Latest paloaltonetworks pan-os Vulnerabilities

PAN-OS: OS Command Injection Vulnerability in GlobalProtect
Palo Alto Networks PAN-OS
Paloaltonetworks Pan-os=10.2.0
Paloaltonetworks Pan-os=11.0.0
Paloaltonetworks Pan-os=11.1.0
PAN-OS: XML API Keys Revoked by Read-Only PAN-OS Administrator
Paloaltonetworks Pan-os>=9.1.0<9.1.17
Paloaltonetworks Pan-os>=10.0.0<=10.0.12
Paloaltonetworks Pan-os>=10.1.0<10.1.11
Paloaltonetworks Pan-os>=10.2.0<10.2.5
Paloaltonetworks Pan-os>=11.0.0<11.0.2
PAN-OS: Plaintext Disclosure of External System Integration Credentials
Paloaltonetworks Pan-os>=8.1.0<8.1.24
Paloaltonetworks Pan-os>=9.0.0<9.0.17
Paloaltonetworks Pan-os>=9.1.0<9.1.16
Paloaltonetworks Pan-os>=10.0.0<10.0.12
Paloaltonetworks Pan-os>=10.1.0<10.1.9
Paloaltonetworks Pan-os>=10.2.0<10.2.4
and 1 more
PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in the Web Interface
Paloaltonetworks Pan-os>=8.1.0<8.1.26
Paloaltonetworks Pan-os>=9.0.0<9.0.17
Paloaltonetworks Pan-os>=9.1.0<9.1.17
Paloaltonetworks Pan-os>=10.1.0<10.1.11
Paloaltonetworks Pan-os>=10.2.0<10.2.5
Paloaltonetworks Pan-os>=11.0.0<11.0.2
PAN-OS: OS Command Injection Vulnerability in the Web Interface
Paloaltonetworks Pan-os>=8.1.0<8.1.24
Paloaltonetworks Pan-os>=9.0.0<9.0.17
Paloaltonetworks Pan-os>=9.1.0<9.1.12
Paloaltonetworks Pan-os>=10.0.0<10.0.9
Paloaltonetworks Pan-os>=10.1.0<10.1.3
PAN-OS: File Upload Vulnerability in the Web Interface
Paloaltonetworks Pan-os>=8.1.0<8.1.26
Paloaltonetworks Pan-os>=9.0.0<9.0.17
Paloaltonetworks Pan-os>=9.1.0<9.1.14
PAN-OS: OS Command Injection Vulnerability in the XML API
Paloaltonetworks Pan-os>=8.1.0<8.1.24
Paloaltonetworks Pan-os>=9.0.0<9.0.17
Paloaltonetworks Pan-os>=9.1.0<9.1.15
Paloaltonetworks Pan-os>=10.0.0<10.0.12
Paloaltonetworks Pan-os>=10.1.0<10.1.6
PAN-OS: DOM-Based Cross-Site Scripting (XSS) Vulnerability in the Web Interface
Paloaltonetworks Pan-os>=8.1.0<8.1.25
Paloaltonetworks Pan-os>=9.0.0<9.0.17
Paloaltonetworks Pan-os>=9.1.0<9.1.16
Paloaltonetworks Pan-os>=10.0.0<10.0.12
Paloaltonetworks Pan-os>=10.1.0<10.1.9
Paloaltonetworks Pan-os>=10.2.0<10.2.4
and 1 more
PAN-OS: Read System Files and Resources During Configuration Commit
Paloaltonetworks Pan-os>=10.2.0<10.2.4
Paloaltonetworks Pan-os=11.0.0
A reflected cross-site scripting (XSS) vulnerability in the Captive Portal feature of Palo Alto Networks PAN-OS software can allow a JavaScript payload to be executed in the context of an authenticate...
Paloaltonetworks Pan-os>=8.1.0<=8.1.24
Paloaltonetworks Pan-os>=9.0.0<=9.0.17
Paloaltonetworks Pan-os>=9.1.0<=9.1.16
Paloaltonetworks Pan-os>=10.0.0<=10.0.11
Paloaltonetworks Pan-os>=10.1.0<=10.1.6
Paloaltonetworks Pan-os>=10.2.0<=10.2.2
A file disclosure vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write administrator with access to the web interface to export local files from the firewall through...
