Show filters
291 Total Results
Displaying 41-50 of 291
Sort by:
Attacker Value
Unknown
CVE-2024-5913
Disclosure Date: July 10, 2024 (last updated January 25, 2025)
An improper input validation vulnerability in Palo Alto Networks PAN-OS software enables an attacker with the ability to tamper with the physical file system to elevate privileges.
0
Attacker Value
Unknown
CVE-2024-5909
Disclosure Date: June 12, 2024 (last updated August 08, 2024)
A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a low privileged local Windows user to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity.
0
Attacker Value
Unknown
CVE-2024-5908
Disclosure Date: June 12, 2024 (last updated August 08, 2024)
A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs.
0
Attacker Value
Unknown
CVE-2024-5907
Disclosure Date: June 12, 2024 (last updated August 08, 2024)
A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit.
0
Attacker Value
Unknown
CVE-2024-5906
Disclosure Date: June 12, 2024 (last updated August 08, 2024)
A cross-site scripting (XSS) vulnerability in Palo Alto Networks Prisma Cloud Compute software enables a malicious administrator with add/edit permissions for identity providers to store a JavaScript payload using the web interface on Prisma Cloud Compute. This enables a malicious administrator to perform actions in the context of another user's browser when accessed by that other user.
0
Attacker Value
Unknown
CVE-2024-5905
Disclosure Date: June 12, 2024 (last updated August 08, 2024)
A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local low privileged Windows user to disrupt some functionality of the agent. However, they are not able to disrupt Cortex XDR agent protection mechanisms using this vulnerability.
0
Attacker Value
Unknown
CVE-2024-3661
Disclosure Date: May 06, 2024 (last updated January 16, 2025)
DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
0
Attacker Value
Unknown
CVE-2024-3388
Disclosure Date: April 10, 2024 (last updated January 25, 2025)
A vulnerability in the GlobalProtect Gateway in Palo Alto Networks PAN-OS software enables an authenticated attacker to impersonate another user and send network packets to internal assets. However, this vulnerability does not allow the attacker to receive response packets from those internal assets.
0
Attacker Value
Unknown
CVE-2024-3386
Disclosure Date: April 10, 2024 (last updated January 25, 2025)
An incorrect string comparison vulnerability in Palo Alto Networks PAN-OS software prevents Predefined Decryption Exclusions from functioning as intended. This can cause traffic destined for domains that are not specified in Predefined Decryption Exclusions to be unintentionally excluded from decryption.
0
Attacker Value
Unknown
CVE-2024-3385
Disclosure Date: April 10, 2024 (last updated January 25, 2025)
A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.
This affects the following hardware firewall models:
- PA-5400 Series firewalls
- PA-7000 Series firewalls
0