Lucene search

K
cvelistPalo_altoCVELIST:CVE-2023-6793
HistoryDec 13, 2023 - 6:40 p.m.

CVE-2023-6793 PAN-OS: XML API Keys Revoked by Read-Only PAN-OS Administrator

2023-12-1318:40:54
CWE-269
palo_alto
www.cve.org
palo alto networks
pan-os
xml api
privilege management
vulnerability
authenticated
administrator
firewall
disruption

2.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L

4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.5%

An improper privilege management vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-only administrator to revoke active XML API keys from the firewall and disrupt XML API usage.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "PAN-OS",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "changes": [
          {
            "at": "8.1.24-h1",
            "status": "unaffected"
          }
        ],
        "lessThan": "All",
        "status": "unaffected",
        "version": "8.1",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "9.0.17-h4",
            "status": "unaffected"
          }
        ],
        "lessThan": "9.0.17-h4",
        "status": "affected",
        "version": "9.0",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "9.1.17",
            "status": "unaffected"
          }
        ],
        "lessThan": "9.1.17",
        "status": "affected",
        "version": "9.1",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "All",
        "status": "affected",
        "version": "10.0",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "10.1.11",
            "status": "unaffected"
          }
        ],
        "lessThan": "10.1.11",
        "status": "affected",
        "version": "10.1",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "10.2.5",
            "status": "unaffected"
          }
        ],
        "lessThan": "10.2.5",
        "status": "affected",
        "version": "10.2",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "11.0.2",
            "status": "unaffected"
          }
        ],
        "lessThan": "11.0.2",
        "status": "affected",
        "version": "11.0",
        "versionType": "custom"
      },
      {
        "lessThan": "All",
        "status": "unaffected",
        "version": "11.1",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Prisma Access",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "status": "unaffected",
        "version": "All"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Cloud NGFW",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "status": "unaffected",
        "version": "All"
      }
    ]
  }
]

2.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L

4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

13.5%

Related for CVELIST:CVE-2023-6793