Attackers are chaining two flaws in the wild to bypass authentication and escalate privileges via the PAN-OS management web interface to ... taking full control of the devices.