Lucene search

K
paloaltoPalo Alto Networks Product Security Incident Response TeamPA-CVE-2024-5911
HistoryJul 10, 2024 - 4:00 p.m.

PAN-OS: File Upload Vulnerability in the Panorama Web Interface

2024-07-1016:00:00
Palo Alto Networks Product Security Incident Response Team
securityadvisories.paloaltonetworks.com
6
pan-os
file upload
vulnerability
panorama
web interface
administrator
system processes
crash
maintenance mode
best practices
administrative access
mitigation

CVSS4

7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/SC:N/VI:L/SI:N/VA:H/SA:N/AU:N/U:Amber/R:U/V:D/RE:M

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.3%

An arbitrary file upload vulnerability in Palo Alto Networks Panorama software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and crash the Panorama. Repeated attacks eventually cause the Panorama to enter maintenance mode, which requires manual intervention to bring the Panorama back online.

Work around:
This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.

Affected configurations

Vulners
Node
softwarepan-osRange<10.2.4
OR
softwarepan-osRange<10.1.9
VendorProductVersionCPE
softwarepan-os*cpe:2.3:a:software:pan-os:*:*:*:*:*:*:*:*

CVSS4

7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/SC:N/VI:L/SI:N/VA:H/SA:N/AU:N/U:Amber/R:U/V:D/RE:M

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.3%

Related for PA-CVE-2024-5911