CVE-2024-0012
Nov. 29, 2024, 4:15 p.m.
Tags
CVSS Score
Products Impacted
Vendor | Product | Versions |
---|---|---|
paloaltonetworks |
|
|
Description
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 . The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Weaknesses
CWE-306
Missing Authentication for Critical Function
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
CWE ID: 306Date
Published: Nov. 18, 2024, 4:15 p.m.
Last Modified: Nov. 29, 2024, 4:15 p.m.
Status : Undergoing Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
psirt@paloaltonetworks.com
CPEs
Type | Vendor | Product | Version | Update | Edition | Language | Software Edition | Target Software | Target Hardware | Other Information |
---|---|---|---|---|---|---|---|---|---|---|
o | paloaltonetworks | pan-os | / | / | / | / | / | / | / | / |
o | paloaltonetworks | pan-os | / | / | / | / | / | / | / | / |
o | paloaltonetworks | pan-os | / | / | / | / | / | / | / | / |
o | paloaltonetworks | pan-os | / | / | / | / | / | / | / | / |
o | paloaltonetworks | pan-os | 10.2.12 | - | / | / | / | / | / | / |
o | paloaltonetworks | pan-os | 10.2.12 | h1 | / | / | / | / | / | / |
o | paloaltonetworks | pan-os | 11.0.6 | - | / | / | / | / | / | / |
o | paloaltonetworks | pan-os | 11.1.5 | - | / | / | / | / | / | / |
o | paloaltonetworks | pan-os | 11.2.4 | - | / | / | / | / | / | / |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
Exploitability Score
Impact Score
Base Severity
CRITICALCVSS Vector String
The CVSS vector string provides an in-depth view of the vulnerability metrics.
View Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H