Palo Alto Networks PAN-OS PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls.
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Palo Alto Networks PAN-OS.
By the Year
In 2026 there have been 3 vulnerabilities in Palo Alto Networks PAN-OS. Last year, in 2025 PAN-OS had 13 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in PAN-OS in 2026 could surpass last years number.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 3 | 0.00 |
| 2025 | 13 | 0.00 |
| 2024 | 30 | 6.52 |
| 2023 | 12 | 5.03 |
| 2022 | 6 | 6.78 |
| 2021 | 19 | 6.47 |
| 2020 | 52 | 6.94 |
| 2019 | 12 | 7.93 |
| 2018 | 9 | 5.66 |
It may take a day or so for new PAN-OS vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Palo Alto Networks PAN-OS Security Vulnerabilities
PAN-OS ADNS DoS via Malicious Packet Causing System Reboot
CVE-2026-0229
- February 11, 2026
A denial-of-service (DoS) vulnerability in the Advanced DNS Security (ADNS) feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode. Cloud NGFW and Prisma Access® are not impacted by this vulnerability.
Improper Check for Unusual or Exceptional Conditions
PAN-OS Improper Cert Validation Lets Windows TS Agents Use Expired Certs
CVE-2026-0228
- February 11, 2026
An improper certificate validation vulnerability in PAN-OS allows users to connect Terminal Server Agents on Windows to PAN-OS using expired certificates even if the PAN-OS configuration would not normally permit them to do so.
Improper Certificate Validation
PAN-OS DoS via Maintenance Mode Trigger
CVE-2026-0227
- January 15, 2026
A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode.
Improper Check for Unusual or Exceptional Conditions
Palo Alto PAN-OS DoS Reboot via DataPlane Packet
CVE-2025-4619
- November 13, 2025
A denial-of-service (DoS) vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to reboot a firewall by sending a specially crafted packet through the dataplane. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode. This issue is applicable to the PAN-OS software versions listed below on PA-Series firewalls, VM-Series firewalls, and Prisma® Access software. This issue does not affect Cloud NGFW. We have successfully completed the Prisma Access upgrade for all customers, with the exception of those facing issues such as conflicting maintenance windows. Remaining customers will be promptly scheduled for an upgrade through our standard upgrade process.
Improper Check for Unusual or Exceptional Conditions
Authenticated Admin Bypass in PANOS Web UI CVE20254615
CVE-2025-4615
- October 09, 2025
An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and execute arbitrary commands. The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators. Cloud NGFW and Prisma® Access are not affected by this vulnerability.
Improper Neutralization of Script in Attributes in a Web Page
PAN-OS session token leakage allows admin impersonation (CVE20254614)
CVE-2025-4614
- October 09, 2025
An information disclosure vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to view session tokens of users authenticated to the firewall web UI. This may allow impersonation of users whose session tokens are leaked. The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators. Cloud NGFW and Prisma® Access are not affected by this vulnerability.
Exposure of Sensitive System Information to an Unauthorized Control Sphere
PAN-OS MACsec CAK Disclosure in PA-7500 NGFW Clusters
CVE-2025-2182
- August 13, 2025
A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity association key (CAK). This issue is only applicable to PA-7500 Series devices which are in an NGFW cluster. A user who possesses this key can read messages being sent between devices in a NGFW Cluster. There is no impact in non-clustered firewalls or clusters of firewalls that do not enable MACsec.
PAN-OS Improper Input Neutralization in Mgt Web UI Enables Admin Impersonation
CVE-2025-0137
- May 14, 2025
An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables a malicious authenticated read-write administrator to impersonate another legitimate authenticated PAN-OS administrator. The attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .
PAN-OS Packet Capture Allows Unlicensed View of Clear-Text HTTP/2 (Up to 11.0)
CVE-2025-0123
- April 11, 2025
A vulnerability in the Palo Alto Networks PAN-OS® software enables unlicensed administrators to view clear-text data captured using the packet capture feature https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/monitoring/take-packet-captures/take-a-custom-packet-capture in decrypted HTTP/2 data streams traversing network interfaces on the firewall. HTTP/1.1 data streams are not impacted. In normal conditions, decrypted packet captures are available to firewall administrators after they obtain and install a free Decryption Port Mirror license. The license requirement ensures that this feature can only be used after approved personnel purposefully activate the license. For more information, review how to configure decryption port mirroring https://docs.paloaltonetworks.com/network-security/decryption/administration/monitoring-decryption/configure-decryption-port-mirroring . The administrator must obtain network access to the management interface (web, SSH, console, or telnet) and successfully authenticate to exploit this issue. Risk of this issue can be greatly reduced by restricting access to the management interface to only trusted administrators and from only internal IP addresses according to our recommended critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . Customer firewall administrators do not have access to the packet capture feature in Cloud NGFW. This feature is available only to authorized Palo Alto Networks personnel permitted to perform troubleshooting. Prisma® Access is not impacted by this vulnerability.
