cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-3393,https://securityvulnerability.io/vulnerability/CVE-2024-3393,Denial of Service Vulnerability in Palo Alto Networks PAN-OS Software,"A vulnerability exists within the DNS Security functionality of Palo Alto Networks PAN-OS software, which could be exploited by an unauthenticated attacker. By sending a carefully crafted malicious packet through the data plane of the firewall, the attacker can cause the firewall to reboot. If this malicious condition is triggered repeatedly, the affected firewall may ultimately enter maintenance mode, interrupting service availability. This poses a significant risk to customers relying on seamless and continuous network operations.",Palo Alto Networks,"Cloud Ngfw,Pan-os",7.1,HIGH,0.011789999902248383,true,false,false,true,true,true,true,2024-12-27T09:44:24.538Z,5822 CVE-2024-9474,https://securityvulnerability.io/vulnerability/CVE-2024-9474,Palo Alto Networks PAN-OS Privilege Escalation Vulnerability Affects Firewall,"A privilege escalation vulnerability exists in Palo Alto Networks PAN-OS software, allowing an administrator with access to the management web interface to execute actions on the firewall with heightened root privileges. This could potentially lead to unauthorized control and management of the firewall, exposing the organization to a range of security threats. It is important to note that cloud-based NGFW and Prisma Access solutions remain unaffected by this vulnerability.",Palo Alto Networks,"Cloud Ngfw,Pan-os,Prisma Access",7.2,HIGH,0.9749000072479248,true,true,false,true,true,true,false,2024-11-18T15:48:23.405Z,3897 CVE-2024-0012,https://securityvulnerability.io/vulnerability/CVE-2024-0012,Authentication Bypass Vulnerability Affects Palo Alto Networks PAN-OS Software,"An authentication bypass vulnerability exists in Palo Alto Networks PAN-OS software, allowing an attacker with network access to the management web interface to obtain administrator privileges without proper credentials. Exploiters can manipulate configuration settings and may take advantage of additional privilege escalation vulnerabilities. While the risk of unauthorized access can be mitigated by implementing access controls that restrict management web interface access to trusted internal IPs, adherence to recommended security practices is crucial to safeguarding the infrastructure. Notably, Cloud NGFW and Prisma Access are not affected by this vulnerability, which specifically impacts PAN-OS versions 10.2, 11.0, 11.1, and 11.2.",Palo Alto Networks,"Cloud Ngfw,Pan-os,Prisma Access",9.8,CRITICAL,0.9704200029373169,true,true,true,true,true,true,true,2024-11-18T15:47:41.407Z,24021 CVE-2024-2550,https://securityvulnerability.io/vulnerability/CVE-2024-2550,Unathorized Access to GlobalProtect Service through Null Pointer Dereference Vulnerability,A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop the GlobalProtect service on the firewall by sending a specially crafted packet that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.,Palo Alto Networks,"Cloud Ngfw,Pan-os,Prisma Access",,,0.0004299999854993075,false,false,false,false,,false,false,2024-11-14T09:40:38.838Z,0 CVE-2024-5920,https://securityvulnerability.io/vulnerability/CVE-2024-5920,Palo Alto Networks PAN-OS Software Vulnerable to Cross-Site Scripting Attacks,A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write Panorama administrator to push a specially crafted configuration to a PAN-OS node. This enables impersonation of a legitimate PAN-OS administrator who can perform restricted actions on the PAN-OS node after the execution of JavaScript in the legitimate PAN-OS administrator's browser.,Palo Alto Networks,"Cloud Ngfw,Pan-os,Prisma Access",,,0.0004299999854993075,false,false,false,false,,false,false,2024-11-14T09:40:14.513Z,0 CVE-2024-5917,https://securityvulnerability.io/vulnerability/CVE-2024-5917,Unauthenticated Server-Side Request Forgery Attack on PAN-OS Software Allows Proxy Access to Internal Network Resources,"A server-side request forgery in PAN-OS software enables an unauthenticated attacker to use the administrative web interface as a proxy, which enables the attacker to view internal network resources not otherwise accessible.",Palo Alto Networks,"Cloud Ngfw,Pan-os",,,0.0004299999854993075,false,false,false,false,,false,false,2024-11-14T09:39:40.266Z,0 