{"id":92434,"date":"2024-10-17T12:38:15","date_gmt":"2024-10-17T04:38:15","guid":{"rendered":"https:\/\/version-2.com\/?p=92434"},"modified":"2024-10-14T12:40:51","modified_gmt":"2024-10-14T04:40:51","slug":"how-to-find-palo-alto-network-firewalls-running-pan-os","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/10\/how-to-find-palo-alto-network-firewalls-running-pan-os\/","title":{"rendered":"How to find Palo Alto Network firewalls running PAN-OS"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"92434\" class=\"elementor elementor-92434\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"prose dark:prose-light prose--blog prose--blog-wide\"><h2 id=\"latest-palo-alto-networks-vulnerabilities\">Latest Palo Alto Networks vulnerabilities\u00a0<\/h2><p>Palo Alto Networks (PAN) released a<a href=\"https:\/\/security.paloaltonetworks.com\/PAN-SA-2024-0010\" target=\"_blank\" rel=\"noopener\">\u00a0security advisory<\/a>\u00a0with multiple vulnerabilities on PAN-OS firewalls that could lead to admin account takeover.<\/p><ul><li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-9463\" target=\"_blank\" rel=\"noopener\">CVE-2024-9463<\/a>\u00a0is rated <strong><em>critical<\/em><\/strong> with CVSS score of <strong><strong>9.9<\/strong><\/strong>, is an\u00a0OS command injection vulnerability\u00a0and potentially allows for\u00a0 and execution of OS commands as root.<\/li><li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-9464\" target=\"_blank\" rel=\"noopener\">CVE-2024-9464<\/a> is rated <strong><em>critical<\/em><\/strong> with CVSS score of <strong>9.3<\/strong>, is an OS command injection vulnerability and potentially allows for the execution of OS commands as root.<\/li><li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-9465\" target=\"_blank\" rel=\"noopener\">CVE-2024-9465<\/a> is rated <strong><em>critical<\/em><\/strong> with CVSS score of <strong>9.2<\/strong>, is a SQL injection vulnerability\u00a0and potentially allows a remote unauthenticated attacker to read the contents of the Expedition database.<\/li><li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-9466\" target=\"_blank\" rel=\"noopener\">CVE-2024-9466<\/a>\u00a0is rated <strong><em>high<\/em><\/strong> with CVSS score of <strong>8.2<\/strong>, and potentially allows for an authenticated user to read sensitive information including passwords and API keys.<\/li><li><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-9467\" target=\"_blank\" rel=\"noopener\">CVE-2024-9467<\/a>\u00a0is rated <strong><em>high<\/em><\/strong> with CVSS score of <strong>7<\/strong><strong>.0<\/strong>, is an XSS vulnerability\u00a0and potentially allows for execution of\u00a0malicious\u00a0JavaScript\u00a0code that could result in session hijacking.<\/li><\/ul><h2 id=\"what-is-the-impact\">What is the impact?<\/h2><p>If\u00a0chained together through an\u00a0exploit, a firewall running the vulnerable software could be completely taken over by an unauthenticated\u00a0remote attacker. For more information, the team that disclosed the vulnerabilities to Palo Alto Networks, published a <a href=\"https:\/\/www.horizon3.ai\/attack-research\/palo-alto-expedition-from-n-day-to-full-compromise\/\" target=\"_blank\" rel=\"noopener\">detailed analysis<\/a>.<\/p><p>According to the vendor, there is no known malicious exploitation of vulnerable systems at this time.<\/p><h2 id=\"are-updates-or-workarounds-available\">Are updates or workarounds available?<\/h2><p>According to Palo Alto Networks, &#8220;The fixes for all listed issues are available in Expedition 1.2.96, and all later Expedition versions.&#8221; They also recommended rotating all passwords and API keys after applying the latest patch to prevent future unauthorized access. Refer to the\u00a0<strong>Workarounds and Mitigations<\/strong> section of the security advisory for information about potential workarounds and additional advice.<\/p><h2 id=\"how-to-find-potentially-vulnerable-pan-os-systems-with-runZero\">How to find potentially vulnerable PAN-OS systems with runZero<\/h2><p>From the <a href=\"https:\/\/console.runzero.com\/inventory\/\" target=\"_blank\" rel=\"noopener\">Asset Inventory<\/a> you can use the following query to locate potentially vulnerable systems:<\/p><pre style=\"position: relative;\">os:\"PAN-OS\"<button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><hr \/><h2 id=\"cve-2024-3400\">CVE-2024-3400<\/h2><p>Palo Alto Networks (PAN) <a href=\"https:\/\/security.paloaltonetworks.com\/CVE-2024-3400\" target=\"_blank\" rel=\"noopener\">disclosed<\/a> that certain versions of their PAN-OS software has a vulnerability that allows for remote command injection.