Paloaltonetworks Pan-os>=8.1.0<8.1.25
Paloaltonetworks Pan-os>=9.0.0<9.0.17
Paloaltonetworks Pan-os>=9.1.0<9.1.16
Paloaltonetworks Pan-os>=10.0.0<10.0.12
Paloaltonetworks Pan-os>=10.1.0<10.1.10
Paloaltonetworks Pan-os>=10.2.0<10.2.4
and 1 more
A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software on Panorama appliances enables an authenticated read-write administrator to store a JavaScript payload in the web inter...
Paloaltonetworks Pan-os>=8.1.0<8.1.25
Paloaltonetworks Pan-os>=9.0.0<9.0.17
Paloaltonetworks Pan-os>=9.1.0<9.1.16
Paloaltonetworks Pan-os>=10.0.0<10.0.7
Paloaltonetworks Panorama M-200
Paloaltonetworks Panorama M-500
and 1 more
A vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to expose the plaintext values of secrets stored in the device configuration and encrypted API keys.
Paloaltonetworks Pan-os>=8.1.0<8.1.24
Paloaltonetworks Pan-os>=9.0.0<9.0.17
Paloaltonetworks Pan-os>=9.1.0<9.1.15
Paloaltonetworks Pan-os>=10.0.0<10.0.12
Paloaltonetworks Pan-os>=10.1.0<10.1.8
Paloaltonetworks Pan-os>=10.2.0<10.2.3
PAN-OS: Local File Deletion Vulnerability
Paloaltonetworks Pan-os>=8.1.0<8.1.24
Paloaltonetworks Pan-os>=9.0.0<9.0.17
Paloaltonetworks Pan-os>=9.1.0<9.1.15
Paloaltonetworks Pan-os>=10.0.0<10.0.11
Paloaltonetworks Pan-os>=10.1.0<10.1.6
Fedoraproject Fedora=37
and 2 more
An authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface allows a network-based attacker with specific knowledge of the target firewall or Panorama appliance to impers...
Paloaltonetworks Pan-os>=8.1.0<8.1.24
Palo Alto Networks PAN-OS Reflected Amplification Denial-of-Service Vulnerability
Paloaltonetworks Pan-os>=8.1<8.1.23-h1
Paloaltonetworks Pan-os>=9.0<9.0.16-h3
Paloaltonetworks Pan-os>=9.1<9.1.14-h4
Paloaltonetworks Pan-os>=10.0<10.0.11-h1
Paloaltonetworks Pan-os>=10.1<10.1.6-h6
Paloaltonetworks Pan-os>=10.2<10.2.2-h2
and 1 more
A vulnerability exists in Palo Alto Networks PAN-OS software that enables an authenticated network-based PAN-OS administrator to upload a specifically created configuration that disrupts system proces...
Paloaltonetworks Pan-os>=8.1.0<8.1.23
Paloaltonetworks Pan-os>=9.0.0<9.0.16
Paloaltonetworks Pan-os>=9.1.0<9.1.13
Paloaltonetworks Pan-os>=10.0.0<10.0.10
Paloaltonetworks Pan-os>=10.1.0<10.1.5
An improper handling of exceptional conditions vulnerability exists in the DNS proxy feature of Palo Alto Networks PAN-OS software that enables a meddler-in-the-middle (MITM) to send specifically craf...
Paloaltonetworks Pan-os>=8.1.0<8.1.22
Paloaltonetworks Pan-os>=9.0.0<9.0.16
Paloaltonetworks Pan-os>=9.1.0<9.1.13
Paloaltonetworks Pan-os>=10.0.0<10.0.10
Paloaltonetworks Pan-os>=10.1.0<10.1.5
Usage of a weak cryptographic algorithm in Palo Alto Networks PAN-OS software where the password hashes of administrator and local user accounts are not created with a sufficient level of computationa...
