Paloalto Prisma Access vulnerabilities
104 known vulnerabilities affecting paloalto/prisma_access.
Total CVEs
104
CISA KEV
9
actively exploited
Public exploits
12
Exploited in wild
8
Severity breakdown
CRITICAL12HIGH39MEDIUM48LOW5
Vulnerabilities
Page 2 of 6
CVE-2024-3384HIGHCVSS 7.52024-04-10
CVE-2024-3384 [HIGH] CWE-1286 PAN-OS: Firewall Denial of Service (DoS) via Malformed NTLM Packets
PAN-OS: Firewall Denial of Service (DoS) via Malformed NTLM Packets
A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN Manager (NTLM) packets from Windows servers. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back onl
paloalto
CVE-2024-3387MEDIUMCVSS 5.92024-04-10
CVE-2024-3387 [MEDIUM] CWE-326 PAN-OS: Weak Certificate Strength in Panorama Software Leads to Sensitive Information Disclosure
PAN-OS: Weak Certificate Strength in Panorama Software Leads to Sensitive Information Disclosure
A weak (low bit strength) device certificate in Palo Alto Networks Panorama software enables an attacker to perform a meddler-in-the-middle (MitM) attack to capture encrypted traffic between the Panorama management server and the firewalls it manages. With sufficient comput
paloalto
CVE-2024-3388MEDIUMCVSS 5.02024-04-10
CVE-2024-3388 [MEDIUM] CWE-269 PAN-OS: User Impersonation in GlobalProtect SSL VPN
PAN-OS: User Impersonation in GlobalProtect SSL VPN
A vulnerability in the GlobalProtect Gateway in Palo Alto Networks PAN-OS software enables an authenticated attacker to impersonate another user and send network packets to internal assets. However, this vulnerability does not allow the attacker to receive response packets from those internal assets.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
Solutio
paloalto
CVE-2024-3386MEDIUMCVSS 5.32024-04-10
CVE-2024-3386 [MEDIUM] CWE-436 PAN-OS: Predefined Decryption Exclusions Does Not Work as Intended
PAN-OS: Predefined Decryption Exclusions Does Not Work as Intended
An incorrect string comparison vulnerability in Palo Alto Networks PAN-OS software prevents Predefined Decryption Exclusions from functioning as intended. This can cause traffic destined for domains that are not specified in Predefined Decryption Exclusions to be unintentionally excluded from decryption.
Affected products: Cloud NG
paloalto
CVE-2024-3094CRITICALCVSS 10.0PoC2024-04-01
CVE-2024-3094 [CRITICAL] CWE-506 Informational: Impact of Malicious Code in XZ Tools and Libraries (CVE-2024-3094)
Informational: Impact of Malicious Code in XZ Tools and Libraries (CVE-2024-3094)
The Palo Alto Networks Product Security Assurance team has evaluated the supply chain compromise impacting versions 5.6.0 and 5.6.1 of XZ tools and libraries. These versions of the software may allow unauthorized access to affected systems.
Based on the information presently known, Palo Alto Networks
paloalto
CVE-2024-2433LOWCVSS 2.72024-03-13
CVE-2024-2433 [LOW] CWE-269 PAN-OS: Improper Privilege Management Vulnerability in Panorama Software Leads to Availability Loss
PAN-OS: Improper Privilege Management Vulnerability in Panorama Software Leads to Availability Loss
An improper authorization vulnerability in Palo Alto Networks Panorama software enables an authenticated read-only administrator to upload files using the web interface and completely fill one of the disk partitions with those uploaded files, which prevents the ability t
paloalto
CVE-2024-0011MEDIUMCVSS 6.12024-02-24
CVE-2024-0011 [MEDIUM] CWE-79 PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in Captive Portal Authentication
PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in Captive Portal Authentication
A reflected cross-site scripting (XSS) vulnerability in the Captive Portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user’s browser if that user clicks on a malicious link, allowing phishin
paloalto
CVE-2024-0008HIGHCVSS 8.82024-02-14
CVE-2024-0008 [HIGH] CWE-613 PAN-OS: Insufficient Session Expiration Vulnerability in the Web Interface
PAN-OS: Insufficient Session Expiration Vulnerability in the Web Interface
Web sessions in the management interface in Palo Alto Networks PAN-OS software do not expire in certain situations, making it susceptible to unauthorized access.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
Solution: This issue is fixed in PAN-OS 9.0.17-h2, PAN-OS 9.1.17, PAN-OS 10.0.12-h1, PAN-OS 10.1.10-h1,
paloalto
CVE-2024-0009MEDIUMCVSS 6.32024-02-14
CVE-2024-0009 [MEDIUM] CWE-940 PAN-OS: Improper IP Address Verification in GlobalProtect Gateway
PAN-OS: Improper IP Address Verification in GlobalProtect Gateway
An improper verification vulnerability in the GlobalProtect gateway feature of Palo Alto Networks PAN-OS software enables a malicious user with stolen credentials to establish a VPN connection from an unauthorized IP address.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
Solution: This issue is fixed in PAN-OS 10.2.4, PAN-OS
paloalto
CVE-2024-0007MEDIUMCVSS 4.82024-02-14
CVE-2024-0007 [MEDIUM] CWE-79 PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in the Panorama Web Interface
PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in the Panorama Web Interface
A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a malicious authenticated read-write administrator to store a JavaScript payload using the web interface on Panorama appliances. This enables the impersonation of another authenticated administrator.
