Vulnerabilities discovered in PAN-OS, which powers Palo Alto Networks’ firewalls – Help Net Security
Attackers can use these vulnerabilities to obtain access to delicate knowledge or produce the attack to get accessibility to the interior segments of a business network that takes advantage of susceptible security instruments.