Paloalto PAN-OS vulnerabilities
300 known vulnerabilities affecting paloalto/pan-os.
Total CVEs
300
CISA KEV
19
actively exploited
Public exploits
32
Exploited in wild
18
Severity breakdown
CRITICAL53HIGH115MEDIUM119LOW13
Vulnerabilities
Page 4 of 15
CVE-2023-0004MEDIUMCVSS 6.52023-04-12
CVE-2023-0004 [MEDIUM] CWE-703 PAN-OS: Local File Deletion Vulnerability
PAN-OS: Local File Deletion Vulnerability
A local file deletion vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to delete files from the local file system with elevated privileges.
These files can include logs and system components that impact the integrity and availability of PAN-OS software.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
Solution: This issue is fixed in
paloalto
CVE-2023-22809HIGHCVSS 7.8PoC2023-02-08
CVE-2023-22809 [HIGH] Impact of Sudo Vulnerability CVE-2023-22809
Impact of Sudo Vulnerability CVE-2023-22809
The Palo Alto Networks Product Security Assurance team has evaluated the sudo software vulnerability CVE-2023-22809 and has determined that the following Palo Alto Networks products do not expose the sudo program and, therefore, do not offer any scenarios required for successful exploitation of this vulnerability.
Affected products: Cloud NGFW, PAN-OS, Prisma Access, Prisma SD-WAN ION
paloalto
CVE-2023-0286MEDIUMCVSS 4.92023-02-08
CVE-2023-0286 [MEDIUM] PAN-SA-2023-0001 Impact of OpenSSL Vulnerabilities Disclosed Feb 7, 2023
PAN-SA-2023-0001 Impact of OpenSSL Vulnerabilities Disclosed Feb 7, 2023
The Palo Alto Networks Product Security Assurance team has evaluated the OpenSSL vulnerabilities that were disclosed on February 7, 2023 (CVE-2023-0286, CVE-2022-4304, CVE-2022-4203, CVE-2023-0215, CVE-2022-4450, CVE-2023-0216, CVE-2023-0217, and CVE-2023-0401) as it relates to our products. At this time, there are no demonstrat
paloalto
CVE-2022-3996HIGHCVSS 7.52022-12-23
CVE-2022-3996 [HIGH] CWE-667 PAN-SA-2022-0007 Impact of OpenSSL 3.0 Vulnerability CVE-2022-3996
PAN-SA-2022-0007 Impact of OpenSSL 3.0 Vulnerability CVE-2022-3996
The OpenSSL Project has published a vulnerability CVE-2022-3996 that affects OpenSSL versions 3.0.0 through 3.0.7 on December 13, 2022.
CVEs: CVE-2022-3996
Affected products: Cortex Data, Cortex XDR, Cortex XSOAR, Cortex Xpanse, GlobalProtect, PAN-OS, Prisma Access, Prisma Cloud, Prisma SD
paloalto
CVE-2022-42889CRITICALCVSS 9.8ExploitedPoC2022-11-09
CVE-2022-42889 [CRITICAL] CWE-94 CVE-2022-42889 Impact of Apache Text Commons Vulnerability CVE-2022-42889
CVE-2022-42889 Impact of Apache Text Commons Vulnerability CVE-2022-42889
Palo Alto Networks has evaluated the Apache Commons Text library vulnerability CVE-2022-42889, known as Text4Shell, for all products and services. The Palo Alto Networks Product Security Assurance team has confirmed that all products and services are not impacted by this vulnerability. CVE Summary CVE-2022-42889 Apac
paloalto
CVE-2022-3786HIGHCVSS 7.52022-10-31
CVE-2022-3786 [HIGH] PAN-SA-2022-0006 Impact of OpenSSL 3.0 Vulnerabilities CVE-2022-3786 and CVE-2022-3602
PAN-SA-2022-0006 Impact of OpenSSL 3.0 Vulnerabilities CVE-2022-3786 and CVE-2022-3602
The OpenSSL Project has published two high
CVEs: CVE-2022-3602, CVE-2022-3786
Affected products: Cortex Data, Cortex XDR, Cortex XSOAR, Cortex Xpanse, GlobalProtect, PAN-OS, Prisma Access, Prisma Cloud, Prisma SD
paloalto
CVE-2022-0030HIGHCVSS 8.12022-10-12
