First published: Wed Oct 12 2022(Updated: )
An authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface allows a network-based attacker with specific knowledge of the target firewall or Panorama appliance to impersonate an existing PAN-OS administrator and perform privileged actions.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=8.1.0<8.1.24 |
This issue is fixed in PAN-OS 8.1.24 and all later PAN-OS versions. Please note that PAN-OS 8.1 has reached its software end-of-life (EoL) and is supported only on PA-200, PA-500, and PA-5000 Series firewalls and on M-100 appliances and only until each of their respective hardware EoL dates: https://www.paloaltonetworks.com/services/support/end-of-life-announcements/hardware-end-of-life-dates.html.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0030 is an authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface.
CVE-2022-0030 affects Palo Alto Networks PAN-OS 8.1 versions between 8.1.0 and 8.1.24.
CVE-2022-0030 has a severity rating of high (8.1).
An attacker with specific knowledge of the target firewall or Panorama appliance can impersonate an existing PAN-OS administrator and perform privileged actions.
Yes, Palo Alto Networks has released a security advisory with mitigation steps for CVE-2022-0030. Please refer to the official reference for more details.