<\/p><p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-3400\" target=\"_blank\" rel=\"noopener\">CVE-2024-3400<\/a> is rated critical with CVSS score of 9.8 and indicates an unauthenticated attacker can execute arbitrary code with root privileges on the firewall. The vendor indicates that there is evidence of limited exploitation in the wild.<\/p><p>watchTowr has <a href=\"https:\/\/labs.watchtowr.com\/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400\/\">posted a detailed analysis<\/a> including the details needed for exploitation. This analysis covers two separate vulnerabilities; an arbitrary file creation vulnerability in the session handler, and a shell metacharacter injection issue that leads to remote execution through the telemetry script. PAN has updated their guidance to state that &#8220;<em>Disabling device telemetry is no longer an effective mitigation<\/em>&#8220;.<\/p><h2 id=\"what-is-the-impact\">What is the impact?<\/h2><p>The following PAN-OS versions are affected by this vulnerability.<\/p><table><tbody><tr><td><p dir=\"ltr\"><strong>Version<\/strong><\/p><\/td><td><p dir=\"ltr\"><strong>Affected<\/strong><\/p><\/td><td><p dir=\"ltr\"><strong>Unaffected<\/strong><\/p><\/td><\/tr><tr><td><p dir=\"ltr\">PAN-OS 11.1<\/p><\/td><td><p dir=\"ltr\">&lt; 11.1.2-h3<\/p><\/td><td><p dir=\"ltr\">&gt;= 11.1.2-h3 (hotfix ETA: By 4\/14)<\/p><\/td><\/tr><tr><td><p dir=\"ltr\">PAN-OS 11.0<\/p><\/td><td><p dir=\"ltr\">&lt; 11.0.4-h1<\/p><\/td><td><p dir=\"ltr\">&gt;= 11.0.4-h1 (hotfix ETA: By 4\/14)<\/p><\/td><\/tr><tr><td><p dir=\"ltr\">PAN-OS 10.2<\/p><\/td><td><p dir=\"ltr\">&lt; 10.2.9-h1<\/p><\/td><td><p dir=\"ltr\">&gt;= 10.2.9-h1 (hotfix ETA: By 4\/14)<\/p><\/td><\/tr><\/tbody><\/table><p>Palo Alto Networks indicates that PAN-OS 11.1, 11.0, and 10.2 versions with the configurations for both <a href=\"https:\/\/www.paloaltonetworks.com\/sase\/globalprotect\" target=\"_blank\" rel=\"noopener\">GlobalProtect<\/a> gateway and device telemetry enabled.<\/p><p>Customers may verify this by checking for entries in the firewall web interface (<strong>Network &gt; GlobalProtect &gt; Gateways<\/strong>) and verify whether device telemetry enabled by checking your firewall web interface (<strong>Device &gt; Setup &gt; Telemetry<\/strong>).<\/p><h2 id=\"are-updates-or-workarounds-available\">Are updates or workarounds available?<\/h2><p>Palo Alto Networks recommends that customers with a <strong>Threat Prevention subscription<\/strong> can block attacks for this vulnerability by enabling <strong>Threat ID 95187<\/strong> (introduced in Applications and Threats content version 8833-8682) and <a href=\"https:\/\/live.paloaltonetworks.com\/t5\/globalprotect-articles\/applying-vulnerability-protection-to-globalprotect-interfaces\/ta-p\/340184\" target=\"_blank\" rel=\"noopener\">applying vulnerability protection to GlobalProtect interfaces<\/a>.<\/p><p>It is also recommended that <a href=\"https:\/\/docs.paloaltonetworks.com\/pan-os\/11-0\/pan-os-admin\/device-telemetry\/device-telemetry-configure\/device-telemetry-disable\" target=\"_blank\" rel=\"noopener\">telemetry be disabled<\/a> until devices can be upgraded to an unaffected version of PAN-OS.<\/p><h2 id=\"how-runZero-users-found-potentially-vulnerable-pan-os-systems\">How runZero users found\u00a0potentially vulnerable PAN-OS systems<\/h2><p>From the <a href=\"https:\/\/console.runzero.com\/inventory\" target=\"_blank\" rel=\"noopener\">Asset Inventory<\/a>, use the following query to locate systems running potentially vulnerable software:<\/p><pre style=\"position: relative;\"><code>os:\"PAN-OS\"<\/code><button class=\"copy-button group absolute top-4 right-3 w-5 h-5 flex items-center text-white\/60 text-sm rounded hover:text-atlantic-teal-3 transition duration-300\"><\/button><\/pre><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"55060\" class=\"elementor elementor-55060\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About runZero<\/strong><br \/>runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network\u2013without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Latest Palo Alto Networks vulnerabilities\u00a0 Palo Alto Ne [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[976,1273,61],"tags":[977,1272],"class_list":["post-92434","post","type-post","status-publish","format-standard","hentry","category-runzero","category-1273","category-press-release","tag-runzero","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to find Palo Alto Network firewalls running PAN-OS - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.runzero.com\/blog\/palo-alto-networks\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to find Palo Alto Network firewalls running PAN-OS - Version 2\" \/>\n<meta property=\"og:description\" content=\"Latest Palo Alto Networks vulnerabilities\u00a0 Palo Alto Ne [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.runzero.com\/blog\/palo-alto-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-17T04:38:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"70\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/palo-alto-networks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/how-to-find-palo-alto-network-firewalls-running-pan-os\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"How to find Palo Alto Network firewalls running PAN-OS\",\"datePublished\":\"2024-10-17T04:38:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/how-to-find-palo-alto-network-firewalls-running-pan-os\\\/\"},\"wordCount\":615,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"keywords\":[\"runZero\",\"2024\"],\"articleSection\":[\"runZero\",\"2024\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.runzero.com\\\/blog\\\/palo-alto-networks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/how-to-find-palo-alto-network-firewalls-running-pan-os\\\/\",\"url\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/palo-alto-networks\\\/\",\"name\":\"How to find Palo Alto Network firewalls running PAN-OS - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"datePublished\":\"2024-10-17T04:38:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/palo-alto-networks\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.runzero.com\\\/blog\\\/palo-alto-networks\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/palo-alto-networks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to find Palo Alto Network firewalls running PAN-OS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to find Palo Alto Network firewalls running PAN-OS - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.runzero.com\/blog\/palo-alto-networks\/","og_locale":"zh_HK","og_type":"article","og_title":"How to find Palo Alto Network firewalls running PAN-OS - Version 2","og_description":"Latest Palo Alto Networks vulnerabilities\u00a0 Palo Alto Ne [&hellip;]","og_url":"https:\/\/www.runzero.com\/blog\/palo-alto-networks\/","og_site_name":"Version 2","article_published_time":"2024-10-17T04:38:15+00:00","og_image":[{"width":250,"height":70,"url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg","type":"image\/jpeg"}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"4 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.runzero.com\/blog\/palo-alto-networks\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/10\/how-to-find-palo-alto-network-firewalls-running-pan-os\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"How to find Palo Alto Network firewalls running PAN-OS","datePublished":"2024-10-17T04:38:15+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/10\/how-to-find-palo-alto-network-firewalls-running-pan-os\/"},"wordCount":615,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"keywords":["runZero","2024"],"articleSection":["runZero","2024","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.runzero.com\/blog\/palo-alto-networks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/10\/how-to-find-palo-alto-network-firewalls-running-pan-os\/","url":"https:\/\/www.runzero.com\/blog\/palo-alto-networks\/","name":"How to find Palo Alto Network firewalls running PAN-OS - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"datePublished":"2024-10-17T04:38:15+00:00","breadcrumb":{"@id":"https:\/\/www.runzero.com\/blog\/palo-alto-networks\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.runzero.com\/blog\/palo-alto-networks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.runzero.com\/blog\/palo-alto-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"How to find Palo Alto Network firewalls running PAN-OS"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-o2S","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/92434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=92434"}],"version-history":[{"count":10,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/92434\/revisions"}],"predecessor-version":[{"id":92444,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/92434\/revisions\/92444"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=92434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=92434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=92434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}