Skip to main content

The security advisory addresses a critical authentication bypass vulnerability in the management web interface

Summary

The security advisory addresses a critical authentication bypass vulnerability in the management web interface

Affected platforms

The following platforms are known to be affected:

Threat details

Introduction

Palo Alto Networks has issued a critical severity security advisory for an authentication bypass vulnerability, known as CVE-2024-0012, affecting the PAN-OS management web interface. 

CVE-2024-0012 has a CVSSv4 score of 9.3 when access is allowed to the management interface from external IP addresses on the internet. However, if access is restricted to a jump box that is the only system allowed to access the management interface, the CVSSv4 score would be reduced to 5.9. 

An unauthenticated attacker with network access to the management web interface could gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474.

Remediation advice

Affected organisations must review the Palo Alto Networks Security Advisory CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) and apply necessary security updates to remediate against this vulnerability.

To prioritise assets that require action most urgently, use the Palo Alto Networks customer portal to find devices that have an internet-facing management interface, as outlined in the second remediation step below. Additionally, Palo Alto Networks recommend customers follow their guidance on securing access to the management interface to reduce the risk of exploitation. 

Remediation steps

Definitive source of threat updates

CVE Vulnerabilities

Last edited: 18 November 2024 5:03 pm