CVE-2024-0012 is a vulnerability in Palo Alto Networks PAN-OS
Published on November 18, 2024
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 . The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Known Exploited Vulnerability
This Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Palo Alto Networks PAN-OS contains an authentication bypass vulnerability in the web-based management interface for several PAN-OS products, including firewalls and VPN concentrators.
The following remediation steps are recommended / required by December 9, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, management interface for affected devices should not be exposed to untrusted networks, including the internet.
Vulnerability Analysis
CVE-2024-0012 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. It has the highest possible exploitability rating (3.9). The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.
Missing Authentication for Critical Function
The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Products Associated with CVE-2024-0012
You can be notified by stack.watch whenever vulnerabilities like CVE-2024-0012 are published in these products:
What versions of PAN-OS are vulnerable to CVE-2024-0012?
- Palo Alto Networks PAN-OS Version 11.2.4 -
- Palo Alto Networks PAN-OS Version 11.2.0 Fixed in Version 11.2.4
- Palo Alto Networks PAN-OS Version 11.1.0 Fixed in Version 11.1.5
- Palo Alto Networks PAN-OS Version 11.0.6 -
- Palo Alto Networks PAN-OS Version 11.0.0 Fixed in Version 11.0.6
- Palo Alto Networks PAN-OS Version 10.2.12 h1
- Palo Alto Networks PAN-OS Version 10.2.12 -
- Palo Alto Networks PAN-OS Version 10.2.0 Fixed in Version 10.2.12
- Palo Alto Networks PAN-OS Version 11.1.5 -