CVE CVE

CVE-2024-9474

CISA Known Exploited Vulnerability (KEV)

Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability

November 18, 2024

December 9, 2024

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, the management interfaces for affected devices should not be exposed to untrusted networks, including the internet.

Description

A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges.

Cloud NGFW and Prisma Access are not impacted by this vulnerability.

Weakness Enumeration

CWE-ID CWE Name

CWE-78
Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)

Known Affected Software Configurations


cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h2:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h4:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h6:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h2:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h9:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h1:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:8.1.24:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h3:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h1:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.13:h5:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.12:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.14:h1:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.12:h4:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.11:h5:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.11:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.11:h2:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.12:h3:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.3:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.12:h7:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.11:h3:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.19:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.17:h1:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.18:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.16:h3:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.3:h1:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.17:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.16:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.14:h4:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.2:h1:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.2:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.14:h8:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.14:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.16:h4:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.16:h5:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.15:h1:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.13:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.13:h1:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.15:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.1.13:h3:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.16:h2:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.16:h7:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.16:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.14:h4:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.14:h3:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.14:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.16:h3:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.16:h5:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.16:h6:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h1:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h5:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.5:h3:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.9:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.3:h2:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.3:h3:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h4:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.5:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.9:h1:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:9.0.3:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:h5:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h1:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:h3:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h2:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h2:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h13:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:h2:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:h1:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:h1:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h12:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h4:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:h1:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:h1:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:h1:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h6:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h5:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h4:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h2:*:*:*:*:*:*

Details

Source:
NVD
Published:
Updated:

Risk information

CVSS v3

Base score:
7.2
Severity:

HIGH

Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVSS v2

Not defined