* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * vulnerability exploit # Palo Alto Networks ## vulnerability exploit [![Protect Against Critical Azure Cosmos DB Vulnerability](https://www2.paloaltonetworks.com/blog/wp-content/uploads/2021/08/Coding.jpg)](https://www2.paloaltonetworks.com/blog/cloud-security/protect-against-critical-azure-cosmos-db-vulnerability/) [Protect Against Critical Azure Cosmos DB Vulnerability \------------------------------------------------------](https://www2.paloaltonetworks.com/blog/cloud-security/protect-against-critical-azure-cosmos-db-vulnerability/) Cloud security researchers recently discovered a critical vulnerability that exploits the Azure Cosmos DB Jupyter notebook feature to escalate access into other customer notebooks, harvest the Cosmos DB keys and access their data. Microsoft has since disabled this feature for all customers and sent out notification emails to customers that could be potentially impacted. [Cloud Posture Security](https://www.paloaltonetworks.com/blog/cloud-security/category/cloud-security-posture-management/?ts=markdown) [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) Sep 17, 2021 By [David Okeyode](https://www.paloaltonetworks.com/blog/author/david-okeyode/?ts=markdown "Posts by David Okeyode") ## Palo Alto Networks *** ** * ** *** [Announcements](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown) *** ** * ** *** [Company \& Culture](https://www.paloaltonetworks.com/blog/category/company-culture/?ts=markdown) *** ** * ** *** [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) *** ** * ** *** [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown) *** ** * ** *** [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) *** ** * ** *** [Partners](https://www.paloaltonetworks.com/blog/category/partners/?ts=markdown) *** ** * ** *** [](https://www2.paloaltonetworks.com/blog/2015/07/vehicle-hacks-and-the-age-of-iot-breach-prevention-is-the-only-way-forward/) [Endpoint](https://www.paloaltonetworks.com/blog/category/endpoint-2/?ts=markdown), [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) ## [Vehicle Hacks and The Age of IoT: Breach Prevention is the Only Way Forward](https://www2.paloaltonetworks.com/blog/2015/07/vehicle-hacks-and-the-age-of-iot-breach-prevention-is-the-only-way-forward/) With an increasing number of connected cars coming onto the market over the past several years, it was only a matter of time until we saw a complete r... Jul 22, 2015 By [Sebastian Goodwin](https://www.paloaltonetworks.com/blog/author/sebastian-goodwin/?ts=markdown "Posts by Sebastian Goodwin") [](https://www2.paloaltonetworks.com/blog/2014/08/insecure-internal-storage-android/) [Threat Advisory/Analysis](https://www.paloaltonetworks.com/blog/category/threat-advisory-analysis/?ts=markdown), [Unit 42](https://unit42-dev2.paloaltonetworks.com) ## [Insecure Internal Storage in Android](https://www2.paloaltonetworks.com/blog/2014/08/insecure-internal-storage-android/) Today, Palo Alto Networks researcher Claud Xiao is delivering a presentation titled "Insecure Internal Storage in Android" at the Hacks in Taiwan Conference (HITCON). Aug 18, 2014 By [Claud Xiao](https://www.paloaltonetworks.com/blog/author/claud-xiao/?ts=markdown "Posts by Claud Xiao") and [Ryan Olson](https://www.paloaltonetworks.com/blog/author/ryan-olson/?ts=markdown "Posts by Ryan Olson") [](https://www2.paloaltonetworks.com/blog/2013/11/palo-alto-networks-finds-critical-vulnerabilities-latest-version-internet-explorer/) [Threat Advisory/Analysis](https://www.paloaltonetworks.com/blog/category/threat-advisory-analysis/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) ## [Palo Alto Networks Finds Critical Vulnerabilities in Latest Version of Inte...](https://www2.paloaltonetworks.com/blog/2013/11/palo-alto-networks-finds-critical-vulnerabilities-latest-version-internet-explorer/) This week, Palo Alto Networks researcher, Bo Qu, was credited with discovering 3 