First published: Wed Dec 13 2023(Updated: )
An OS command injection vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated API user to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=8.1.0<8.1.24 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.17 | |
Palo Alto Networks PAN-OS | >=9.1.0<9.1.15 | |
Palo Alto Networks PAN-OS | >=10.0.0<10.0.12 | |
Palo Alto Networks PAN-OS | >=10.1.0<10.1.6 |
This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.15, PAN-OS 10.0.12, PAN-OS 10.1.6, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6792 has a high severity rating due to its potential for OS command injection, impacting system processes.
To fix CVE-2023-6792, users should upgrade to the latest patched version of Palo Alto Networks PAN-OS software.
CVE-2023-6792 affects PAN-OS versions 8.1.0 to 8.1.24, 9.0.0 to 9.0.17, 9.1.0 to 9.1.15, 10.0.0 to 10.0.12, and 10.1.0 to 10.1.6.
Yes, CVE-2023-6792 can potentially allow an authenticated API user to execute arbitrary code on the firewall.
CVE-2023-6792 primarily impacts organizations using Palo Alto Networks PAN-OS with authenticated API access.