Paloalto PAN-OS vulnerabilities
300 known vulnerabilities affecting paloalto/pan-os.
Total CVEs
300
CISA KEV
19
actively exploited
Public exploits
32
Exploited in wild
18
Severity breakdown
CRITICAL53HIGH115MEDIUM119LOW13
Vulnerabilities
Page 3 of 15
CVE-2024-0010MEDIUMCVSS 6.12024-02-14
CVE-2024-0010 [MEDIUM] CWE-79 PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Portal
PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Portal
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript in the context of a user’s browser if that user clicks on a malicious link, allowing phishing attacks that could lead to credential th
paloalto
CVE-2023-48795MEDIUMCVSS 5.9PoC2024-01-09
CVE-2023-48795 [MEDIUM] CWE-354 Impact of Terrapin SSH Attack
Impact of Terrapin SSH Attack
The Terrapin attack allows an attacker with the ability to intercept SSH traffic on affected Palo Alto Networks products (through machine-in-the-middle or MitM attacks) to downgrade connection security and force the usage of less secure client authentication algorithms when an administrator or user connects to the product.
This issue does not impact the SSH server component of PAN-OS software configured
paloalto
CVE-2023-6789MEDIUMCVSS 4.82023-12-13
CVE-2023-6789 [MEDIUM] CWE-79 PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in the Web Interface
PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in the Web Interface
A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a malicious authenticated read-write administrator to store a JavaScript payload using the web interface. Then, when viewed by a properly authenticated administrator, the JavaScript payload executes and disguises all associate
paloalto
CVE-2023-6792MEDIUMCVSS 6.32023-12-13
CVE-2023-6792 [MEDIUM] CWE-88 PAN-OS: OS Command Injection Vulnerability in the XML API
PAN-OS: OS Command Injection Vulnerability in the XML API
An OS command injection vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated API user to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
Solution: This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PA
paloalto
CVE-2023-6791MEDIUMCVSS 4.92023-12-13
CVE-2023-6791 [MEDIUM] CWE-701 PAN-OS: Plaintext Disclosure of External System Integration Credentials
PAN-OS: Plaintext Disclosure of External System Integration Credentials
A credential disclosure vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-only administrator to obtain the plaintext credentials of stored external system integrations such as LDAP, SCP, RADIUS, TACACS+, and SNMP from the web interface.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
paloalto
CVE-2023-6794MEDIUMCVSS 4.72023-12-13
CVE-2023-6794 [MEDIUM] CWE-434 PAN-OS: File Upload Vulnerability in the Web Interface
PAN-OS: File Upload Vulnerability in the Web Interface
An arbitrary file upload vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
Solution: This issue is fixed in PA
paloalto
CVE-2023-6795MEDIUMCVSS 4.72023-12-13
CVE-2023-6795 [MEDIUM] CWE-78 PAN-OS: OS Command Injection Vulnerability in the Web Interface
PAN-OS: OS Command Injection Vulnerability in the Web Interface
An OS command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
Solution: This issue is fixed in PAN-OS 8.1.24-h1, PAN-OS 9.0.1
paloalto
CVE-2023-6790MEDIUMCVSS 6.12023-12-13
CVE-2023-6790 [MEDIUM] CWE-79 PAN-OS: DOM-Based Cross-Site Scripting (XSS) Vulnerability in the Web Interface
PAN-OS: DOM-Based Cross-Site Scripting (XSS) Vulnerability in the Web Interface
A DOM-Based cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to execute a JavaScript payload in the context of an administrator’s browser when they view a specifically crafted link to the PAN-OS web interface.
Affected products: Cloud NGFW, PAN-OS, Pri
paloalto
CVE-2023-6793LOWCVSS 2.72023-12-13
CVE-2023-6793 [LOW] CWE-269 PAN-OS: XML API Keys Revoked by Read-Only PAN-OS Administrator
PAN-OS: XML API Keys Revoked by Read-Only PAN-OS Administrator
An improper privilege management vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-only administrator to revoke active XML API keys from the firewall and disrupt XML API usage.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
Solution: This issue is fixed in PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.11,
paloalto
CVE-2023-38545CRITICALCVSS 9.82023-10-12
CVE-2023-38545 [CRITICAL] CWE-120 Impact of curl and libcurl Vulnerabilities (CVE-2023-38545, CVE-2023-38546)
Impact of curl and libcurl Vulnerabilities (CVE-2023-38545, CVE-2023-38546)
The Palo Alto Networks Product Security Assurance team has evaluated the curl and libcurl vulnerabilities (CVE-2023-38545, CVE-2023-38546) that were disclosed on October 11, 2023 as they relate to our products.
At this time, there are no demonstrated scenarios that enable successful exploitation of these vulner
paloalto
CVE-2023-44487HIGHCVSS 7.5KEVPoC2023-10-11
CVE-2023-44487 [HIGH] CWE-400 Impact of Rapid Reset and HTTP/2 DoS Vulnerabilities (CVE-2023-44487, CVE-2023-35945)
Impact of Rapid Reset and HTTP/2 DoS Vulnerabilities (CVE-2023-44487, CVE-2023-35945)
The Palo Alto Networks Product Security Assurance team is evaluating the recently disclosed denial-of-service (DoS) vulnerabilities in the HTTP/2 protocol including Rapid Reset (CVE-2023-44487) and CVE-2023-35945.