distinct critical vulnerabilities in Microsoft Internet Explorer. The... Nov 14, 2013 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://www2.paloaltonetworks.com/blog/2013/04/the-unique-challenges-of-controlling-java-exploits/) [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) ## [The Unique Challenges of Controlling Java Exploits](https://www2.paloaltonetworks.com/blog/2013/04/the-unique-challenges-of-controlling-java-exploits/) Java has been a very hot topic for security managers this year due to a steady stream of 0-day Java vulnerabilities that have been disclosed, with many of them being exploited in the wild. However, the challeng... Apr 17, 2013 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://www2.paloaltonetworks.com/blog/2013/01/emergency-threat-content-release/) [Threat Advisories - Advisories](https://www.paloaltonetworks.com/blog/category/threat-advisories-advisories/?ts=markdown), [Threat Advisory/Analysis](https://www.paloaltonetworks.com/blog/category/threat-advisory-analysis/?ts=markdown) ## [Emergency Threat Content Release](https://www2.paloaltonetworks.com/blog/2013/01/emergency-threat-content-release/) Today Palo Alto Networks has released an emergency content release (version 349) that addresses critical new vulnerabilities in Java JRE as well as Adobe Reader. Exploits of the Java vulnerabilities have been observed in the wild in exploit... Jan 11, 2013 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://www2.paloaltonetworks.com/blog/2012/06/scada-and-your-data-center/) [Data Center](https://www.paloaltonetworks.com/blog/category/data-center-2/?ts=markdown), [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown), [SCADA \& ICS](https://www.paloaltonetworks.com/blog/category/scada-ics/?ts=markdown) ## [SCADA and your Data Center](https://www2.paloaltonetworks.com/blog/2012/06/scada-and-your-data-center/) Over the last few months, discussions on cyberweapons targeting critical infrastructure have increased. Most of the discussions have centered around attacks to Industrial Control Systems (ICS) such as SCADA (Supervisory Control and Data Acq... Jun 19, 2012 By [Palo Alto Networks](https://www.paloaltonetworks.com/blog/author/palo-alto-networks-staff/?ts=markdown "Posts by Palo Alto Networks") [](https://www2.paloaltonetworks.com/blog/2010/10/stuxnet-scada-malware/) [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [SCADA \& ICS](https://www.paloaltonetworks.com/blog/category/scada-ics/?ts=markdown), [Threat Advisories - Advisories](https://www.paloaltonetworks.com/blog/category/threat-advisories-advisories/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown) ## [Stuxnet - SCADA malware](https://www2.paloaltonetworks.com/blog/2010/10/stuxnet-scada-malware/) Stuxnet is the first malware in recent history that attacked industrial control systems also known as SCADA (Supervisory Control and Data Acquisition) systems developed by Siemens (Siemens SIMATIC WinCC). These... Oct 03, 2010 By [Anna Lough](https://www.paloaltonetworks.com/blog/author/anna-lough/?ts=markdown "Posts by Anna Lough") [](https://www2.paloaltonetworks.com/blog/2009/07/vulnerabilities-discovered-for-microsoft-directx/) [Uncategorized](https://www.paloaltonetworks.com/blog/category/uncategorized/?ts=markdown) ## [Vulnerabilities Discovered for Microsoft DirectX](https://www2.paloaltonetworks.com/blog/2009/07/vulnerabilities-discovered-for-microsoft-directx/) As some of you may know, Palo Alto Networks discovered 2 critical vulnerabilities for Microsoft DirectX which were released today via Microsoft's July security bulletin. Successful exploitation of these critica... Jul 15, 2009 By [Alfred Lee](https://www.paloaltonetworks.com/blog/author/alfred/?ts=markdown "Posts by Alfred Lee") [](https://www2.paloaltonetworks.com/blog/2009/03/new-conficker-variants/) [Threat Advisories - Advisories](https://www.paloaltonetworks.com/blog/category/threat-advisories-advisories/?ts=markdown) ## [New