We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-9471

PAN-OS: Privilege Escalation (PE) Vulnerability in XML API



Description

A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator. For example, an administrator with "Virtual system administrator (read-only)" access could use an XML API key of a "Virtual system administrator" to perform write operations on the virtual system configuration even though they should be limited to read-only operations.

Reserved 2024-10-03 | Published 2024-10-09 | Updated 2024-10-18 | Assigner palo_alto


MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/AU:N/R:A/V:D/RE:L/U:Green

Problem types

CWE-269 Improper Privilege Management

Product status

Default status
unaffected

11.1.0
unaffected

11.0.0 before 11.0.3
affected

10.1.0 before 10.1.11
affected

10.2.0 before 10.2.8
affected

9.1
affected

9.0
affected

Default status
unaffected

All
unaffected

Default status
unaffected

All
unaffected

Timeline

2024-10-09:Initial publication

Credits

Palo Alto Networks thanks an external reporter for discovering and reporting this issue. finder

References

security.paloaltonetworks.com/CVE-2024-9471 vendor-advisory

cve.org (CVE-2024-9471)

nvd.nist.gov (CVE-2024-9471)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-9471

Support options

Helpdesk Chat, Email, Knowledgebase