Show filters
290 Total Results
Displaying 21-30 of 290
Sort by:
Attacker Value
Unknown

CVE-2024-5919

Disclosure Date: November 14, 2024 (last updated January 25, 2025)
A blind XML External Entities (XXE) injection vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker to exfiltrate arbitrary files from firewalls to an attacker controlled server. This attack requires network access to the firewall management interface.
Attacker Value
Unknown

CVE-2024-5917

Disclosure Date: November 14, 2024 (last updated January 25, 2025)
A server-side request forgery in PAN-OS software enables an authenticated attacker with administrative privileges to use the administrative web interface as a proxy, which enables the attacker to view internal network resources not otherwise accessible.
Attacker Value
Unknown

CVE-2024-2552

Disclosure Date: November 14, 2024 (last updated January 25, 2025)
A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions in the management plane and delete files on the firewall.
Attacker Value
Unknown

CVE-2024-2551

Disclosure Date: November 14, 2024 (last updated January 25, 2025)
A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop a core system service on the firewall by sending a crafted packet through the data plane that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.
Attacker Value
Unknown

CVE-2024-2550

Disclosure Date: November 14, 2024 (last updated January 25, 2025)
A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop the GlobalProtect service on the firewall by sending a specially crafted packet that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.
Attacker Value
Unknown

CVE-2024-9473

Disclosure Date: October 09, 2024 (last updated October 16, 2024)
A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offered by the .msi file used to install GlobalProtect.
Attacker Value
Unknown

CVE-2024-9471

Disclosure Date: October 09, 2024 (last updated October 16, 2024)
A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator. For example, an administrator with "Virtual system administrator (read-only)" access could use an XML API key of a "Virtual system administrator" to perform write operations on the virtual system configuration even though they should be limited to read-only operations.
Attacker Value
Unknown

CVE-2024-9469

Disclosure Date: October 09, 2024 (last updated October 16, 2024)
A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity.
Attacker Value
Unknown

CVE-2024-9467

Disclosure Date: October 09, 2024 (last updated October 16, 2024)
A reflected XSS vulnerability in Palo Alto Networks Expedition enables execution of malicious JavaScript in the context of an authenticated Expedition user's browser if that user clicks on a malicious link, allowing phishing attacks that could lead to Expedition browser session theft.
Attacker Value
Unknown

CVE-2024-9466

Disclosure Date: October 09, 2024 (last updated October 16, 2024)
A cleartext storage of sensitive information vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to reveal firewall usernames, passwords, and API keys generated using those credentials.