Palo Alto PAN-OS Auth Admin Impersonation via Web UI
CVE-2025-0125
- April 11, 2025
An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables a malicious authenticated read-write administrator to impersonate another legitimate authenticated PAN-OS administrator. The attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW and all Prisma® Access instances.
PAN-OS VM-Series Cmd Injection: Auth Admin Bypasses to Root
CVE-2025-0127
- April 11, 2025
A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. This issue is only applicable to PAN-OS VM-Series. This issue does not affect firewalls that are already deployed. Cloud NGFW and Prisma® Access are not affected by this vulnerability.
Palo Alto PAN-OS: Authenticated Admin File Read via CLI
CVE-2025-0115
- March 12, 2025
A vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated admin on the PAN-OS CLI to read arbitrary files. The attacker must have network access to the management interface (web, SSH, console, or telnet) and successfully authenticate to exploit this issue. You can greatly reduce the risk of this issue by restricting access to the management interface to only trusted users and internal IP addresses according to our recommended critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access.
Palo Alto PAN-OS LLDP DoS Reboot via Unauth Adjacent Attacker
CVE-2025-0116
- March 12, 2025
A Denial of Service (DoS) vulnerability in Palo Alto Networks PAN-OS software causes the firewall to unexpectedly reboot when processing a specially crafted LLDP frame sent by an unauthenticated adjacent attacker. Repeated attempts to initiate this condition causes the firewall to enter maintenance mode. This issue does not apply to Cloud NGFWs or Prisma Access software.
Palo Alto PAN-OS OpenConfig Plugin Command Injection (CVE-2025-0110)
CVE-2025-0110
- February 12, 2025
A command injection vulnerability in the Palo Alto Networks PAN-OS OpenConfig plugin enables an authenticated administrator with the ability to make gNMI requests to the PAN-OS management web interface to bypass system restrictions and run arbitrary commands. The commands are run as the __openconfig user (which has the Device Administrator role) on the firewall. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .
PAN-OS Auth Bypass: Unauth Access to Mgmt Web Interface PHP Scripts
CVE-2025-0108
- February 12, 2025
An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.
Missing Authentication for Critical Function
PAN-OS Authenticated Web Interface File-Read Exploit
CVE-2025-0111
- February 12, 2025
An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the nobody user. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.
External Control of File Name or Path
Palo Alto Networks PAN-OS DNS Security Denial of Service Vulnerability
CVE-2024-3393
- December 27, 2024
A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.
Improper Check for Unusual or Exceptional Conditions
Auth Bypass PAN-OS 10.211.2 via Web UI: Gain Admin Privileges
CVE-2024-0012
- November 18, 2024
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 . The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Missing Authentication for Critical Function
PANOS Privilege Escalation via MGT Interface Grants Root Access
CVE-2024-9474
- November 18, 2024
A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Shell injection
PAN-OS DoS via Null Pointer on PA-* Series (10.2.7-H12 .. 11.2.2-H1)
CVE-2024-9472
- November 14, 2024
A null pointer dereference in Palo Alto Networks PAN-OS software on PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series hardware platforms when Decryption policy is enabled allows an unauthenticated attacker to crash PAN-OS by sending specific traffic through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode. Palo Alto Networks VM-Series, Cloud NGFW, and Prisma Access are not affected. This issue only affects PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series running these specific versions of PAN-OS: * 10.2.7-h12 * 10.2.8-h10 * 10.2.9-h9 * 10.2.9-h11 * 10.2.10-h2 * 10.2.10-h3 * 10.2.11 * 10.2.11-h1 * 10.2.11-h2 * 10.2.11-h3 * 11.1.2-h9 * 11.1.2-h12 * 11.1.3-h2 * 11.1.3-h4 * 11.1.3-h6 * 11.2.2 * 11.2.2-h1
PAN-OS GlobalProtect Null Pointer Deref DoS
CVE-2024-2550
7.5 - High
- November 14, 2024
A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop the GlobalProtect service on the firewall by sending a specially crafted packet that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.
NULL Pointer Dereference
PAN-OS Core Service DoS via Null Pointer Deref
CVE-2024-2551
7.5 - High
- November 14, 2024
A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop a core system service on the firewall by sending a crafted packet through the data plane that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.