CVE-2022-0030 [HIGH] CWE-290 PAN-OS: Authentication Bypass in Web Interface
PAN-OS: Authentication Bypass in Web Interface
An authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface allows a network-based attacker with specific knowledge of the target firewall or Panorama appliance to impersonate an existing PAN-OS administrator and perform privileged actions.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
Solution: This issue is fixed in PAN-OS 8.1.24 and
paloalto
CVE-2022-28199HIGHCVSS 8.62022-09-14
CVE-2022-28199 [HIGH] CWE-20 Informational: PAN-OS: Impact of the NVIDIA Dataplane Development Kit (DPDK) Vulnerability CVE-2022-28199
Informational: PAN-OS: Impact of the NVIDIA Dataplane Development Kit (DPDK) Vulnerability CVE-2022-28199
The Palo Alto Networks Product Security Assurance team evaluated the NVIDIA Dataplane Development Kit (DPDK) vulnerability (CVE-2022-28199) as it relates to our products.
This vulnerability causes networking stacks that use the NVIDIA distribution of the DP
paloalto
CVE-2022-0028HIGHCVSS 8.6KEV2022-08-10
CVE-2022-0028 [HIGH] CWE-406 PAN-OS: Reflected Amplification Denial-of-Service (DoS) Vulnerability in URL Filtering
PAN-OS: Reflected Amplification Denial-of-Service (DoS) Vulnerability in URL Filtering
A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series (virtual) and CN-Series (container) fire
paloalto
CVE-2022-0024HIGHCVSS 7.22022-05-11
CVE-2022-0024 [HIGH] CWE-138 PAN-OS: Improper Neutralization Vulnerability Leads to Unintended Program Execution During Configuration Commit
PAN-OS: Improper Neutralization Vulnerability Leads to Unintended Program Execution During Configuration Commit
A vulnerability exists in Palo Alto Networks PAN-OS software that enables an authenticated network-based PAN-OS administrator to upload a specifically created configuration that disrupts system processes and potentially execute arbitrary code wit
paloalto
CVE-2022-0023MEDIUMCVSS 5.92022-04-13
CVE-2022-0023 [MEDIUM] CWE-755 PAN-OS: Denial-of-Service (DoS) Vulnerability in DNS Proxy
PAN-OS: Denial-of-Service (DoS) Vulnerability in DNS Proxy
An improper handling of exceptional conditions vulnerability exists in the DNS proxy feature of Palo Alto Networks PAN-OS software that enables a meddler-in-the-middle (MITM) to send specifically crafted traffic to the firewall that causes the service to restart unexpectedly. Repeated attempts to send this request result in denial-of-service to all
paloalto
CVE-2022-22963CRITICALCVSS 9.8KEVPoC2022-03-31
CVE-2022-22963 [CRITICAL] CWE-497 Informational: Impact of Spring Vulnerabilities CVE-2022-22963 and CVE-2022-22965
Informational: Impact of Spring Vulnerabilities CVE-2022-22963 and CVE-2022-22965
The Palo Alto Networks Product Security Assurance team has completed its evaluation of the Spring Cloud Function vulnerability CVE-2022-22963 and Spring Core vulnerability CVE-2022-22965 for all products and services. All Palo Alto Networks cloud services with possible impact have been mitigated and
paloalto
CVE-2022-0778HIGHCVSS 7.52022-03-31
CVE-2022-0778 [HIGH] CWE-834 Impact of the OpenSSL Infinite Loop Vulnerability CVE-2022-0778
Impact of the OpenSSL Infinite Loop Vulnerability CVE-2022-0778
The Palo Alto Networks Product Security Assurance team has evaluated the OpenSSL infinite loop vulnerability (CVE-2022-0778) as it relates to our products.
