations., Deploy Threat Prevention signatures (IDs 510003, 510004) for affected systems., Conduct phishing simulation exercises to raise user awareness., Monitor for unusual activity in GlobalProtect portals/gateways.Prioritize patching PAN-OS versions based on Clientless VPN usage., Disable Clientless VPN if not essential to operations., Deploy Threat Prevention signatures (IDs 510003, 510004) for affected systems., Conduct phishing simulation exercises to raise user awareness., Monitor for unusual activity in GlobalProtect portals/gateways.
Key Lessons Learned: The key lessons learned from past incidents are Third-party SaaS integrations introduce significant supply chain risk, even for cybersecurity firms.,OAuth token management requires stricter oversight and monitoring.,Rapid revocation of compromised tokens is critical to limiting exposure.,Customer communication and transparency are essential to maintaining trust post-breach.Criticality of prompt patching for network infrastructure vulnerabilities,Risks of DoS vulnerabilities enabling secondary attacks,Importance of maintenance windows for security updatesClientless VPN introduces elevated risk for reflected XSS vulnerabilities.,Proof-of-concept exploits in the wild necessitate proactive mitigation even before active exploitation is observed.,User training remains critical for mitigating social engineering-based attacks.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Immediate updates to patched software versions and Implement additional access controls limiting CLI access to essential personnel only..

Source: Palo Alto Networks Customer Notification (via LinkedIn)
Date Accessed: 2025-08-23

Source: Google’s Threat Intelligence Group Investigation

Source: Palo Alto Networks Security Advisory

Source: Palo Alto Networks Security Advisory

Source: XBOW Research
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: PagerDuty Public ReportDate Accessed: 2025-08-23, and Source: Zscaler Official BlogDate Accessed: 2025-08-23, and Source: Palo Alto Networks Customer Notification (via LinkedIn)Date Accessed: 2025-08-23, and Source: Google’s Threat Intelligence Group Investigation, and Source: Palo Alto Networks Security Advisory, and Source: Palo Alto Networks Security Advisory, and Source: XBOW Research.

Investigation Status: Ongoing (Google’s Threat Intelligence Group and affected companies)

Investigation Status: Ongoing (no active exploitation detected; patches released)

Investigation Status: Ongoing (no confirmed malicious exploitation reported as of disclosure)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Disclosures (Pagerduty, Zscaler, Palo Alto Networks), Customer Advisories (E.G., Palo Alto Networks Via Linkedin), Recommendations For Heightened Phishing Vigilance, Public Advisory With Remediation Guidance, Customer Notifications For Prisma Access Upgrades and Public Advisory By Palo Alto Networks.

Stakeholder Advisories: Customers Advised To Monitor For Phishing Attempts (Zscaler, Pagerduty)., Palo Alto Networks Notified Impacted Customers Directly., Transunion Disclosed Breach To Affected 4.4 Million Us Consumers..
Customer Advisories: PagerDuty: 'We will never contact anyone by phone to request a password or any other secure details.'Zscaler: 'No evidence of misuse found, but customers should maintain heightened vigilance for phishing.'Palo Alto Networks: Reviewing internal safeguards to prevent future incidents.

Stakeholder Advisories: Public Security Advisory Issued By Palo Alto Networks.
Customer Advisories: Direct notifications to Prisma Access customers for patch scheduling

Stakeholder Advisories: Palo Alto Networks Customers Using Affected Pan-Os Versions.
Customer Advisories: Apply mitigations immediately if Clientless VPN is enabled.Await official patches for long-term remediation.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Customers Advised To Monitor For Phishing Attempts (Zscaler, Pagerduty)., Palo Alto Networks Notified Impacted Customers Directly., Transunion Disclosed Breach To Affected 4.4 Million Us Consumers., Pagerduty: 'We Will Never Contact Anyone By Phone To Request A Password Or Any Other Secure Details.', Zscaler: 'No Evidence Of Misuse Found, But Customers Should Maintain Heightened Vigilance For Phishing.', Palo Alto Networks: Reviewing Internal Safeguards To Prevent Future Incidents., , Public Security Advisory Issued By Palo Alto Networks, Direct Notifications To Prisma Access Customers For Patch Scheduling, , Palo Alto Networks Customers Using Affected Pan-Os Versions, Apply Mitigations Immediately If Clientless Vpn Is Enabled., Await Official Patches For Long-Term Remediation. and .