Conficker Variants](https://www2.paloaltonetworks.com/blog/2009/03/new-conficker-variants/) Conficker is back in the news as there are reports of new variants popping up. I'm sure that you've all heard the news and hype about how many endpoints Conficker has infected, and even more speculation on what the bot herder will do with the massive botnet. Here's some... Mar 23, 2009 By [Alfred Lee](https://www.paloaltonetworks.com/blog/author/alfred/?ts=markdown "Posts by Alfred Lee") [](https://www2.paloaltonetworks.com/blog/2009/01/heartland-corporation-malware-causes-largest-data-breach-in-history/) [Threat Advisories - Advisories](https://www.paloaltonetworks.com/blog/category/threat-advisories-advisories/?ts=markdown) ## [Heartland Corporation: Malware Causes Largest Data Breach In History](https://www2.paloaltonetworks.com/blog/2009/01/heartland-corporation-malware-causes-largest-data-breach-in-history/) Holy Crap! Heartland, a card processing service for more that 250,000 small businesses discloses a malware generated breach on inauguration day. The scope is unfathomable. If each... Jan 21, 2009 By [Matt Keil](https://www.paloaltonetworks.com/blog/author/matt/?ts=markdown "Posts by Matt Keil") [](https://www2.paloaltonetworks.com/blog/2008/11/microsoft-security-bulletin-november-2008/) [Threat Advisories - Advisories](https://www.paloaltonetworks.com/blog/category/threat-advisories-advisories/?ts=markdown) ## [Microsoft Security Bulletin - November 2008](https://www2.paloaltonetworks.com/blog/2008/11/microsoft-security-bulletin-november-2008/) Microsoft announced their scheduled November security bulletin today at 10am PST which covers 4 Microsoft vulnerabilities. Palo Alto Networks released coverage for the Microsoft vulnerabilities covered in the N... Nov 11, 2008 By [Alfred Lee](https://www.paloaltonetworks.com/blog/author/alfred/?ts=markdown "Posts by Alfred Lee") [](https://www2.paloaltonetworks.com/blog/2008/10/out-of-band-microsoft-security-bulletin/) [Threat Advisories - Advisories](https://www.paloaltonetworks.com/blog/category/threat-advisories-advisories/?ts=markdown) ## [Out-of-Band Microsoft Security Bulletin](https://www2.paloaltonetworks.com/blog/2008/10/out-of-band-microsoft-security-bulletin/) Microsoft announced an unscheduled security bulletin today at 10AM PST that they have a critical vulnerability (MS08-067) which affects Windows 2000, XP, 2K3 Server, Vista, and 2K8 operating systems. This vulne... Oct 22, 2008 By [Alfred Lee](https://www.paloaltonetworks.com/blog/author/alfred/?ts=markdown "Posts by Alfred Lee") [](https://www2.paloaltonetworks.com/blog/2007/10/webot-can-turn-any-pc-into-a-streaming-media-server/) [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown) ## [WeBot Can Turn Any PC into a Streaming Media Server](https://www2.paloaltonetworks.com/blog/2007/10/webot-can-turn-any-pc-into-a-streaming-media-server/) ALERT - WeBot is an application that turns your computer into a streaming media server. WeBot allows users to gain real-time access to their digital media files at home via an Internet enabled computer. In addi... Oct 18, 2007 By [Alfred Lee](https://www.paloaltonetworks.com/blog/author/alfred/?ts=markdown "Posts by Alfred Lee") [](https://www2.paloaltonetworks.com/blog/2007/08/mpack-malware-leverages-ssl-for-secure-transmission/) [Firewall](https://www.paloaltonetworks.com/blog/category/firewall/?ts=markdown) ## [MPack Malware Leverages SSL for Secure Transmission](https://www2.paloaltonetworks.com/blog/2007/08/mpack-malware-leverages-ssl-for-secure-transmission/) ALERT - SSL (Secure Socket Layer) is a protocol designed to provide encryption with minimal to no configuration, and has been used extensively to encrypt web communications through HTTPS (HTTP in SSL). Most sec... Aug 07, 2007 By [Alfred Lee](https://www.paloaltonetworks.com/blog/author/alfred/?ts=markdown "Posts by Alfred Lee") Load more blogs ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language