A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Solution:
Workaround:
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://security.paloaltonetworks.com/CVE-2024-9474 | vendor advisory |
https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/ | press/media coverage vendor advisory |
https://github.com/k4nfr3/CVE-2024-9474 | exploit |
https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/ | exploit third party advisory |