Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
Redhotcyber Banner Sito 970x120px Uscita 101125
Palo Alto Networks VPN Vulnerability Exploited by Hackers

Palo Alto Networks VPN Vulnerability Exploited by Hackers

8 December 2025 17:56

An increasingly aggressive campaign, directly targeting remote access infrastructure, has prompted threat actors to actively attempt to exploit vulnerabilities in Palo Alto Networks’ GlobalProtect VPN portals .

On December 5, Palo Alto Networks issued an urgent advisory, urging customers to adopt multi-factor authentication (MFA) , limit portal exposure through firewalls, and apply the latest patches.

Organizations using the popular VPN solution to secure remote work have been put on high alert, according toGrayNoise ’s monitoring report, which detected scans and exploitation efforts from over 7,000 unique IP addresses globally .

Targeting observed by Ip (Source: GreyNoise)

Starting in late November 2025, attacks exploiting vulnerabilities in GlobalProtect gateways have been detected, primarily those publicly accessible through UDP port 4501.

Palo Alto Networks’ GlobalProtect has long been a prime target due to its ubiquity in enterprise environments. Legacy flaws, such as CVE-2024-3400 (a critical command injection vulnerability, fixed in April 2024 with a CVSS score of 9.8), continue to plague unpatched systems.

Recent waves exploit misconfigurations that allow pre-authentication access, including default credentials or exposed admin portals. Attackers use tools such as custom scripts that mimic Metasploit modules to enumerate portals, brute-force logins, and drop persistent malware.

According to data from Shadowserver and other threat intelligence feeds, IP sources include residential proxies, Bulletproof hosting providers, and compromised VPS instances in Asia, Europe, and North America.

Indicators of compromise include anomalous spikes in UDP traffic on port 4501, followed by HTTP requests to the /global-protect/login.urd endpoints. In confirmed breaches, intruders exfiltrated session tokens, enabling lateral movement into corporate networks.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

  • cybersecurity threats
  • cybersecurity tips
  • GlobalProtect
  • hacking exploits
  • network security
  • Palo Alto Networks
  • remote access security
  • threat intelligence
  • VPN vulnerability
  • vulnerability management
Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.