CVE-2024-0008Insufficient Session Expiration in Palo Alto Networks Pan-os

Severity
8.8HIGHNVD
CNA6.6
EPSS
0.2%
top 51.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14
Latest updateNov 9

Description

Web sessions in the management interface in Palo Alto Networks PAN-OS software do not expire in certain situations, making it susceptible to unauthorized access.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages5 packages

NVDpaloaltonetworks/pan-os10.2.010.2.5+8
CVEListV5palo_alto_networks/pan-os9.09.0.17-h2+8
Palo Altopaloalto/pan-os

🔴Vulnerability Details

2
CVEList
PAN-OS: Insufficient Session Expiration Vulnerability in the Web Interface2024-02-14
GHSA
GHSA-3wmf-6xrp-7qch: Web sessions in the management interface in Palo Alto Networks PAN-OS software do not expire in certain situations, making it susceptible to unauthori2024-02-14

📋Vendor Advisories

3
Red Hat
kernel: bpf: Check the validity of nr_words in bpf_iter_bits_new()2024-11-09
VMware
VMware SD-WAN Edge and SD-WAN Orchestrator updates address multiple security vulnerabilities (CVE-2024-22246, CVE-2024-22247, CVE-2024-22248)2024-04-02
Palo Alto
PAN-OS: Insufficient Session Expiration Vulnerability in the Web Interface2024-02-14
CVE-2024-0008 — Insufficient Session Expiration in Palo | cvebase