Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.PALO_ALTO_CVE-2024-5911.NASL
HistoryJul 10, 2024 - 12:00 a.m.

Palo Alto Networks PAN-OS 10.1.x < 10.1.9 / 10.2.x < 10.2.4 Vulnerability

2024-07-1000:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
7
palo alto networks
pan-os
arbitrary file upload
vulnerability
panorama
maintenance mode
tenable
version 10.1.9
version 10.2.4
web interface

CVSS4

7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/SC:N/VI:L/SI:N/VA:H/SA:N/AU:N/U:Amber/R:U/V:D/RE:M

AI Score

6.7

Confidence

Low

The version of Palo Alto Networks PAN-OS running on the remote host is 10.1.x prior to 10.1.9 or 10.2.x prior to 10.2.4.
It is, therefore, affected by a vulnerability.

An arbitrary file upload vulnerability in Palo Alto Networks Panorama software enables an authenticated     read-write administrator with access to the web interface to disrupt system processes and crash the     Panorama. Repeated attacks eventually cause the Panorama to enter maintenance mode, which requires manual     intervention to bring the Panorama back online.

Tenable has extracted the preceding description block directly from the PAN-OS security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(202119);
  script_version("1.3");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/09/24");

  script_cve_id("CVE-2024-5911");

  script_name(english:"Palo Alto Networks PAN-OS 10.1.x < 10.1.9 / 10.2.x < 10.2.4 Vulnerability");

  script_set_attribute(attribute:"synopsis", value:
"The remote PAN-OS host is affected by a vulnerability");
  script_set_attribute(attribute:"description", value:
"The version of Palo Alto Networks PAN-OS running on the remote host is 10.1.x prior to 10.1.9 or 10.2.x prior to 10.2.4.
It is, therefore, affected by a vulnerability.

    An arbitrary file upload vulnerability in Palo Alto Networks Panorama software enables an authenticated
    read-write administrator with access to the web interface to disrupt system processes and crash the
    Panorama. Repeated attacks eventually cause the Panorama to enter maintenance mode, which requires manual
    intervention to bring the Panorama back online.

Tenable has extracted the preceding description block directly from the PAN-OS security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://security.paloaltonetworks.com/CVE-2024-5911");
  script_set_attribute(attribute:"solution", value:
"Upgrade to PAN-OS 10.1.9 / 10.2.4 or later");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-5911");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(434);

  script_set_attribute(attribute:"vuln_publication_date", value:"2024/07/10");
  script_set_attribute(attribute:"patch_publication_date", value:"2024/07/10");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/07/10");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:paloaltonetworks:pan-os");
  script_set_attribute(attribute:"generated_plugin", value:"former");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Palo Alto Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("palo_alto_version.nbin");
  script_require_keys("Host/Palo_Alto/Firewall/Model", "Host/Palo_Alto/Firewall/Version", "Host/Palo_Alto/Firewall/Full_Version", "Host/Palo_Alto/Firewall/Source");

  exit(0);
}

include('vcf.inc');
include('vcf_extras.inc');

vcf::palo_alto::initialize();

var app_name = 'Palo Alto Networks PAN-OS';

var app_info = vcf::get_app_info(app:app_name, kb_ver:'Host/Palo_Alto/Firewall/Full_Version', kb_source:'Host/Palo_Alto/Firewall/Source');

var model = get_kb_item("Host/Palo_Alto/Firewall/Model");
if ('panorama' >!< tolower(model)) audit(AUDIT_HOST_NOT, "a Palo Alto Panorama model");

var constraints = [
  { 'min_version' : '10.1.0', 'fixed_version' : '10.1.9' },
  { 'min_version' : '10.2.0', 'fixed_version' : '10.2.4' }
];

vcf::check_version_and_report(
    app_info:app_info,
    constraints:constraints,
    severity:SECURITY_WARNING
);

CVSS4

7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/SC:N/VI:L/SI:N/VA:H/SA:N/AU:N/U:Amber/R:U/V:D/RE:M

AI Score

6.7

Confidence

Low

Related for PALO_ALTO_CVE-2024-5911.NASL