If HTTP/2 inspection is enabled in PAN-OS, an ongoing distributed denial-of-servic
paloalto
CVE-2023-4863HIGHCVSS 8.8KEV2023-10-02
CVE-2023-4863 [HIGH] CWE-787 Impact of libwebp Vulnerability CVE-2023-4863
Impact of libwebp Vulnerability CVE-2023-4863
The Palo Alto Networks Product Security Assurance team has evaluated the recently disclosed critical libwebp vulnerability (CVE-2023-4863) as it relates to our products. While PAN-OS 10.2 and later versions include this library, PAN-OS software does not offer any scenarios required for the successful exploitation of this vulnerability and is not impacted.
No other Palo Alto
paloalto
CVE-2023-38802HIGHCVSS 7.52023-09-13
CVE-2023-38802 [HIGH] CWE-754 PAN-OS: Denial-of-Service (DoS) Vulnerability in BGP Software
PAN-OS: Denial-of-Service (DoS) Vulnerability in BGP Software
BGP software such as FRRouting FRR included as part of the PAN-OS, Prisma SD-WAN ION, and Prisma Access routing features enable a remote attacker to incorrectly reset network sessions though an invalid BGP update. This issue is applicable only to devices and appliances with BGP routing features enabled.
This issue requires the remote attacker
paloalto
CVE-2023-36671MEDIUMCVSS 5.72023-08-17
CVE-2023-36671 [MEDIUM] CWE-829 PAN-SA-2023-0004 Informational Bulletin: Impact of TunnelCrack Vulnerabilities (CVE-2023-36671, CVE-2023-36672, CVE-2023-35838, and CVE-2023-36673)
PAN-SA-2023-0004 Informational Bulletin: Impact of TunnelCrack Vulnerabilities (CVE-2023-36671, CVE-2023-36672, CVE-2023-35838, and CVE-2023-36673)
The Palo Alto Networks Product Security Assurance team is aware of the research publication that details a combination of attacks named "TunnelCrack". These are also refer
paloalto
CVE-2023-38046MEDIUMCVSS 4.92023-07-12
CVE-2023-38046 [MEDIUM] CWE-610 PAN-OS: Read System Files and Resources During Configuration Commit
PAN-OS: Read System Files and Resources During Configuration Commit
A vulnerability exists in Palo Alto Networks PAN-OS software that enables an authenticated administrator with the privilege to commit a specifically created configuration to read local files and resources from the system.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
Solution: This issue is fixed in PAN-OS 10.2.4, PAN-OS
paloalto
CVE-2023-34362CRITICALCVSS 9.8KEVPoC2023-06-16
CVE-2023-34362 [CRITICAL] PAN-SA-2023-0003 Informational Bulletin: Impact of MOVEit Vulnerabilities (CVE-2023-34362, CVE-2023-35036, CVE-2023-35708)
PAN-SA-2023-0003 Informational Bulletin: Impact of MOVEit Vulnerabilities (CVE-2023-34362, CVE-2023-35036, CVE-2023-35708)
The Palo Alto Networks Product Security Assurance team has evaluated the recently disclosed critical Structured Query Language injection (SQLi) vulnerabilities (CVE-2023-34362, CVE-2023-35036, CVE-2023-35708) in the MOVEit Tran
paloalto
CVE-2023-0010MEDIUMCVSS 5.42023-06-14
CVE-2023-0010 [MEDIUM] CWE-79 PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in Captive Portal Authentication
PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in Captive Portal Authentication
A reflected cross-site scripting (XSS) vulnerability in the Captive Portal feature of Palo Alto Networks PAN-OS software can allow a JavaScript payload to be executed in the context of an authenticated Captive Portal user’s browser when they click on a specifically crafted link.
Aff
paloalto
CVE-2023-0007MEDIUMCVSS 4.82023-05-10
CVE-2023-0007 [MEDIUM] CWE-80 PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in the Panorama Web Interface
PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in the Panorama Web Interface
A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software on Panorama appliances enables an authenticated read-write administrator to store a JavaScript payload in the web interface that will execute in the context of another administrator’s browser when viewed.
Affected p
paloalto
CVE-2023-0008MEDIUMCVSS 4.42023-05-10
CVE-2023-0008 [MEDIUM] CWE-73 PAN-OS: Local File Disclosure Vulnerability in the PAN-OS Web Interface
PAN-OS: Local File Disclosure Vulnerability in the PAN-OS Web Interface
A file disclosure vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write administrator with access to the web interface to export local files from the firewall through a race condition.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
Solution: This issue is fixed in PAN-OS 8.1.25, PAN
paloalto
CVE-2023-0005MEDIUMCVSS 4.92023-04-12
CVE-2023-0005 [MEDIUM] CWE-497 PAN-OS: Exposure of Sensitive Information Vulnerability
PAN-OS: Exposure of Sensitive Information Vulnerability
A vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to expose the plaintext values of secrets stored in the device configuration and encrypted API keys.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
Solution: This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.15, PAN-OS 10.0.12, PAN-OS 10.1.8
paloalto