security.paloaltonetworks.com
Open in
urlscan Pro
34.49.135.97
Public Scan
URL:
https://security.paloaltonetworks.com/CVE-2024-0012
Submission: On November 22 via api from RU — Scanned from CA
Submission: On November 22 via api from RU — Scanned from CA
Form analysis
0 forms found in the DOMText Content
* Get support * Security advisories * Report vulnerabilities * Subscribe * RSS feed Palo Alto Networks Security Advisories / CVE-2024-0012 CVE-2024-0012 PAN-OS: AUTHENTICATION BYPASS IN THE MANAGEMENT WEB INTERFACE (PAN-SA-2024-0015) Urgency HIGHEST 047910 Severity 9.3 · CRITICAL Exploit Maturity ATTACKED Response Effort HIGH Recovery USER Value Density CONCENTRATED Attack Vector NETWORK Attack Complexity LOW Attack Requirements NONE Automatable NO User Interaction NONE Product Confidentiality HIGH Product Integrity HIGH Product Availability HIGH Privileges Required NONE Subsequent Confidentiality LOW Subsequent Integrity NONE Subsequent Availability NONE NVD JSON Published 2024-11-18 Updated 2024-11-19 Reference PAN-SA-2024-0015 Discovered externally DESCRIPTION An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474. The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines. This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software on PA-Series, VM-Series, and CN-Series firewalls and on Panorama (virtual and M-Series). Cloud NGFW and Prisma Access are not impacted by this vulnerability. PRODUCT STATUS VersionsAffectedUnaffectedCloud NGFWNoneAllPAN-OS 11.2< 11.2.4-h1>= 11.2.4-h1PAN-OS 11.1< 11.1.5-h1>= 11.1.5-h1PAN-OS 11.0< 11.0.6-h1>= 11.0.6-h1PAN-OS 10.2< 10.2.12-h2>= 10.2.12-h2PAN-OS 10.1NoneAllPrisma AccessNoneAll See the Solution section for additional fixes to commonly deployed maintenance releases. REQUIRED CONFIGURATION FOR EXPOSURE The risk is greatest if you configure the management interface to enable access from the internet or any untrusted network either: 1. Directly or 2. Through a dataplane interface that includes a management interface profile. The risk is greatly reduced if you make sure that only trusted internal IP addresses are allowed to access the management interface. Use the following steps to identify your recently detected devices in our Internet scans: 1. To find your known assets that require remediation action, visit the Assets section of Customer Support Portal at https://support.paloaltonetworks.com (Products → Assets → All Assets → Remediation Required). 2. The list of your known devices with an internet-facing management interface discovered in our scans are tagged with PAN-SA-2024-0015 with a last seen timestamp in UTC. If no such devices are listed, it indicates our scan did not find any devices with internet-facing management interface for your account in the last three days. SEVERITY: CRITICAL, SUGGESTED URGENCY: HIGHEST The risk is highest when you allow access to the management interface from external IP addresses on the internet. CVSS-BT: 9.3 / CVSS-B: 9.3 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:A/AU:N/R:U/V:C/RE:H/U:Red) If you configure restricted access to a jump box that is the only system allowed to access the management interface, you greatly reduce the risk of exploitation because attacks would require privileged access using only those IP addresses. CVSS-BT: 5.9 / CVSS-B: 5.9 (CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:A/AU:N/R:U/V:C/RE:H/U:Red) EXPLOITATION STATUS Palo Alto Networks observed threat activity that exploits this vulnerability against a limited number of management web interfaces that are exposed to internet traffic coming from outside the network. WEAKNESS TYPE AND IMPACT CWE-306 Missing Authentication for Critical Function CAPEC-115 Authentication Bypass SOLUTION We strongly recommend that you secure access to your management interface following the instructions in the workarounds section below. This issue is fixed in PAN-OS 10.2.12-h2, PAN-OS 11.0.6-h1, PAN-OS 11.1.5-h1, PAN-OS 11.2.4-h1, and all later PAN-OS versions. In addition, in an attempt to provide the most seamless upgrade path for our customers, we are making fixes available for other TAC-preferred and commonly deployed maintenance releases. * Additional PAN-OS 11.2 fixes: * 11.2.0-h1 * 11.2.1-h1 * 11.2.2-h2 * 11.2.3-h3 * 11.2.4-h1 * Additional PAN-OS 11.1 fixes: * 11.1.0-h4 * 11.1.1-h2 * 11.1.2-h15 * 11.1.3-h11 * 11.1.4-h7 * 11.1.5-h1 * Additional PAN-OS 11.0 fixes: * 11.0.0-h4 * 11.0.1-h5 * 11.0.2-h5 * 11.0.3-h13 * 11.0.4-h6 * 11.0.5-h2 * 11.0.6-h1 * Additional PAN-OS 10.2 fixes: * 10.2.0-h4 * 10.2.1-h3 * 10.2.2-h6 * 10.2.3-h14 * 10.2.4-h32 * 10.2.5-h9 * 10.2.6-h6 * 10.2.7-h18 * 10.2.8-h15 * 10.2.9-h16 * 10.2.10-h9 * 10.2.11-h6 * 10.2.12-h2 WORKAROUNDS AND MITIGATIONS Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you haven’t already, we strongly recommend that you secure access to your management interface according to our best practice deployment guidelines. Specifically, you should restrict access to the management interface to only trusted internal IP addresses to prevent external access from the internet. Additionally, if you have a Threat Prevention subscription, you can block these attacks using Threat IDs 95746, 95747, 95752, 95753, 95759, and 95763 (available in Applications and Threats content version 8915-9075 and later). For these Threat IDs to protect against attacks for this vulnerability, * Ensure that all the listed Threat IDs are set to block mode, * Route incoming traffic for the MGT port through a DP port, e.g., enabling management profile on a DP interface for management access, * Replace the Certificate for Inbound Traffic Management, * Decrypt inbound traffic to the management interface so the firewall can inspect it, and * Enable threat prevention on the inbound traffic to management services. Review information about how to secure management access to your Palo Alto Networks firewalls: * Palo Alto Networks LIVEcommunity article: https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 * Palo Alto Networks official and more detailed technical documentation: https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices ACKNOWLEDGMENTS Palo Alto Networks thanks our Deep Product Security Research Team for discovering this issue internally