Paloaltonetworks Pan-os>=8.1.0<8.1.21
Paloaltonetworks Pan-os>=9.0.0<=9.0.15
Paloaltonetworks Pan-os>=9.1.0<9.1.11
Paloaltonetworks Pan-os>=10.0.0<10.0.7
PAN-OS software provides options to exclude specific websites from URL category enforcement and those websites are blocked or allowed (depending on your rules) regardless of their associated URL categ...
Paloaltonetworks Pan-os>=8.1.0<8.1.21
Paloaltonetworks Pan-os>=9.0.0<=9.0.15
Paloaltonetworks Pan-os>=9.1.0<9.1.12
Paloaltonetworks Pan-os>=10.0.0<10.0.8
Paloaltonetworks Pan-os>=10.1.0<10.1.3
Paloaltonetworks Prisma Access=2.1
and 2 more
A memory corruption vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to disrupt system processes and potent...
Paloaltonetworks Pan-os>=8.1.0<8.1.17
An improper access control vulnerability in PAN-OS software enables an attacker with authenticated access to GlobalProtect portals and gateways to connect to the EC2 instance metadata endpoint for VM-...
Paloaltonetworks Pan-os>=8.1.0<8.1.20
Paloaltonetworks Pan-os>=9.0.0<9.0.14
Paloaltonetworks Pan-os>=9.1.0<9.1.11
Paloaltonetworks Pan-os>=10.0.0<10.0.8
Paloaltonetworks Vm-series Firewall
An improper handling of exceptional conditions vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to send spe...
Paloaltonetworks Pan-os>=8.1.0<8.1.21
Paloaltonetworks Pan-os>=9.0.0<=9.0.14
Paloaltonetworks Pan-os>=9.1.0<=9.1.11
Paloaltonetworks Pan-os>=10.0.0<=10.0.8
Paloaltonetworks Pan-os>=10.1.0<10.1.3
An OS command injection vulnerability in the Simple Certificate Enrollment Protocol (SCEP) feature of PAN-OS software allows an unauthenticated network-based attacker with specific knowledge of the fi...
Paloaltonetworks Prisma Access=2.1
Paloaltonetworks Prisma Access=2.1
Paloaltonetworks Pan-os>=8.1.0<=8.1.20
Paloaltonetworks Pan-os>=9.0.0<=9.0.14
Paloaltonetworks Pan-os>=9.1.0<=9.1.11
Paloaltonetworks Pan-os>=10.0.0<10.0.8
and 1 more
An OS command injection vulnerability in the Palo Alto Networks PAN-OS management interface exists when performing dynamic updates. This vulnerability enables a man-in-the-middle attacker to execute a...
Paloaltonetworks Pan-os>=8.1.0<=8.1.20
Paloaltonetworks Pan-os>=9.0.0<=9.0.14
Paloaltonetworks Pan-os>=9.1.0<=9.1.11
Paloaltonetworks Pan-os>=10.0.0<10.0.8
Paloaltonetworks Pan-os>=10.1.0<10.1.3
An OS command injection vulnerability in the Palo Alto Networks PAN-OS command line interface (CLI) enables an authenticated administrator with access to the CLI to execute arbitrary OS commands to es...
Paloaltonetworks Prisma Access=2.1
Paloaltonetworks Prisma Access=2.1
Paloaltonetworks Pan-os>=8.1.0<=8.1.20
Paloaltonetworks Pan-os>=9.0.0<=9.0.14
Paloaltonetworks Pan-os>=9.1.0<=9.1.11
Paloaltonetworks Pan-os>=10.0.0<10.0.8
and 1 more
A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables an authenticated attacker to execute arbitrary code with root user privileges during SAML authentica...
Paloaltonetworks Pan-os>=8.1.0<8.1.20
Paloaltonetworks Pan-os>=9.0.0<9.0.14
Paloaltonetworks Pan-os>=9.1.0<9.1.9
Paloaltonetworks Pan-os=10.0.0
An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permissions to use XML API the ability to execute arbitrary OS commands...
Paloaltonetworks Pan-os>=8.1.0<=8.1.20
Paloaltonetworks Pan-os>=9.0.0<=9.0.14
Paloaltonetworks Pan-os>=9.1.0<=9.1.11
Paloaltonetworks Pan-os>=10.0.0<10.0.8
Paloaltonetworks Pan-os>=10.1.0<10.1.3
A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permission to upload plugins to execute ...
