TROYANOSYVIRUS
Volver a CVEs

CVE-2024-0012

CRITICALCISA KEV
9.8

Descripcion

An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 . The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended  best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability.

Detalles CVE

Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado11/18/2024
Ultima modificacion11/4/2025
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorPalo Alto Networks
ProductoPAN-OS
Nombre vulnerabilidadPalo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability
Fecha inclusion KEV2024-11-18
Fecha limite remediacion2024-12-09
Uso en ransomwareKnown

Productos afectados

paloaltonetworks:pan-os

Debilidades (CWE)

CWE-306CWE-306

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.