from threat activity. FREQUENTLY ASKED QUESTIONS Q. ARE THERE ANY IOCS ASSOCIATED WITH THREAT ACTIVITY? > Please refer to the Unit42 Threat Brief > (https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/) for the > latest information. Q. ARE THERE ANY CHECKS I CAN RUN ON MY DEVICE TO LOOK FOR EVIDENCE OF ATTEMPTED EXPLOITATION ACTIVITY? > If your management web interface was exposed to the internet, then we advise > you to closely monitor your network for suspicious threat activity, such as > unrecognized configuration changes or suspicious users. > > We are scanning Telemetry data and customer uploaded tech support files (TSF) > for evidence of threat activity and updating the case notes accordingly. Q. CAN I USE XPANSE AND XSIAM TO IDENTIFY PAN-OS MANAGEMENT INTERFACES? > Cortex Xpanse and Cortex XSIAM customers with the ASM module can investigate > internet-exposed instances by reviewing alerts generated by the Palo Alto > Networks Firewall Admin Login attack surface rule. Q. IF OUR FIREWALL MANAGEMENT INTERFACE HAS ALWAYS BEEN DEPLOYED ACCORDING TO BEST PRACTICES, DO I NEED TO TAKE ANY ACTION? > We recommend applying the available fixes. Until then, follow the guidance in > the Workarounds and Mitigations section. Q. WHAT DO YOU RECOMMEND IF EXPLOITATION WAS OBSERVED ON MY DEVICE? > Please take your device offline from the internet and contact Global Customer > Support to do an Enhanced Factory Reset (EFR) on your device. > > The following Knowledge Base Article outlines the steps to remediate your > device using EFR: > https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CrO6CAK Q. HOW DID YOU IDENTIFY THAT MY FIREWALL HAD AN INTERNET-FACING MANAGEMENT INTERFACE? > Palo Alto Networks detects public-facing customer NGFW internet management > interfaces through routine, nonintrusive internet scanning. We analyze these > results using proprietary indicators to attribute device attributes (such as > firewall model) with a high degree of accuracy. Based on detected IP > addresses, we are able to associate an internet-exposed firewall with the > appropriate customer by cross-referencing the IP address to the serial number > stored in our internal records. > > We listed the firewalls that were discovered in this way since November 9 in > the Remediation Required list under the Assets section of the Customer Support > Portal (Products → Assets → All Assets → Remediation Required). This list may > not be complete, so make sure to verify that all of your firewalls are > properly configured. CPES cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.2:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h10:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h9:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h8:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h7:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h6:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h5:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h14:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h13:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h11:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h10:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h8:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h7:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h6:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h5:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.6:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h5:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h12:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h11:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h10:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h9:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h8:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h7:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h6:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h5:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h13:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h12:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h6:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h5:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h16:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h15:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h14:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h13:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h12:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h11:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h10:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h9:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h8:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h7:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h6:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h5:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h13:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h12:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h11:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h10:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h9:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h8:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h7:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h6:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h5:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h5:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2:-:*:*:*:*:*:* Show MoreShow Less TIMELINE 2024-11-19 Clarified applicability to PA-Series, VM-Series, and CN-Series firewalls and Panorama (virtual and M-Series) 2024-11-18 CVE-2024-0012 assigned to this publication as the vulnerability is identified and fixed 2024-11-15 Answered a FAQ about indicators of compromise 2024-11-14 Raised the severity of PAN-SA-2024-0015 bulletin as we have observed threat activity 2024-11-10 Added instructions to find your devices with an internet-facing management interface discovered in our scans 2024-11-08 Initially published as PAN-SA-2024-0015 Terms of usePrivacyProduct Security Assurance and Vulnerability Disclosure PolicyReport vulnerabilitiesManage subscriptions © 2024 Palo Alto Networks, Inc. All rights reserved.