Paloaltonetworks PAN-OS vulnerabilities
209 known vulnerabilities affecting paloaltonetworks/pan-os.
Total CVEs
209
CISA KEV
12
actively exploited
Public exploits
14
Exploited in wild
9
Severity breakdown
CRITICAL33HIGH75MEDIUM93LOW8
Vulnerabilities
Page 4 of 11
CVE-2022-0011MEDIUMCVSS 6.5≥ 8.1.0, < 8.1.21≥ 9.0.0, ≤ 9.0.15+3 more2022-02-10
CVE-2022-0011 [MEDIUM] CWE-436 CVE-2022-0011: PAN-OS software provides options to exclude specific websites from URL category enforcement and thos
PAN-OS software provides options to exclude specific websites from URL category enforcement and those websites are blocked or allowed (depending on your rules) regardless of their associated URL category. This is done by creating a custom URL category list or by using an external dynamic list (EDL) in a URL Filtering profile. When the entries in these
nvd
CVE-2021-3064CRITICALCVSS 9.8≥ 8.1.0, < 8.1.172021-11-10
CVE-2021-3064 [CRITICAL] CWE-121 CVE-2021-3064: A memory corruption vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway inte
A memory corruption vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to disrupt system processes and potentially execute arbitrary code with root privileges. The attacker must have network access to the GlobalProtect interface to exploit this issue. This iss
nvd
CVE-2021-3059HIGHCVSS 8.1≥ 8.1.0, ≤ 8.1.20≥ 9.0.0, ≤ 9.0.14+3 more2021-11-10
CVE-2021-3059 [HIGH] CWE-78 CVE-2021-3059: An OS command injection vulnerability in the Palo Alto Networks PAN-OS management interface exists w
An OS command injection vulnerability in the Palo Alto Networks PAN-OS management interface exists when performing dynamic updates. This vulnerability enables a man-in-the-middle attacker to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS
nvd
CVE-2021-3058HIGHCVSS 7.2≥ 8.1.0, ≤ 8.1.20≥ 9.0.0, ≤ 9.0.14+3 more2021-11-10
CVE-2021-3058 [HIGH] CWE-78 CVE-2021-3058: An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an auth
An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permissions to use XML API the ability to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3; PAN-OS 9.
nvd
CVE-2021-3056HIGHCVSS 8.8≥ 8.1.0, < 8.1.20≥ 9.0.0, < 9.0.14+2 more2021-11-10
CVE-2021-3056 [HIGH] CWE-120 CVE-2021-3056: A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables
A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables an authenticated attacker to execute arbitrary code with root user privileges during SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than P
nvd
CVE-2021-3063HIGHCVSS 7.5≥ 8.1.0, < 8.1.21≥ 9.0.0, ≤ 9.0.14+3 more2021-11-10
CVE-2021-3063 [HIGH] CWE-755 CVE-2021-3063: An improper handling of exceptional conditions vulnerability exists in Palo Alto Networks GlobalProt
An improper handling of exceptional conditions vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to send specifically crafted traffic to a GlobalProtect interface that causes the service to stop responding. Repeated attempts to send this request result in denial
nvd
CVE-2021-3062HIGHCVSS 8.8≥ 8.1.0, < 8.1.20≥ 9.0.0, < 9.0.14+2 more2021-11-10
CVE-2021-3062 [HIGH] CWE-284 CVE-2021-3062: An improper access control vulnerability in PAN-OS software enables an attacker with authenticated a
An improper access control vulnerability in PAN-OS software enables an attacker with authenticated access to GlobalProtect portals and gateways to connect to the EC2 instance metadata endpoint for VM-Series firewalls hosted on Amazon AWS. Exploitation of this vulnerability enables an attacker to perform any operations allowed by the EC2 role in AWS. Thi
nvd
CVE-2021-3061HIGHCVSS 7.2≥ 8.1.0, ≤ 8.1.20≥ 9.0.0, ≤ 9.0.14+3 more2021-11-10
CVE-2021-3061 [HIGH] CWE-78 CVE-2021-3061: An OS command injection vulnerability in the Palo Alto Networks PAN-OS command line interface (CLI)
An OS command injection vulnerability in the Palo Alto Networks PAN-OS command line interface (CLI) enables an authenticated administrator with access to the CLI to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3; PAN-OS 9.1 versi
nvd
CVE-2021-3060HIGHCVSS 8.1≥ 8.1.0, ≤ 8.1.20≥ 9.0.0, ≤ 9.0.14+3 more2021-11-10
CVE-2021-3060 [HIGH] CWE-78 CVE-2021-3060: An OS command injection vulnerability in the Simple Certificate Enrollment Protocol (SCEP) feature o
An OS command injection vulnerability in the Simple Certificate Enrollment Protocol (SCEP) feature of PAN-OS software allows an unauthenticated network-based attacker with specific knowledge of the firewall configuration to execute arbitrary code with root user privileges. The attacker must have network access to the GlobalProtect interfaces to exploit t
nvd
CVE-2021-3053HIGHCVSS 7.5≥ 8.1.0, < 8.1.20≥ 9.0.0, < 9.0.14+2 more2021-09-08
CVE-2021-3053 [HIGH] CWE-755 CVE-2021-3053: An improper handling of exceptional conditions vulnerability exists in the Palo Alto Networks PAN-OS