Affecte
paloalto
CVE-2024-0010MEDIUMCVSS 6.12024-02-14
CVE-2024-0010 [MEDIUM] CWE-79 PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Portal
PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Portal
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript in the context of a user’s browser if that user clicks on a malicious link, allowing phishing attacks that could lead to credential th
paloalto
CVE-2023-6789MEDIUMCVSS 4.82023-12-13
CVE-2023-6789 [MEDIUM] CWE-79 PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in the Web Interface
PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in the Web Interface
A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a malicious authenticated read-write administrator to store a JavaScript payload using the web interface. Then, when viewed by a properly authenticated administrator, the JavaScript payload executes and disguises all associate
paloalto
CVE-2023-6792MEDIUMCVSS 6.32023-12-13
CVE-2023-6792 [MEDIUM] CWE-88 PAN-OS: OS Command Injection Vulnerability in the XML API
PAN-OS: OS Command Injection Vulnerability in the XML API
An OS command injection vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated API user to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
Solution: This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PA
paloalto
CVE-2023-6791MEDIUMCVSS 4.92023-12-13
CVE-2023-6791 [MEDIUM] CWE-701 PAN-OS: Plaintext Disclosure of External System Integration Credentials
PAN-OS: Plaintext Disclosure of External System Integration Credentials
A credential disclosure vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-only administrator to obtain the plaintext credentials of stored external system integrations such as LDAP, SCP, RADIUS, TACACS+, and SNMP from the web interface.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
paloalto
CVE-2023-6794MEDIUMCVSS 4.72023-12-13
CVE-2023-6794 [MEDIUM] CWE-434 PAN-OS: File Upload Vulnerability in the Web Interface
PAN-OS: File Upload Vulnerability in the Web Interface
An arbitrary file upload vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
Solution: This issue is fixed in PA
paloalto
CVE-2023-6795MEDIUMCVSS 4.72023-12-13
CVE-2023-6795 [MEDIUM] CWE-78 PAN-OS: OS Command Injection Vulnerability in the Web Interface
PAN-OS: OS Command Injection Vulnerability in the Web Interface
An OS command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
Solution: This issue is fixed in PAN-OS 8.1.24-h1, PAN-OS 9.0.1
paloalto
CVE-2023-6790MEDIUMCVSS 6.12023-12-13
CVE-2023-6790 [MEDIUM] CWE-79 PAN-OS: DOM-Based Cross-Site Scripting (XSS) Vulnerability in the Web Interface
PAN-OS: DOM-Based Cross-Site Scripting (XSS) Vulnerability in the Web Interface
A DOM-Based cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to execute a JavaScript payload in the context of an administrator’s browser when they view a specifically crafted link to the PAN-OS web interface.
Affected products: Cloud NGFW, PAN-OS, Pri
paloalto
CVE-2023-6793LOWCVSS 2.72023-12-13
CVE-2023-6793 [LOW] CWE-269 PAN-OS: XML API Keys Revoked by Read-Only PAN-OS Administrator
PAN-OS: XML API Keys Revoked by Read-Only PAN-OS Administrator
An improper privilege management vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-only administrator to revoke active XML API keys from the firewall and disrupt XML API usage.
Affected products: Cloud NGFW, PAN-OS, Prisma Access
Solution: This issue is fixed in PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.11,
paloalto
CVE-2023-38545CRITICALCVSS 9.82023-10-12
CVE-2023-38545 [CRITICAL] CWE-120 Impact of curl and libcurl Vulnerabilities (CVE-2023-38545, CVE-2023-38546)
Impact of curl and libcurl Vulnerabilities (CVE-2023-38545, CVE-2023-38546)
The Palo Alto Networks Product Security Assurance team has evaluated the curl and libcurl vulnerabilities (CVE-2023-38545, CVE-2023-38546) that were disclosed on October 11, 2023 as they relate to our products.
At this time, there are no demonstrated scenarios that enable successful exploitation of these vulner
paloalto
CVE-2023-44487HIGHCVSS 7.5KEVPoC2023-10-11
CVE-2023-44487 [HIGH] CWE-400 Impact of Rapid Reset and HTTP/2 DoS Vulnerabilities (CVE-2023-44487, CVE-2023-35945)
Impact of Rapid Reset and HTTP/2 DoS Vulnerabilities (CVE-2023-44487, CVE-2023-35945)
The Palo Alto Networks Product Security Assurance team is evaluating the recently disclosed denial-of-service (DoS) vulnerabilities in the HTTP/2 protocol including Rapid Reset (CVE-2023-44487) and CVE-2023-35945.
If HTTP/2 inspection is enabled in PAN-OS, an ongoing distributed denial-of-servic
paloalto