CVE-2024-2552,https://securityvulnerability.io/vulnerability/CVE-2024-2552,Palo Alto Networks PAN-OS Command Injection Vulnerability Allows Administrator Deletions,A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions in the management plane and delete files on the firewall.,Palo Alto Networks,"Cloud Ngfw,Pan-os,Prisma Access",,,0.0004400000034365803,false,false,false,false,,false,false,2024-11-14T09:39:06.523Z,0 CVE-2024-5918,https://securityvulnerability.io/vulnerability/CVE-2024-5918,Improper Certificate Validation Vulnerability in Palo Alto Networks PAN-OS Software,"An improper certificate validation vulnerability in Palo Alto Networks PAN-OS software enables an authorized user with a specially crafted client certificate to connect to an impacted GlobalProtect portal or GlobalProtect gateway as a different legitimate user. This attack is possible only if you ""Allow Authentication with User Credentials OR Client Certificate.""",Palo Alto Networks,"Cloud Ngfw,Pan-os,Prisma Access",,,0.0004299999854993075,false,false,false,false,,false,false,2024-11-14T09:38:29.319Z,0 CVE-2024-5919,https://securityvulnerability.io/vulnerability/CVE-2024-5919,Blind XML External Entities Injection Vulnerability Allows File Exfiltration,A blind XML External Entities (XXE) injection vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker to exfiltrate arbitrary files from firewalls to an attacker controlled server. This attack requires network access to the firewall management interface.,Palo Alto Networks,"Cloud Ngfw,Pan-os,Prisma Access",,,0.0004299999854993075,false,false,false,false,,false,false,2024-11-14T09:36:46.390Z,0 CVE-2024-2551,https://securityvulnerability.io/vulnerability/CVE-2024-2551,Unauthenticated Null Pointer Dereference Vulnerability Leads to DoS Condition and Maintenance Mode,A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop a core system service on the firewall by sending a crafted packet through the data plane that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.,Palo Alto Networks,"Cloud Ngfw,Pan-os,Prisma Access",,,0.0004299999854993075,false,false,false,false,,false,false,2024-11-14T09:36:09.876Z,0 CVE-2024-9472,https://securityvulnerability.io/vulnerability/CVE-2024-9472,Palo Alto Networks PAN-OS Software Under Denial of Service Attack via Null Pointer Dereference,"A vulnerability exists in Palo Alto Networks PAN-OS software that affects PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series hardware platforms. When the Decryption policy is enabled, a null pointer dereference could be exploited by unauthenticated attackers to crash the PAN-OS system. This flaw results in a denial of service condition, which may cause the system to enter maintenance mode after repeated attempts to exploit the vulnerability. Notably, the VM-Series, Cloud NGFW, and Prisma Access products are not impacted by this issue. The affected versions of PAN-OS are as follows: 10.2.7-h12, 10.2.8-h10, 10.2.9-h9, 10.2.9-h11, 10.2.10-h2, 10.2.10-h3, 10.2.11, 10.2.11-h1, 10.2.11-h2, 10.2.11-h3, 11.1.2-h9, 11.1.2-h12, 11.1.3-h2, 11.1.3-h4, 11.1.3-h6, 11.2.2, and 11.2.2-h1.",Palo Alto Networks,"Cloud Ngfw,Pan-os,Prisma Access",,,0.0004299999854993075,false,false,false,false,,false,false,2024-11-14T09:34:22.665Z,0 CVE-2024-9468,https://securityvulnerability.io/vulnerability/CVE-2024-9468,PAN-OS: Firewall Denial of Service (DoS) via a Maliciously Crafted Packet,"A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.",Palo Alto Networks,"Pan-os,Cloud Ngfw,Prisma Access",,,0.0004299999854993075,false,false,false,true,,false,false,2024-10-09T17:15:00.000Z,0 CVE-2024-9471,https://securityvulnerability.io/vulnerability/CVE-2024-9471,PAN-OS: Privilege Escalation (PE) Vulnerability in XML API,"A privilege escalation vulnerability exists within the XML API of Palo Alto Networks PAN-OS software. This security flaw allows an authenticated administrator with limited access to exploit a compromised XML API key, potentially executing actions that would typically be restricted. For instance, an administrator who is designated as a 'Virtual system administrator (read-only)' may misuse another admin's XML API key, granting them unauthorized write capabilities on the virtual system's configuration. This situation underscores the importance of safeguarding API keys and enforcing stringent access controls to maintain network security.",Palo