Palo Alto Networks PAN-OS vulnerabilities
158 known vulnerabilities affecting palo_alto_networks/pan-os.
Total CVEs
158
CISA KEV
8
actively exploited
Public exploits
7
Exploited in wild
6
Severity breakdown
CRITICAL11HIGH65MEDIUM71LOW11
Vulnerabilities
Page 2 of 8
CVE-2025-0114HIGHCVSS 8.2≥ 11.0.0, < 11.0.2≥ 10.2.0, < 10.2.5+1 more2025-03-12
CVE-2025-0114 [HIGH] CWE-400 CVE-2025-0114: A Denial of Service (DoS) vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS so
A Denial of Service (DoS) vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software enables an unauthenticated attacker to render the service unavailable by sending a large number of specially crafted packets over a period of time. This issue affects both the GlobalProtect portal and the GlobalProtect gateway.
This issue does not
cvelistv5nvd
CVE-2025-0115MEDIUMCVSS 6.8≥ 11.2.0, < 11.2.3≥ 11.1.0, < 11.1.5+3 more2025-03-12
CVE-2025-0115 [MEDIUM] CWE-41 CVE-2025-0115: A vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated admin on the PAN-
A vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated admin on the PAN-OS CLI to read arbitrary files.
The attacker must have network access to the management interface (web, SSH, console, or telnet) and successfully authenticate to exploit this issue. You can greatly reduce the risk of this issue by restricting access to
cvelistv5nvd
CVE-2025-0116MEDIUMCVSS 6.8≥ 11.2.0, < 11.2.5≥ 11.1.0, < 11.1.8+2 more2025-03-12
CVE-2025-0116 [MEDIUM] CWE-754 CVE-2025-0116: A Denial of Service (DoS) vulnerability in Palo Alto Networks PAN-OS software causes the firewall to
A Denial of Service (DoS) vulnerability in Palo Alto Networks PAN-OS software causes the firewall to unexpectedly reboot when processing a specially crafted LLDP frame sent by an unauthenticated adjacent attacker. Repeated attempts to initiate this condition causes the firewall to enter maintenance mode.
This issue does not apply to Cloud NGFWs or Pr
cvelistv5nvd
CVE-2025-0111HIGHCVSS 7.1KEV≥ 10.1.0, < 10.1.14-h9≥ 10.2.0, < 10.2.7-h24+2 more2025-02-12
CVE-2025-0111 [HIGH] CWE-73 CVE-2025-0111: An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authen
An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user.
You can greatly reduce the risk of this issue by restricting access to the management web interface to only
cvelistv5nvd
CVE-2025-0108HIGHCVSS 8.8KEVPoC≥ 10.1.0, < 10.1.14-h9≥ 10.2.0, < 10.2.7-h24+2 more2025-02-12
CVE-2025-0108 [HIGH] CWE-306 CVE-2025-0108: An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attack
An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can ne
cvelistv5nvd
CVE-2025-0109MEDIUMCVSS 6.9≥ 10.1.0, < 10.1.14-h9≥ 10.2.0, < 10.2.7-h24+2 more2025-02-12
CVE-2025-0109 [MEDIUM] CWE-73 CVE-2025-0109: An unauthenticated file deletion vulnerability in the Palo Alto Networks PAN-OS management web inter
An unauthenticated file deletion vulnerability in the Palo Alto Networks PAN-OS management web interface enables an unauthenticated attacker with network access to the management web interface to delete certain files as the “nobody” user; this includes limited logs and configuration files but does not include system files.
You can greatly reduce the
cvelistv5nvd
CVE-2024-3393HIGHCVSS 8.7KEV≥ 11.2.0, < 11.2.3≥ 11.1.0, < 11.1.2-h16+2 more2024-12-27
CVE-2024-3393 [HIGH] CWE-754 CVE-2024-3393: A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software
A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.
cvelistv5nvd
CVE-2024-0012CRITICALCVSS 9.3KEVPoC≥ 11.2.0, < 11.2.4-h1≥ 11.1.0, < 11.1.5-h1+2 more2024-11-18
CVE-2024-0012 [CRITICAL] CWE-306 CVE-2024-0012: An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker w
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https:/
cvelistv5nvd
CVE-2024-9474MEDIUMCVSS 6.9KEVPoC≥ 11.2.0, < 11.2.4-h1≥ 11.1.0, < 11.1.5-h1+3 more2024-11-18
CVE-2024-9474 [MEDIUM] CWE-78 CVE-2024-9474: A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administr
A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges.
