First published: Wed Feb 14 2024(Updated: )
A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a malicious authenticated read-write administrator to store a JavaScript payload using the web interface on Panorama appliances. This enables the impersonation of another authenticated administrator.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Palo Alto Networks PAN-OS | >=8.1.0<8.1.24 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.17 | |
Palo Alto Networks PAN-OS | >=9.1.0<9.1.16 | |
Palo Alto Networks PAN-OS | >=10.0.0<10.0.11 | |
Palo Alto Networks PAN-OS | >=10.1.0<10.1.6 | |
Palo Alto Networks PAN-OS | =8.1.24 | |
Any of | ||
Palo Alto Networks Panorama M-200 | ||
Palo Alto Networks Panorama M-500 | ||
Palo Alto Networks Panorama M-600 |
This issue is fixed on Panorama in PAN-OS 8.1.24-h1, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.11, PAN-OS 10.1.6, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0007 is considered a high severity cross-site scripting (XSS) vulnerability.
To address CVE-2024-0007, update your Palo Alto Networks PAN-OS software to the latest version provided by the vendor.
CVE-2024-0007 affects PAN-OS versions from 8.1.0 to 8.1.24, 9.0.0 to 9.0.17, 9.1.0 to 9.1.16, 10.0.0 to 10.0.11, and 10.1.0 to 10.1.6.
A malicious authenticated read-write administrator can exploit CVE-2024-0007 to store a JavaScript payload.
Exploitation of CVE-2024-0007 may allow an attacker to impersonate another authenticated administrator within the system.