⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, management interface for affected devices should not be exposed to untrusted networks, including the internet.. Due date: 2024-12-09.
CVE-2024-0012 — Router Implant: Missing Authentication for Critical Function in Palo Alto Networks Pan-os
Severity
9.3CRITICALNVD
EPSS
94.3%
top 0.06%
CISA KEV
KEVRansomware
Added 2024-11-18
Due 2024-12-09
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedNov 18
KEV addedNov 18
KEV dueDec 9
Latest updateDec 12
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, management interface for affected devices should not be exposed to untrusted networks, including the internet.
Description
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 .
The risk of this issue is greatly reduced if you secure access to the management web interface by res…
CVSS vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N
Affected Packages5 packages
🔴Vulnerability Details
3GHSA▶
GHSA-mw9x-2qwv-599p: An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface↗2024-11-18
💥Exploits & PoCs
2Nuclei▶
PAN-OS Management Web Interface - Authentication Bypass