Home

Description

A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator. For example, an administrator with "Virtual system administrator (read-only)" access could use an XML API key of a "Virtual system administrator" to perform write operations on the virtual system configuration even though they should be limited to read-only operations.

PUBLISHED Reserved 2024-10-03 | Published 2024-10-09 | Updated 2024-10-18 | Assigner palo_alto




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/AU:N/R:A/V:D/RE:L/U:Green

Problem types

CWE-269 Improper Privilege Management

Product status

Default status
unaffected

11.1.0
unaffected

11.0.0 before 11.0.3
affected

10.1.0 before 10.1.11
affected

10.2.0 before 10.2.8
affected

9.1
affected

9.0
affected

Default status
unaffected

All
unaffected

Default status
unaffected

All
unaffected

Timeline

2024-10-09:Initial publication

Credits

Palo Alto Networks thanks an external reporter for discovering and reporting this issue. finder

References

security.paloaltonetworks.com/CVE-2024-9471 vendor-advisory

cve.org (CVE-2024-9471)

nvd.nist.gov (CVE-2024-9471)

Download JSON