Lucene search

K
cvelistPalo_altoCVELIST:CVE-2024-5913
HistoryJul 10, 2024 - 6:40 p.m.

CVE-2024-5913 PAN-OS: Improper Input Validation Vulnerability in PAN-OS

2024-07-1018:40:29
CWE-20
palo_alto
www.cve.org
24
input validation
pan-os
palo alto networks
privilege elevation

CVSS3

6.1

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

9.3%

An improper input validation vulnerability in Palo Alto Networks PAN-OS software enables an attacker with the ability to tamper with the physical file system to elevate privileges.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "PAN-OS",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "changes": [
          {
            "at": "10.1.14-h2",
            "status": "unaffected"
          }
        ],
        "lessThan": "10.1.14-h2",
        "status": "affected",
        "version": "10.1.0",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "10.2.10",
            "status": "unaffected"
          }
        ],
        "lessThan": "10.2.10",
        "status": "affected",
        "version": "10.2.0",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "11.0.5",
            "status": "unaffected"
          }
        ],
        "lessThan": "11.0.5",
        "status": "affected",
        "version": "11.0.0",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "11.1.4",
            "status": "unaffected"
          }
        ],
        "lessThan": "11.1.4",
        "status": "affected",
        "version": "11.1.0",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "11.2.1",
            "status": "unaffected"
          }
        ],
        "lessThan": "11.2.1",
        "status": "affected",
        "version": "11.2.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Cloud NGFW",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "status": "affected",
        "version": "None"
      },
      {
        "status": "unaffected",
        "version": "All"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Prisma Access",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "status": "affected",
        "version": "None"
      },
      {
        "status": "unaffected",
        "version": "All"
      }
    ]
  }
]

CVSS3

6.1

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

9.3%

Related for CVELIST:CVE-2024-5913