PANOS Privilege Escalation via MGT Interface Grants Root Access
CVE-2024-9474 Published on November 18, 2024
PAN-OS: Privilege Escalation (PE) Vulnerability in the Web Management Interface
A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges.
Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Known Exploited Vulnerability
This Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Palo Alto Networks PAN-OS contains an OS command injection vulnerability that allows for privilege escalation through the web-based management interface for several PAN products, including firewalls and VPN concentrators.
The following remediation steps are recommended / required by December 9, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, the management interfaces for affected devices should not be exposed to untrusted networks, including the internet.
Timeline
Initial publication
Weakness Type
What is a Shell injection Vulnerability?
The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
CVE-2024-9474 has been classified to as a Shell injection vulnerability or weakness.
Products Associated with CVE-2024-9474
Want to know whenever a new CVE is published for Palo Alto Networks PAN-OS? stack.watch will email you.
Affected Versions
Palo Alto Networks Cloud NGFW:- Version All is unaffected.
- Version 11.2.0 and below 11.2.4-h1 is affected.
- Version 11.1.0 and below 11.1.5-h1 is affected.
- Version 11.0.0 and below 11.0.6-h1 is affected.
- Version 10.2.0 and below 10.2.12-h2 is affected.
- Version 10.1.0 and below 10.1.14-h6 is affected.
- Version All is unaffected.
- Version 11.2.0 and below 11.2.4-h1 is affected.
- Version 11.1.0 and below 11.1.5-h1 is affected.
- Version 11.0.0 and below 11.0.6-h1 is affected.
- Version 10.2.0 and below 10.2.12-h2 is affected.
- Version 10.1.0 and below 10.1.14-h6 is affected.
- Version 11.2.0 and below 11.2.4-h1 is affected.
- Version 11.1.0 and below 11.1.5-h1 is affected.
- Version 11.0.0 and below 11.0.6-h1 is affected.
- Version 10.2.0 and below 10.2.12-h2 is affected.
- Version 10.1.0 and below 10.1.14-h6 is affected.
- Version 11.2.0 and below 11.2.4-h1 is affected.
- Version 11.1.0 and below 11.1.5-h1 is affected.
- Version 11.0.0 and below 11.0.6-h1 is affected.
- Version 10.2.0 and below 10.2.12-h2 is affected.
- Version 10.1.0 and below 10.1.14-h6 is affected.
- Version 11.2.0 and below 11.2.4-h1 is affected.
- Version 11.1.0 and below 11.1.5-h1 is affected.
- Version 11.0.0 and below 11.0.6-h1 is affected.
- Version 10.2.0 and below 10.2.12-h2 is affected.
- Version 10.1.0 and below 10.1.14-h6 is affected.
- Version 11.2.0 and below 11.2.4-h1 is affected.
- Version 11.1.0 and below 11.1.5-h1 is affected.
- Version 11.0.0 and below 11.0.6-h1 is affected.
- Version 10.2.0 and below 10.2.12-h2 is affected.
- Version 10.1.0 and below 10.1.14-h6 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.