Alto Networks,"Pan-os,Cloud Ngfw,Prisma Access",4.7,MEDIUM,0.0004400000034365803,false,false,false,true,,false,false,2024-10-09T17:15:00.000Z,0 CVE-2024-8691,https://securityvulnerability.io/vulnerability/CVE-2024-8691,Palo Alto Networks GlobalProtect Vulnerability: Impersonation of Authenticated Users,"The vulnerability in the GlobalProtect portal of Palo Alto Networks PAN-OS software allows malicious actors, who are already authenticated GlobalProtect users, to impersonate other active users. When this occurs, the impersonated users are forcibly disconnected from the GlobalProtect service, thus compromising session integrity and disrupting connectivity. Furthermore, PAN-OS logs inaccurately indicate that the impersonated user has successfully authenticated, masking the attacker's identity and actions, creating challenges in monitoring and forensic analysis.",Palo Alto Networks,"Pan-os,Cloud Ngfw,Prisma Access",7.1,HIGH,0.0004600000102072954,false,false,false,false,,false,false,2024-09-11T16:43:30.608Z,0 CVE-2024-8688,https://securityvulnerability.io/vulnerability/CVE-2024-8688,Improper Neutralization of Matching Symbols Vulnerability in Palo Alto Networks PAN-OS CLI,"A vulnerability exists in the Palo Alto Networks PAN-OS command line interface (CLI) due to improper neutralization of matching symbols. Authenticated administrators, including those with read-only permissions, can exploit this flaw to read arbitrary files on the firewall. This presents a significant risk as it can lead to exposure of sensitive configurations and data, potentially compromising system integrity and confidentiality.",Palo Alto Networks,"Pan-os,Cloud Ngfw,Prisma Access",4.4,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-09-11T16:40:50.806Z,0 CVE-2024-8687,https://securityvulnerability.io/vulnerability/CVE-2024-8687,GlobalProtect Information Exposure Vulnerability,"An information exposure vulnerability has been identified within Palo Alto Networks' PAN-OS software that allows a GlobalProtect end user to gain access to sensitive security credentials. This flaw permits the user to retrieve both the GlobalProtect uninstall password and the disable or disconnect passcode. With this information, users can potentially uninstall, disable, or disconnect the GlobalProtect VPN application, bypassing the intended application security settings that would usually prevent such actions.",Palo Alto Networks,"Pan-os,Globalprotect App,Cloud Ngfw,Prisma Access",7.1,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2024-09-11T16:40:21.066Z,0 CVE-2024-8686,https://securityvulnerability.io/vulnerability/CVE-2024-8686,Palo Alto Networks PAN-OS Command Injection Vulnerability Allows Rooted Access,"A vulnerability in Palo Alto Networks PAN-OS software allows an authenticated administrator to exploit a command injection flaw, bypassing established system restrictions. This can lead to the execution of arbitrary commands with root privileges on the device, potentially compromising the security and integrity of the entire firewall system. Proper configurations and updates are essential for mitigation.",Palo Alto Networks,"Pan-os,Cloud Ngfw,Prisma Access",7.2,HIGH,0.0005200000014156103,false,false,false,false,,false,false,2024-09-11T16:34:21.618Z,0 CVE-2024-5913,https://securityvulnerability.io/vulnerability/CVE-2024-5913,Attackers can elevate privileges by tampering with physical file system,An improper input validation vulnerability in Palo Alto Networks PAN-OS software enables an attacker with the ability to tamper with the physical file system to elevate privileges.,Palo Alto Networks,"Pan-os,Cloud Ngfw,Prisma Access",6.1,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-07-10T18:40:29.769Z,0 CVE-2024-5911,https://securityvulnerability.io/vulnerability/CVE-2024-5911,Panorama vulnerability allows unauthorized access and system disruption,"An arbitrary file upload vulnerability in Palo Alto Networks Panorama software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and crash the Panorama. Repeated attacks eventually cause the Panorama to enter maintenance mode, which requires manual intervention to bring the Panorama back online.",Palo Alto Networks,"Pan-os,Cloud Ngfw,Prisma Access",,,0.0004299999854993075,false,true,false,false,,false,false,2024-07-10T18:40:02.209Z,0 CVE-2024-3400,https://securityvulnerability.io/vulnerability/CVE-2024-3400,Palo