About 7.43 percent of the DDoS attacks originated from India this quarter, while China was the largest source for the same at 37.01 percent.
Failure to take action can result in a vulnerable system being used to propagate a DDoS botnet, launch DDoS attacks, exfiltrate confidential data and run programmes on behalf of attackers...
Since Shellshock targets UNIX-based machines, organisations should harden their servers. This can be done by implementing a 'least privilege' strategy and preventing unlimited root shell accesses.
All versions of PAN-OS and Panorama include the vulnerable version of Bash, but we've determined the issue is only exploitable by authenticated users, says the security company.
Known as the 'Bash Bug' or 'Shellshock', the GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271) could allow an attacker to gain control over a targeted computer if exploited successfully.