First published: Wed Dec 13 2023(Updated: )
An OS command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=8.1.0<8.1.24 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.17 | |
Palo Alto Networks PAN-OS | >=9.1.0<9.1.12 | |
Palo Alto Networks PAN-OS | >=10.0.0<10.0.9 | |
Palo Alto Networks PAN-OS | >=10.1.0<10.1.3 |
This issue is fixed in PAN-OS 8.1.24-h1, PAN-OS 9.0.17, PAN-OS 9.1.12, PAN-OS 10.0.9, PAN-OS 10.1.3, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6795 is considered a critical vulnerability due to its potential to allow authenticated administrators to execute arbitrary code on affected systems.
CVE-2023-6795 affects PAN-OS versions 8.1.0 to 8.1.24, 9.0.0 to 9.0.17, 9.1.0 to 9.1.12, 10.0.0 to 10.0.9, and 10.1.0 to 10.1.3.
To fix CVE-2023-6795, you should upgrade your PAN-OS software to the latest patched version provided by Palo Alto Networks.
CVE-2023-6795 can be exploited by authenticated administrators with limited privileges on the affected firewall.
The impact of CVE-2023-6795 includes potential disruption of system processes and execution of arbitrary code, which could compromise the security of the firewall.