Alto Networks PAN-OS Command Injection Vulnerability,"A vulnerability exists in the GlobalProtect feature of Palo Alto Networks PAN-OS software, allowing for arbitrary file creation. This issue can be exploited by an unauthenticated attacker to execute code with root privileges on the affected firewall systems. Specific configurations and versions are impacted, highlighting the need for careful management of firewall settings to mitigate risks. Cloud NGFW, Panorama appliances, and Prisma Access are not affected, reinforcing the importance of understanding the configurations and versions at risk.",Palo Alto Networks,"Pan-os,Cloud Ngfw,Prisma Access",10,CRITICAL,0.9633899927139282,true,true,true,true,true,true,true,2024-04-12T07:20:00.707Z,173446 CVE-2024-3388,https://securityvulnerability.io/vulnerability/CVE-2024-3388,Attacker can impersonate another user and send network packets to internal assets,"A vulnerability in the GlobalProtect Gateway in Palo Alto Networks PAN-OS software enables an authenticated attacker to impersonate another user and send network packets to internal assets. However, this vulnerability does not allow the attacker to receive response packets from those internal assets.",Palo Alto Networks,"Pan-os,Cloud Ngfw,Prisma Access",4.1,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-04-10T17:06:40.685Z,0 CVE-2024-3387,https://securityvulnerability.io/vulnerability/CVE-2024-3387,Attacker can perform MitM attack to capture encrypted traffic,"A weak (low bit strength) device certificate in Palo Alto Networks Panorama software enables an attacker to perform a meddler-in-the-middle (MitM) attack to capture encrypted traffic between the Panorama management server and the firewalls it manages. With sufficient computing resources, the attacker could break encrypted communication and expose sensitive information that is shared between the management server and the firewalls.",Palo Alto Networks,"Pan-os,Cloud Ngfw,Prisma Access",5.3,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-04-10T17:06:36.676Z,0 CVE-2024-3386,https://securityvulnerability.io/vulnerability/CVE-2024-3386,Incorrect String Comparison Vulnerability Affects Predefined Decryption Exclusions in Palo Alto Networks PAN-OS Software,An incorrect string comparison vulnerability in Palo Alto Networks PAN-OS software prevents Predefined Decryption Exclusions from functioning as intended. This can cause traffic destined for domains that are not specified in Predefined Decryption Exclusions to be unintentionally excluded from decryption.,Palo Alto Networks,"Pan-os,Cloud Ngfw,Prisma Access",5.3,MEDIUM,0.0004299999854993075,false,false,false,true,,false,false,2024-04-10T17:06:32.694Z,0 CVE-2024-3385,https://securityvulnerability.io/vulnerability/CVE-2024-3385,"Remote Attackers Can Reboot Palo Alto Networks Firewalls, Requiring Manual Intervention","A vulnerability exists within the packet processing mechanisms of Palo Alto Networks PAN-OS software that can be exploited by remote attackers. This flaw provides the ability to initiate a reboot of hardware-based firewalls, particularly affecting the PA-5400 and PA-7000 Series models. Repeated attacks can lead to the device entering maintenance mode, necessitating manual intervention to restore normal operations. This represents a significant security concern for organizations relying on these firewall models to protect their networks.",Palo Alto Networks,"Pan-os,Cloud Ngfw,Prisma Access",7.5,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-10T17:06:28.153Z,0 CVE-2024-3384,https://securityvulnerability.io/vulnerability/CVE-2024-3384,Palo Alto Networks PAN-OS Software Vulnerability Allows Remote Reboot of Firewalls,"A vulnerability in PAN-OS software from Palo Alto Networks allows remote attackers to exploit Windows New Technology LAN Manager (NTLM) packets. When exploited, this vulnerability enables unauthorized rebooting of PAN-OS firewalls. Continuous attacks may lead to situations where the firewall is forced into maintenance mode, necessitating manual intervention for recovery. Organizations using affected versions are advised to review their security posture and implement necessary precautions to mitigate potential risks from this vulnerability.",Palo Alto Networks,"Pan-os,Cloud Ngfw,Prisma Access",7.5,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-04-10T17:06:21.704Z,0