Entry Point: CLI access

Entry Point: Salesloft Drift (third-party SaaS application)
High Value Targets: Salesforce Instances Of Cybersecurity/Tech Firms,
Data Sold on Dark Web: Salesforce Instances Of Cybersecurity/Tech Firms,

Root Causes: Insufficient input validation within the PAN-OS CLI interface
Corrective Actions: Patching and restricting administrative access

Root Causes: Inadequate Security Controls For Oauth Tokens In Salesloft Drift., Over-Permissive Third-Party App Integrations With Salesforce., Lack Of Real-Time Monitoring For Anomalous Token Usage.,
Corrective Actions: Disabled Vulnerable Integrations (Palo Alto Networks)., Revoked Compromised Oauth Tokens., Enhanced Authentication Protocols (Zscaler)., Third-Party Risk Management Investigations Launched.,

Root Causes: Improper Checks For Unusual Conditions (Cwe-754), Pointer Manipulation Vulnerability (Capec-129), Lack Of Input Validation In Data Plane Packet Handling,
Corrective Actions: Code Fixes In Patched Pan-Os Versions To Validate Data Plane Inputs, Enhanced Testing For Dos Resilience In Firewall Software, Proactive Hotfix Distribution For Critical Vulnerabilities,

Root Causes: Improper Input Neutralization In Globalprotect Captive Portal Web Page Generation., Lack Of Default Protections Against Reflected Xss In Clientless Vpn Configurations.,
Corrective Actions: Code-Level Fixes In Upcoming Pan-Os Patches., Enhanced Threat Prevention Signatures For Xss Detection.,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Salesforce, Salesloft, Google’S Threat Intelligence Group, , Heightened Vigilance For Phishing (Recommended To Customers), , Xbow Researchers (Vulnerability Discovery), , Monitor For Exploitation Attempts Via Threat Prevention Signatures, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Patching and restricting administrative access, Disabled Vulnerable Integrations (Palo Alto Networks)., Revoked Compromised Oauth Tokens., Enhanced Authentication Protocols (Zscaler)., Third-Party Risk Management Investigations Launched., , Code Fixes In Patched Pan-Os Versions To Validate Data Plane Inputs, Enhanced Testing For Dos Resilience In Firewall Software, Proactive Hotfix Distribution For Critical Vulnerabilities, , Code-Level Fixes In Upcoming Pan-Os Patches., Enhanced Threat Prevention Signatures For Xss Detection., .
Last Attacking Group: The attacking group in the last incident were an Unauthenticated Attackers and UNC6395.
Most Recent Incident Detected: The most recent incident detected was on 2025-08-20.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-08-23.
Most Significant Data Compromised: The most significant data compromised in an incident were Business contact details (names, email addresses, job titles, phone numbers), Sales account records, Case metadata, , User Session Cookies, Credentials and .
Most Significant System Affected: The most significant system affected in an incident were Salesforce instances (via third-party integration)Salesloft Drift app and T, y, p, e, :, , P, A, -, S, e, r, i, e, s, , F, i, r, e, w, a, l, l, s, ,, V, e, r, s, i, o, n, s, :, , 1, 0, ., 2, , (, a, l, l, , ≤, , 1, 0, ., 2, ., 1, 3, ), ,, , 1, 1, ., 1, , (, a, l, l, , ≤, , 1, 1, ., 1, ., 6, ), ,, , 1, 1, ., 2, , (, <, , 1, 1, ., 2, ., 5, ), ,, T, y, p, e, :, , V, M, -, S, e, r, i, e, s, , F, i, r, e, w, a, l, l, s, ,, V, e, r, s, i, o, n, s, :, , 1, 0, ., 2, , (, a, l, l, , ≤, , 1, 0, ., 2, ., 1, 3, ), ,, , 1, 1, ., 1, , (, a, l, l, , ≤, , 1, 1, ., 1, ., 6, ), ,, , 1, 1, ., 2, , (, <, , 1, 1, ., 2, ., 5, ), ,, T, y, p, e, :, , P, r, i, s, m, a, , A, c, c, e, s, s, ,, V, e, r, s, i, o, n, s, :, , U, n, d, e, r, l, y, i, n, g, , P, A, N, -, O, S, , v, e, r, s, i, o, n, s, , (, s, e, e, , a, b, o, v, e, ), ,, and GlobalProtect GatewayGlobalProtect PortalClientless VPN.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was salesforce, salesloft, google’s threat intelligence group, , xbow researchers (vulnerability discovery), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Disabled vulnerable Salesloft-Drift integration (Palo Alto Networks)Revoked affected OAuth tokensLaunched third-party risk management investigation (Zscaler), Urgent patching to remediated versionsHotfix application (e.g., 10.2.13-h3, 11.1.6-h1) and Disable Clientless VPN functionalityEnable Threat Prevention IDs 510003 and 510004 (Applications and Threats content version 8970).