The security advisory addresses a critical authentication bypass vulnerability in the management web interface
Summary
The security advisory addresses a critical authentication bypass vulnerability in the management web interface
Affected platforms
The following platforms are known to be affected:
Threat details
Introduction
Palo Alto Networks has issued a critical severity security advisory for an authentication bypass vulnerability, known as CVE-2024-0012, affecting the PAN-OS management web interface.
CVE-2024-0012 has a CVSSv4 score of 9.3 when access is allowed to the management interface from external IP addresses on the internet. However, if access is restricted to a jump box that is the only system allowed to access the management interface, the CVSSv4 score would be reduced to 5.9.
An unauthenticated attacker with network access to the management web interface could gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474.
Remediation advice
Affected organisations must review the Palo Alto Networks Security Advisory CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) and apply necessary security updates to remediate against this vulnerability.
To prioritise assets that require action most urgently, use the Palo Alto Networks customer portal to find devices that have an internet-facing management interface, as outlined in the second remediation step below. Additionally, Palo Alto Networks recommend customers follow their guidance on securing access to the management interface to reduce the risk of exploitation.
Remediation steps
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 18 November 2024 5:03 pm