Lucene search

K
paloaltoPalo Alto Networks Product Security Incident Response TeamPA-CVE-2023-6792
HistoryDec 13, 2023 - 5:00 p.m.

PAN-OS: OS Command Injection Vulnerability in the XML API

2023-12-1317:00:00
Palo Alto Networks Product Security Incident Response Team
securityadvisories.paloaltonetworks.com
5
pan-os
command injection
xml api
vulnerability
threat prevention
threat id 91715
administrative access
best practices

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

7.8 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.8%

An OS command injection vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated API user to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.

Work around:
Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 91715 (introduced in Applications and Threats content update 8473).

This issue requires the attacker to have authenticated access to the PAN-OS XML API. You can mitigate the impact of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

7.8 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.8%

Related for PA-CVE-2023-6792