Lucene search

K
vulnrichmentPalo_altoVULNRICHMENT:CVE-2024-8686
HistorySep 11, 2024 - 4:34 p.m.

CVE-2024-8686 PAN-OS: Command Injection Vulnerability

2024-09-1116:34:21
CWE-78
palo_alto
github.com
25
palo alto networks
command injection
authentication
system restrictions
firewall
root access
cve-2024-8686

CVSS4

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N/AU:N/U:Amber/R:U/V:C/RE:M

AI Score

7.6

Confidence

Low

EPSS

0

Percentile

10.2%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as root on the firewall.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*"
    ],
    "vendor": "paloaltonetworks",
    "product": "pan-os",
    "versions": [
      {
        "status": "unaffected",
        "version": "10.1.0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*"
    ],
    "vendor": "paloaltonetworks",
    "product": "pan-os",
    "versions": [
      {
        "status": "unaffected",
        "version": "10.2.0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*"
    ],
    "vendor": "paloaltonetworks",
    "product": "pan-os",
    "versions": [
      {
        "status": "unaffected",
        "version": "11.0.0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:-:*:*:*:*:*:*"
    ],
    "vendor": "paloaltonetworks",
    "product": "pan-os",
    "versions": [
      {
        "status": "unaffected",
        "version": "11.1.0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*"
    ],
    "vendor": "paloaltonetworks",
    "product": "pan-os",
    "versions": [
      {
        "status": "affected",
        "version": "11.2.2"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*"
    ],
    "vendor": "paloaltonetworks",
    "product": "pan-os",
    "versions": [
      {
        "status": "unaffected",
        "version": "11.2.0",
        "lessThan": "11.2.2",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:paloaltonetworks:cloud_ngfw:*:*:*:*:*:*:*:*"
    ],
    "vendor": "paloaltonetworks",
    "product": "cloud_ngfw",
    "versions": [
      {
        "status": "unaffected",
        "version": "0",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:paloaltonetworks:prisma_access:*:*:*:*:*:*:*:*"
    ],
    "vendor": "paloaltonetworks",
    "product": "prisma_access",
    "versions": [
      {
        "status": "unaffected",
        "version": "0",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS4

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N/AU:N/U:Amber/R:U/V:C/RE:M

AI Score

7.6

Confidence

Low

EPSS

0

Percentile

10.2%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-8686