Lucene search

K
paloaltoPalo Alto Networks Product Security Incident Response TeamPA-CVE-2023-6795
HistoryDec 13, 2023 - 5:00 p.m.

PAN-OS: OS Command Injection Vulnerability in the Web Interface

2023-12-1317:00:00
Palo Alto Networks Product Security Incident Response Team
securityadvisories.paloaltonetworks.com
24
pan-os
command injection
vulnerability
web interface
privileged code execution
firewall
best practices

5.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N

7.9 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

19.0%

An OS command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.

Work around:
This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.

5.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N

7.9 High

AI Score

Confidence

Low

0.0005 Low

EPSS

Percentile

19.0%

Related for PA-CVE-2023-6795