Paloaltonetworks Pan-os>=8.1.0<8.1.20
Paloaltonetworks Pan-os>=9.0.0<9.0.14
Paloaltonetworks Pan-os>=9.1.0<9.1.11
Paloaltonetworks Pan-os>=10.0.0<10.0.7
Paloaltonetworks Pan-os>=10.1.0<10.1.2
An improper handling of exceptional conditions vulnerability exists in the Palo Alto Networks PAN-OS dataplane that enables an unauthenticated network-based attacker to send specifically crafted traff...
Paloaltonetworks Pan-os>=8.1.0<8.1.20
Paloaltonetworks Pan-os>=9.0.0<9.0.14
Paloaltonetworks Pan-os>=9.1.0<9.1.9
Paloaltonetworks Pan-os>=10.0.0<10.0.5
An improper restriction of XML external entity (XXE) reference vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to read any arbitrary file from the f...
Paloaltonetworks Pan-os>=8.1.0<8.1.20
Paloaltonetworks Pan-os>=9.0.0<9.0.14
Paloaltonetworks Pan-os>=9.1.0<9.1.10
Paloaltonetworks Pan-os>=10.0.0<10.0.6
An OS command argument injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to read any arbitrary file from the file system. This issue impacts...
Paloaltonetworks Pan-os>=8.1.0<8.1.19
Paloaltonetworks Pan-os>=9.0.0<9.0.14
Paloaltonetworks Pan-os>=9.1.0<9.1.10
A cryptographically weak pseudo-random number generator (PRNG) is used during authentication to the Palo Alto Networks PAN-OS web interface. This enables an authenticated attacker, with the capability...
Paloaltonetworks Pan-os>=8.1.0<8.1.19
Paloaltonetworks Pan-os>=9.0.0<9.0.14
Paloaltonetworks Pan-os>=9.1.0<9.1.10
Paloaltonetworks Pan-os>=10.0.0<10.0.4
Certain invalid URL entries contained in an External Dynamic List (EDL) cause the Device Server daemon (devsrvr) to stop responding. This condition causes subsequent commits on the firewall to fail an...
Paloaltonetworks Pan-os>=9.0.0<9.0.14
Paloaltonetworks Pan-os>=9.1.0<9.1.9
Paloaltonetworks Pan-os>=10.0.0<10.0.5
An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to execute arbitrary OS commands to escalate privileges. This issue impacts:...
Paloaltonetworks Pan-os>=9.0.0<9.0.15
Paloaltonetworks Pan-os>=9.1.0<9.1.11
Paloaltonetworks Pan-os>=10.0.0<10.0.8
Paloaltonetworks Pan-os>=10.1.0<10.1.2
An improper authentication vulnerability exists in Palo Alto Networks PAN-OS software that enables a SAML authenticated attacker to impersonate any other user in the GlobalProtect Portal and GlobalPro...
Paloaltonetworks Pan-os>=8.1.0<8.1.19
Paloaltonetworks Pan-os>=9.0.0<9.0.14
Paloaltonetworks Pan-os>=9.1.0<9.1.9
Paloaltonetworks Pan-os>=10.0.0<10.0.5
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API...
Paloaltonetworks Pan-os>=8.1.0<8.1.19
Paloaltonetworks Pan-os>=9.0.0<9.0.12
Paloaltonetworks Pan-os>=9.1.0<9.1.6
Paloaltonetworks Pan-os>=10.0.0<10.0.1
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged ...
Paloaltonetworks Pan-os>=8.1.0<8.1.19
Paloaltonetworks Pan-os>=9.0.0<9.0.13
Paloaltonetworks Pan-os>=9.1.0<9.1.4
Padding bytes in Ethernet packets on PA-200, PA-220, PA-500, PA-800, PA-2000 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series firewalls are not cleared before the data frame ...