NULL Pointer Dereference
Pan-OS Auth Admin CmdInject Allows File Deletion
CVE-2024-2552
6 - Medium
- November 14, 2024
A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions in the management plane and delete files on the firewall.
Directory traversal
PAN-OS SSRF via Admin Web Interface Proxy Attack
CVE-2024-5917
4.9 - Medium
- November 14, 2024
A server-side request forgery in PAN-OS software enables an authenticated attacker with administrative privileges to use the administrative web interface as a proxy, which enables the attacker to view internal network resources not otherwise accessible.
SSRF
Palo Alto PAN-OS Blind XXE Exfiltration Vulnerability
CVE-2024-5919
6.5 - Medium
- November 14, 2024
A blind XML External Entities (XXE) injection vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker to exfiltrate arbitrary files from firewalls to an attacker controlled server. This attack requires network access to the firewall management interface.
XXE
XSS in PAN-OS Panorama Admin Push Enables Admin Impersonation
CVE-2024-5920
4.8 - Medium
- November 14, 2024
A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write Panorama administrator to push a specially crafted configuration to a PAN-OS node. This enables impersonation of a legitimate PAN-OS administrator who can perform restricted actions on the PAN-OS node after the execution of JavaScript in the legitimate PAN-OS administrator's browser.
XSS
Privilege Escalation (PE) via PAN-OS XML API
CVE-2024-9471
4.7 - Medium
- October 09, 2024
A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator. For example, an administrator with "Virtual system administrator (read-only)" access could use an XML API key of a "Virtual system administrator" to perform write operations on the virtual system configuration even though they should be limited to read-only operations.
PAN-OS Data Plane Memory Corruption Causing DoS
CVE-2024-9468
- October 09, 2024
A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.
GlobalProtect Portal Auth Bypass/Impersonation in PAN-OS
CVE-2024-8691
7.1 - High
- September 11, 2024
A vulnerability in the GlobalProtect portal in Palo Alto Networks PAN-OS software enables a malicious authenticated GlobalProtect user to impersonate another GlobalProtect user. Active GlobalProtect users impersonated by an attacker who is exploiting this vulnerability are disconnected from GlobalProtect. Upon exploitation, PAN-OS logs indicate that the impersonated user authenticated to GlobalProtect, which hides the identity of the attacker.
AuthZ
Command Injection in Palo Alto PAN-OS Enables Root Exec
CVE-2024-8686
7.2 - High
- September 11, 2024
A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as root on the firewall.
Shell injection
Info Exposure in PAN-OS GlobalProtect Exposes Uninstall Password & Passcode
CVE-2024-8687
7.1 - High
- September 11, 2024
An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a GlobalProtect end user to learn both the configured GlobalProtect uninstall password and the configured disable or disconnect passcode. After the password or passcode is known, end users can uninstall, disable, or disconnect GlobalProtect even if the GlobalProtect app configuration would not normally permit them to do so.
PAN-OS CLI Improper Neutralization Allows Arbitrary File Read
CVE-2024-8688
4.4 - Medium
- September 11, 2024
An improper neutralization of matching symbols vulnerability in the Palo Alto Networks PAN-OS command line interface (CLI) enables authenticated administrators (including read-only administrators) with access to the CLI to to read arbitrary files on the firewall.
PAN-OS Local Auth Info Exposure via Config Log
CVE-2024-5916
4.4 - Medium
- August 14, 2024
An information exposure vulnerability in Palo Alto Networks PAN-OS software enables a local system administrator to unintentionally disclose secrets, passwords, and tokens of external systems. A read-only administrator who has access to the config log, can read secrets, passwords, and tokens to external systems.
Cleartext Storage of Sensitive Information
PAN-OS Improper Input Validation for Privilege Escalation via File Tampering
CVE-2024-5913
6.8 - Medium
- July 10, 2024
An improper input validation vulnerability in Palo Alto Networks PAN-OS software enables an attacker with the ability to tamper with the physical file system to elevate privileges.
Palo Alto PAN-OS GlobalProtect Privilege Escalation via Command Injection (CVE-2024-3400)
CVE-2024-3400
10 - Critical
- April 12, 2024
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
Command Injection
Palo Alto PAN-OS User-ID Group Mod via CIE Agent Data
CVE-2024-3383
9.1 - Critical
- April 10, 2024
A vulnerability in how Palo Alto Networks PAN-OS software processes data received from Cloud Identity Engine (CIE) agents enables modification of User-ID groups. This impacts user access to network resources where users may be inappropriately denied or allowed access to resources based on your existing Security Policy rules.