This vulnerability causes the OpenSSL library to enter an infinite loop when parsing an invalid certificate and can result in a Denial-of-Service (DoS) to the application. An attacker d
paloalto
CVE-2021-44142HIGHCVSS 8.82022-03-09
CVE-2021-44142 [HIGH] CWE-125 Informational: Impact of the Samba Vulnerability CVE-2021-44142 on PAN-OS
Informational: Impact of the Samba Vulnerability CVE-2021-44142 on PAN-OS
The Palo Alto Networks Product Security Assurance team has evaluated the Samba CVE-2021-44142 vulnerability.
Though PAN-OS software contains Samba packages, there isn’t a Samba server that runs in PAN-OS software that could enable an attacker to exploit this vulnerability, which means there are no scenarios that enable
paloalto
CVE-2022-0022MEDIUMCVSS 4.42022-03-09
CVE-2022-0022 [MEDIUM] CWE-916 PAN-OS: Use of a Weak Cryptographic Algorithm for Stored Password Hashes
PAN-OS: Use of a Weak Cryptographic Algorithm for Stored Password Hashes
Usage of a weak cryptographic algorithm in Palo Alto Networks PAN-OS software where the password hashes of administrator and local user accounts are not created with a sufficient level of computational effort, which allows for password cracking attacks on accounts in normal (non-FIPS-CC) operational mode.
An attacker mu
paloalto
CVE-2022-0011MEDIUMCVSS 6.52022-02-09
CVE-2022-0011 [MEDIUM] CWE-436 PAN-OS: URL Category Exceptions Match More URLs Than Intended in URL Filtering
PAN-OS: URL Category Exceptions Match More URLs Than Intended in URL Filtering
PAN-OS software provides options to exclude specific websites from URL category enforcement and those websites are blocked or allowed (depending on your rules) regardless of their associated URL category. This is done by creating a custom URL category list or by using an external dynamic list (EDL) in a URL F
paloalto
CVE-2021-44228CRITICALCVSS 10.0KEVPoC2021-12-10
CVE-2021-44228 [CRITICAL] CWE-94 Impact of Log4j Vulnerabilities CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832
Impact of Log4j Vulnerabilities CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832
Apache Log4j Java library is vulnerable to a remote code execution vulnerability CVE-2021-44228, known as Log4Shell, and related vulnerabilities CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832. Log4Shell allows remote unauthenticated attackers with the ability to i
paloalto
CVE-2021-41617HIGHCVSS 7.02021-11-30
CVE-2021-41617 [HIGH] CWE-250 Informational: Impact of the OpenSSH Vulnerability CVE-2021-41617 on PAN-OS
Informational: Impact of the OpenSSH Vulnerability CVE-2021-41617 on PAN-OS
The Palo Alto Networks Product Security Assurance team has evaluated the OpenSSH software CVE-2021-41617 vulnerability.
PAN-OS and Prisma SD-WAN ION software does not utilize the ssh configuration options required to exploit this vulnerability. There are no scenarios that enable successful exploitation of the vulne
paloalto
CVE-2021-3064CRITICALCVSS 9.82021-11-10
CVE-2021-3064 [CRITICAL] CWE-121 PAN-OS: Memory Corruption Vulnerability in GlobalProtect Portal and Gateway Interfaces
PAN-OS: Memory Corruption Vulnerability in GlobalProtect Portal and Gateway Interfaces
A memory corruption vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to disrupt system processes and potentially execute arbitrary code with root privileges. The attacker must have network access to
paloalto
CVE-2021-3059HIGHCVSS 8.12021-11-10
CVE-2021-3059 [HIGH] CWE-78 PAN-OS: OS Command Injection Vulnerability When Performing Dynamic Updates
PAN-OS: OS Command Injection Vulnerability When Performing Dynamic Updates
An OS command injection vulnerability in the Palo Alto Networks PAN-OS management interface exists when performing dynamic updates. This vulnerability enables a man-in-the-middle attacker to execute arbitrary OS commands to escalate privileges.
Affected products: PAN-OS, Prisma Access
Solution: This issue is fixed in
paloalto