First published: Wed Dec 13 2023(Updated: )
A DOM-Based cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to execute a JavaScript payload in the context of an administrator’s browser when they view a specifically crafted link to the PAN-OS web interface.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=8.1.0<8.1.25 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.17 | |
Palo Alto Networks PAN-OS | >=9.1.0<9.1.16 | |
Palo Alto Networks PAN-OS | >=10.0.0<10.0.12 | |
Palo Alto Networks PAN-OS | >=10.1.0<10.1.9 | |
Palo Alto Networks PAN-OS | >=10.2.0<10.2.4 | |
Palo Alto Networks PAN-OS | =11.0.0 |
This issue is fixed in PAN-OS 8.1.25, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.12, PAN-OS 10.1.9, PAN-OS 10.2.4, PAN-OS 11.0.1, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6790 is a high severity DOM-based cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software.
To fix CVE-2023-6790, update the PAN-OS software to versions 8.1.26, 9.0.18, 9.1.17, 10.0.13, 10.1.10, 10.2.5, or 11.0.1, as applicable.
CVE-2023-6790 affects Palo Alto Networks PAN-OS versions 8.1.0 to 8.1.25, 9.0.0 to 9.0.17, 9.1.0 to 9.1.16, 10.0.0 to 10.0.12, 10.1.0 to 10.1.9, 10.2.0 to 10.2.4, and 11.0.0.
CVE-2023-6790 enables a remote attacker to execute a JavaScript payload in an administrator's browser via a specially crafted link.
Administrators using the affected versions of Palo Alto Networks PAN-OS software are primarily at risk from CVE-2023-6790.