GlobalProtect Gateway Auth Escalation via User Impersonation (CVE-2024-3388)
CVE-2024-3388
5 - Medium
- April 10, 2024
A vulnerability in the GlobalProtect Gateway in Palo Alto Networks PAN-OS software enables an authenticated attacker to impersonate another user and send network packets to internal assets. However, this vulnerability does not allow the attacker to receive response packets from those internal assets.
Improper Privilege Management
PAN-OS Incorrect String Comparison in Decryption Exclusions
CVE-2024-3386
5.3 - Medium
- April 10, 2024
An incorrect string comparison vulnerability in Palo Alto Networks PAN-OS software prevents Predefined Decryption Exclusions from functioning as intended. This can cause traffic destined for domains that are not specified in Predefined Decryption Exclusions to be unintentionally excluded from decryption.
Interpretation Conflict
PAN-OS Packet Processing Exploit Reboots PA-5400/PA-7000
CVE-2024-3385
7.5 - High
- April 10, 2024
A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online. This affects the following hardware firewall models: - PA-5400 Series firewalls - PA-7000 Series firewalls
NULL Pointer Dereference
Remote NTLM Attack Reboots PAN-OS Firewall (CVE-2024-3384)
CVE-2024-3384
7.5 - High
- April 10, 2024
A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN Manager (NTLM) packets from Windows servers. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.
PAN-OS Memory Leak on PA-5400 via SSL Forward Proxy
CVE-2024-3382
7.5 - High
- April 10, 2024
A memory leak exists in Palo Alto Networks PAN-OS software that enables an attacker to send a burst of crafted packets through the firewall that eventually prevents the firewall from processing traffic. This issue applies only to PA-5400 Series devices that are running PAN-OS software with the SSL Forward Proxy feature enabled.
Memory Leak
XSS in Palo Alto Networks GlobalProtect Portal allows JS execution
CVE-2024-0010
6.1 - Medium
- February 14, 2024
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript (in the context of a users browser) if a user clicks on a malicious link, allowing phishing attacks that could lead to credential theft.
XSS
PAN-OS GlobalProtect Gateway Unauthorized VPN Bypass via IP
CVE-2024-0009
6.3 - Medium
- February 14, 2024
An improper verification vulnerability in the GlobalProtect gateway feature of Palo Alto Networks PAN-OS software enables a malicious user with stolen credentials to establish a VPN connection from an unauthorized IP address.
Origin Validation Error
Session Hijacking in PAN-OS: Web Sessions Never Expire
CVE-2024-0008
8.8 - High
- February 14, 2024
Web sessions in the management interface in Palo Alto Networks PAN-OS software do not expire in certain situations, making it susceptible to unauthorized access.
Insufficient Session Expiration
PAN-OS XSS via Panorama Admin Web UI allows Impersonation
CVE-2024-0007
4.8 - Medium
- February 14, 2024
A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a malicious authenticated read-write administrator to store a JavaScript payload using the web interface on Panorama appliances. This enables the impersonation of another authenticated administrator.
XSS
CVE-2024-0011: Reflected XSS in PAN-OS Captive Portal Enables Phishing
CVE-2024-0011
6.1 - Medium
- February 14, 2024
A reflected cross-site scripting (XSS) vulnerability in the Captive Portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript (in the context of an authenticated Captive Portal users browser) if a user clicks on a malicious link, allowing phishing attacks that could lead to credential theft.
XSS
Palo Alto PAN-OS Authenticated XSS via Web UI Executing Malicious JS
CVE-2023-6789
4.8 - Medium
- December 13, 2023
A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a malicious authenticated read-write administrator to store a JavaScript payload using the web interface. Then, when viewed by a properly authenticated administrator, the JavaScript payload executes and disguises all associated actions as performed by that unsuspecting authenticated administrator.
XSS
Palo Alto PAN-OS OS Command Injection Allowing Auth Admin Arbitrary Exec
CVE-2023-6795
4.7 - Medium
- December 13, 2023
An OS command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
Shell injection
PAN-OS Arbitrary File Upload Allows Authenticated Code Exec
CVE-2023-6794
4.7 - Medium
- December 13, 2023
An arbitrary file upload vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
Unrestricted File Upload
Palo Alto PAN-OS XML API Command Injection (Authenticated)
CVE-2023-6792
6.3 - Medium
- December 13, 2023
An OS command injection vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated API user to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
Shell injection
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Palo Alto Networks PAN-OS or by Palo Alto Networks? Click the Watch button to subscribe.
Palo Alto Networks PAN-OS
PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls.