A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges.
Cloud NGFW and Prisma Access are not impacted by this vulnerability.
References
Link | Resource |
---|---|
https://security.paloaltonetworks.com/CVE-2024-9474 | Vendor Advisory |
https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/ | Press/Media Coverage Vendor Advisory |
https://github.com/k4nfr3/CVE-2024-9474 | Exploit |
https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Dec 2024, 16:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/k4nfr3/CVE-2024-9474 - Exploit | |
References | () https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/ - Exploit, Third Party Advisory |
Information
Published : 2024-11-18 16:15
Updated : 2024-12-20 16:49
NVD link : CVE-2024-9474
Mitre link : CVE-2024-9474
CVE.ORG link : CVE-2024-9474
JSON object : View
Products Affected
paloaltonetworks
- pan-os
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')