An improper handling of exceptional conditions vulnerability exists in the Palo Alto Networks PAN-OS dataplane that enables an unauthenticated network-based attacker to send specifically crafted traffic through the firewall that causes the service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by rest
nvd
CVE-2021-3055MEDIUMCVSS 6.5≥ 8.1.0, < 8.1.20≥ 9.0.0, < 9.0.14+2 more2021-09-08
CVE-2021-3055 [MEDIUM] CWE-611 CVE-2021-3055: An improper restriction of XML external entity (XXE) reference vulnerability in the Palo Alto Networ
An improper restriction of XML external entity (XXE) reference vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to read any arbitrary file from the file system and send a specifically crafted request to the firewall that causes the service to crash. Repeated attempts to send this request result in den
nvd
CVE-2021-3052MEDIUMCVSS 5.4≥ 8.1.0, < 8.1.20≥ 9.0.0, < 9.0.14+2 more2021-09-08
CVE-2021-3052 [MEDIUM] CWE-79 CVE-2021-3052: A reflected cross-site scripting (XSS) vulnerability in the Palo Alto Network PAN-OS web interface e
A reflected cross-site scripting (XSS) vulnerability in the Palo Alto Network PAN-OS web interface enables an authenticated network-based attacker to mislead another authenticated PAN-OS administrator to click on a specially crafted link that performs arbitrary actions in the PAN-OS web interface as the targeted authenticated administrator. This issue
nvd
CVE-2021-3054MEDIUMCVSS 6.6≥ 8.1.0, < 8.1.20≥ 9.0.0, < 9.0.14+3 more2021-09-08
CVE-2021-3054 [MEDIUM] CWE-367 CVE-2021-3054: A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-O
A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permission to upload plugins to execute arbitrary code with root user privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0
nvd
CVE-2021-3050HIGHCVSS 8.8≥ 9.0.0, < 9.0.15≥ 9.1.0, < 9.1.11+2 more2021-08-11
CVE-2021-3050 [HIGH] CWE-78 CVE-2021-3050: An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an auth
An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 9.0 version 9.0.10 through PAN-OS 9.0.14; PAN-OS 9.1 version 9.1.4 through PAN-OS 9.1.10; PAN-OS 10.0 version 10.0.7 and earlier PAN-OS 10.0 version
nvd
CVE-2021-3045MEDIUMCVSS 4.9≥ 8.1.0, < 8.1.19≥ 9.0.0, < 9.0.14+1 more2021-08-11
CVE-2021-3045 [MEDIUM] CWE-88 CVE-2021-3045: An OS command argument injection vulnerability in the Palo Alto Networks PAN-OS web interface enable
An OS command argument injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to read any arbitrary file from the file system. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.19; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.10. PAN-OS 1
nvd
CVE-2021-3046MEDIUMCVSS 6.5≥ 8.1.0, < 8.1.19≥ 9.0.0, < 9.0.14+2 more2021-08-11
CVE-2021-3046 [MEDIUM] CWE-287 CVE-2021-3046: An improper authentication vulnerability exists in Palo Alto Networks PAN-OS software that enables a
An improper authentication vulnerability exists in Palo Alto Networks PAN-OS software that enables a SAML authenticated attacker to impersonate any other user in the GlobalProtect Portal and GlobalProtect Gateway when they are configured to use SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.19; PAN-OS 9.0 versions
nvd
CVE-2021-3048MEDIUMCVSS 5.9≥ 9.0.0, < 9.0.14≥ 9.1.0, < 9.1.9+1 more2021-08-11
CVE-2021-3048 [MEDIUM] CWE-20 CVE-2021-3048: Certain invalid URL entries contained in an External Dynamic List (EDL) cause the Device Server daem
Certain invalid URL entries contained in an External Dynamic List (EDL) cause the Device Server daemon (devsrvr) to stop responding. This condition causes subsequent commits on the firewall to fail and prevents administrators from performing commits and configuration changes even though the firewall remains otherwise functional. If the firewall then re
nvd
CVE-2021-3047LOWCVSS 3.1≥ 8.1.0, < 8.1.19≥ 9.0.0, < 9.0.14+2 more2021-08-11
CVE-2021-3047 [LOW] CWE-338 CVE-2021-3047: A cryptographically weak pseudo-random number generator (PRNG) is used during authentication to the
A cryptographically weak pseudo-random number generator (PRNG) is used during authentication to the Palo Alto Networks PAN-OS web interface. This enables an authenticated attacker, with the capability to observe their own authentication secrets over a long duration on the PAN-OS appliance, to impersonate another authenticated web interface administrator's
nvd
CVE-2021-3036MEDIUMCVSS 4.4≥ 8.1.0, < 8.1.19≥ 9.0.0, < 9.0.12+2 more2021-04-20
CVE-2021-3036 [MEDIUM] CWE-532 CVE-2021-3036: An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to use the PAN-OS XML API and exists only when a client inc
nvd
CVE-2021-3037LOWCVSS 2.3≥ 8.1.0, < 8.1.19≥ 9.0.0, < 9.0.13+1 more2021-04-20
CVE-2021-3037 [LOW] CWE-534 CVE-2021-3037: An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS configuration to the destination server.
nvd