First published: Wed Dec 13 2023(Updated: )
An improper privilege management vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-only administrator to revoke active XML API keys from the firewall and disrupt XML API usage.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=9.1.0<9.1.17 | |
Palo Alto Networks PAN-OS | >=10.0.0<=10.0.12 | |
Palo Alto Networks PAN-OS | >=10.1.0<10.1.11 | |
Palo Alto Networks PAN-OS | >=10.2.0<10.2.5 | |
Palo Alto Networks PAN-OS | >=11.0.0<11.0.2 |
This issue is fixed in PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.11, PAN-OS 10.2.5, PAN-OS 11.0.2, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6793 has been categorized with a medium severity level due to its impact on legitimate administrative actions.
To fix CVE-2023-6793, upgrade your Palo Alto Networks PAN-OS to a version that is not affected, such as 9.1.18 or later versions in the 10.x and 11.x series.
CVE-2023-6793 affects organizations using affected versions of Palo Alto Networks PAN-OS, specifically authenticated read-only administrators.
The potential impact of CVE-2023-6793 includes disruption of XML API usage by allowing a read-only admin to revoke active API keys.
CVE-2023-6793 cannot be exploited remotely since it requires authentication as a read-only administrator.