Cloud NGFW and Prisma Access are not impacted by this vulnerability.
cvelistv5nvd
CVE-2024-9472HIGHCVSS 8.7≥ 11.2.2, < 11.2.2-h3≥ 11.1.2-h9, < 11.1.2-h14+1 more2024-11-14
CVE-2024-9472 [HIGH] CWE-476 CVE-2024-9472: A null pointer dereference in Palo Alto Networks PAN-OS software on PA-800 Series, PA-3200 Series, P
A null pointer dereference in Palo Alto Networks PAN-OS software on PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series hardware platforms when Decryption policy is enabled allows an unauthenticated attacker to crash PAN-OS by sending specific traffic through the data plane, resulting in a denial of service (DoS) condition. Repeated attemp
cvelistv5nvd
CVE-2024-2550HIGHCVSS 8.7≥ 11.1.0, < 11.1.5≥ 11.0.0, < 11.0.6+1 more2024-11-14
CVE-2024-2550 [HIGH] CWE-476 CVE-2024-2550: A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS s
A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop the GlobalProtect service on the firewall by sending a specially crafted packet that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall enterin
cvelistv5nvd
CVE-2024-2551HIGHCVSS 8.7≥ 11.0.0, < 11.0.5≥ 10.2.0, < 10.2.4-h6+1 more2024-11-14
CVE-2024-2551 [HIGH] CWE-476 CVE-2024-2551: A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenti
A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop a core system service on the firewall by sending a crafted packet through the data plane that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.
cvelistv5nvd
CVE-2024-5919MEDIUMCVSS 5.1≥ 11.0.0, < 11.0.2≥ 10.2.0, < 10.2.5+1 more2024-11-14
CVE-2024-5919 [MEDIUM] CWE-611 CVE-2024-5919: A blind XML External Entities (XXE) injection vulnerability in the Palo Alto Networks PAN-OS softwar
A blind XML External Entities (XXE) injection vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker to exfiltrate arbitrary files from firewalls to an attacker controlled server. This attack requires network access to the firewall management interface.
cvelistv5nvd
CVE-2024-2552MEDIUMCVSS 6.8≥ 11.2.0, < 11.2.4≥ 11.1.0, < 11.1.5+2 more2024-11-14
CVE-2024-2552 [MEDIUM] CWE-22 CVE-2024-2552: A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated adm
A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions in the management plane and delete files on the firewall.
cvelistv5nvd
CVE-2024-5918MEDIUMCVSS 5.3≥ 11.0.0, < 11.0.3≥ 10.2.0, < 10.2.4-h5+1 more2024-11-14
CVE-2024-5918 [MEDIUM] CWE-295 CVE-2024-5918: An improper certificate validation vulnerability in Palo Alto Networks PAN-OS software enables an au
An improper certificate validation vulnerability in Palo Alto Networks PAN-OS software enables an authorized user with a specially crafted client certificate to connect to an impacted GlobalProtect portal or GlobalProtect gateway as a different legitimate user. This attack is possible only if you "Allow Authentication with User Credentials OR Client C
cvelistv5nvd
CVE-2024-5920MEDIUMCVSS 4.6≥ 11.1.0, < 11.1.4≥ 11.0.0, < 11.0.6+2 more2024-11-14
CVE-2024-5920 [MEDIUM] CWE-79 CVE-2024-5920: A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables an authenti
A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write Panorama administrator to push a specially crafted configuration to a PAN-OS node. This enables impersonation of a legitimate PAN-OS administrator who can perform restricted actions on the PAN-OS node after the execution of JavaScript in
cvelistv5nvd
CVE-2024-5917LOWCVSS 2.1≥ 10.2.0, < 10.2.2≥ 10.1.0, < 10.1.72024-11-14
CVE-2024-5917 [LOW] CWE-918 CVE-2024-5917: A server-side request forgery in PAN-OS software enables an authenticated attacker with administrati
A server-side request forgery in PAN-OS software enables an authenticated attacker with administrative privileges to use the administrative web interface as a proxy, which enables the attacker to view internal network resources not otherwise accessible.
cvelistv5nvd
CVE-2024-9468HIGHCVSS 8.2≥ 11.1.0, < 11.1.3≥ 11.0.0, < 11.0.4-h5+1 more2024-10-09
CVE-2024-9468 [HIGH] CWE-787 CVE-2024-9468: A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated at
A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.
cvelistv5nvd
CVE-2024-9471MEDIUMCVSS 5.1≥ 11.0.0, < 11.0.3≥ 10.1.0, < 10.1.11+3 more2024-10-09
CVE-2024-9471 [MEDIUM] CWE-269 CVE-2024-9471: A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enabl
A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator. For example, an administrator with "Virtual system administrator (read-only)" access cou
cvelistv5nvd
CVE-2024-8686HIGHCVSS 8.6v11.2.22024-09-11
CVE-2024-8686 [HIGH] CWE-78 CVE-2024-8686: A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated adm
A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as root on the firewall.
cvelistv5nvd