Paloaltonetworks Pan-os>=8.1.0<8.1.18
Paloaltonetworks Pan-os>=9.0.0<9.0.12
Paloaltonetworks Pan-os>=9.1.0<9.1.5
Paloaltonetworks Pa-200
Paloaltonetworks Pa-2020
Paloaltonetworks Pa-2050
and 10 more
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where configuration secrets for the “http”, “email”, and “snmptrap” v3 log forwarding server profile...
Paloaltonetworks Pan-os>=8.1.0<8.1.18
Paloaltonetworks Pan-os>=9.0.0<9.0.12
Paloaltonetworks Pan-os>=9.1.0<9.1.4
Paloaltonetworks Pan-os>=10.0.0<10.0.1
An information exposure through log file vulnerability exists where the password for the configured system proxy server for a PAN-OS appliance may be displayed in cleartext when using the CLI in Palo ...
Paloaltonetworks Pan-os>=8.1.0<8.1.17
Paloaltonetworks Pan-os>=9.0.0<9.0.11
Paloaltonetworks Pan-os>=9.1.0<9.1.2
An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an attacker to bypass all client certificate checks with an inval...
Paloaltonetworks Pan-os>=8.1.0<8.1.17
Paloaltonetworks Pan-os>=9.0.0<9.0.11
Paloaltonetworks Pan-os>=9.1.0<9.1.5
Paloaltonetworks Pan-os>=10.0.0<10.0.1
An information exposure vulnerability exists in Palo Alto Networks Panorama software that discloses the token for the Panorama web interface administrator's session to a managed device when the Panora...
Paloaltonetworks Pan-os>=8.1.0<8.1.17
Paloaltonetworks Pan-os>=9.0.0<9.0.11
Paloaltonetworks Pan-os>=9.1.0<9.1.5
An OS command injection and memory corruption vulnerability in the PAN-OS management web interface that allows authenticated administrators to disrupt system processes and potentially execute arbitrar...
Paloaltonetworks Pan-os>=8.1.0<8.1.16
Paloaltonetworks Pan-os>=9.0.0<9.0.10
Paloaltonetworks Pan-os>=9.1.0<9.1.4
Paloaltonetworks Pan-os>=10.0.0<10.0.1
A vulnerability exists in the Palo Alto Network PAN-OS signature-based threat detection engine that allows an attacker to communicate with devices in the network in a way that is not analyzed for thre...
Paloaltonetworks Pan-os>=7.1.0<=7.1.26
Paloaltonetworks Pan-os>=8.0.0<=8.0.20
Paloaltonetworks Pan-os>=8.1.0<8.1.17
Paloaltonetworks Pan-os>=9.0.0<9.0.11
Paloaltonetworks Pan-os>=9.1.0<9.1.5
An information exposure through log file vulnerability where sensitive fields are recorded in the configuration log without masking on Palo Alto Networks PAN-OS software when the after-change-detail c...
Paloaltonetworks Pan-os>=8.1.0<=8.1.15
Paloaltonetworks Pan-os>=9.0.0<9.0.10
Paloaltonetworks Pan-os>=9.1.0<9.1.4
An information exposure through log file vulnerability where an administrator's password or other sensitive information may be logged in cleartext while using the CLI in Palo Alto Networks PAN-OS soft...
Paloaltonetworks Pan-os>=8.0.0<=8.0.20
Paloaltonetworks Pan-os>=8.1.0<8.1.16
Paloaltonetworks Pan-os>=9.0.0<9.0.10
Paloaltonetworks Pan-os>=9.1.0<9.1.3
A buffer overflow vulnerability in the PAN-OS management web interface allows authenticated administrators to disrupt system processes and potentially execute arbitrary code with root privileges. This...
Paloaltonetworks Pan-os>=10.0.0<10.0.1
A reflected cross-site scripting (XSS) vulnerability exists in the PAN-OS management web interface. A remote attacker able to convince an administrator with an active authenticated session on the fire...
Paloaltonetworks Pan-os>=8.1.0<8.1.16
Paloaltonetworks Pan-os>=9.0.0<9.0.9
Paloaltonetworks Pan-os>=9.0.0<9.0.10
Paloaltonetworks Pan-os>=9.1.0<9.1.4
Paloaltonetworks Pan-os>=10.0.0<10.0.1

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203