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Sales account records, Case metadata, User Session Cookies, Business contact details (names, email addresses, job titles, phone numbers) and Credentials.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 4.4M.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was User training remains critical for mitigating social engineering-based attacks.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Assess secondary attack surfaces exposed during firewall downtime, Prioritize patching PAN-OS versions based on Clientless VPN usage., Immediate updates to patched software versions, Monitor for unusual activity in GlobalProtect portals/gateways., Deploy Threat Prevention signatures (IDs 510003, 510004) for affected systems., Implement least-privilege access controls for third-party apps connected to CRM systems like Salesforce., Monitor for anomalous OAuth token usage or unexpected API calls from integrated apps., Enhance authentication protocols for customer support interactions to prevent social engineering., Disable Clientless VPN if not essential to operations., Immediately upgrade to patched PAN-OS versions (10.2.14, 11.1.7, 11.2.5+) or apply hotfixes, Prioritize remediation during next maintenance window for Prisma Access, Educate employees and customers on phishing risks following data breaches involving contact details., Conduct phishing simulation exercises to raise user awareness., Monitor for signs of exploitation (unexpected reboots, maintenance mode), Review decrypt policies and URL proxy configurations for exposure, Implement additional access controls limiting CLI access to essential personnel only., Conduct third-party risk assessments for all SaaS integrations and especially those with OAuth access..
Most Recent Source: The most recent source of information about an incident are PagerDuty Public Report, Zscaler Official Blog, Palo Alto Networks Security Advisory, XBOW Research, Palo Alto Networks Customer Notification (via LinkedIn) and Google’s Threat Intelligence Group Investigation.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (Google’s Threat Intelligence Group and affected companies).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Customers advised to monitor for phishing attempts (Zscaler, PagerDuty)., Palo Alto Networks notified impacted customers directly., TransUnion disclosed breach to affected 4.4 million US consumers., Public security advisory issued by Palo Alto Networks, Palo Alto Networks customers using affected PAN-OS versions, .
Most Recent Customer Advisory: The most recent customer advisory issued were an PagerDuty: 'We will never contact anyone by phone to request a password or any other secure details.'Zscaler: 'No evidence of misuse found, but customers should maintain heightened vigilance for phishing.'Palo Alto Networks: Reviewing internal safeguards to prevent future incidents., Direct notifications to Prisma Access customers for patch scheduling and Apply mitigations immediately if Clientless VPN is enabled.Await official patches for long-term remediation.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an CLI access and Salesloft Drift (third-party SaaS application).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Insufficient input validation within the PAN-OS CLI interface, Inadequate security controls for OAuth tokens in Salesloft Drift.Over-permissive third-party app integrations with Salesforce.Lack of real-time monitoring for anomalous token usage., Improper checks for unusual conditions (CWE-754)Pointer manipulation vulnerability (CAPEC-129)Lack of input validation in data plane packet handling, Improper input neutralization in GlobalProtect Captive Portal web page generation.Lack of default protections against reflected XSS in Clientless VPN configurations..
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Patching and restricting administrative access, Disabled vulnerable integrations (Palo Alto Networks).Revoked compromised OAuth tokens.Enhanced authentication protocols (Zscaler).Third-party risk management investigations launched., Code fixes in patched PAN-OS versions to validate data plane inputsEnhanced testing for DoS resilience in firewall softwareProactive hotfix distribution for critical vulnerabilities, Code-level fixes in upcoming PAN-OS patches.Enhanced Threat Prevention signatures for XSS detection..
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.