First published: Wed Feb 14 2024(Updated: )
A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a malicious authenticated read-write administrator to store a JavaScript payload using the web interface on Panorama appliances. This enables the impersonation of another authenticated administrator.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Paloaltonetworks Pan-os | >=8.1.0<8.1.24 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.17 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.16 | |
Paloaltonetworks Pan-os | >=10.0.0<10.0.11 | |
Paloaltonetworks Pan-os | >=10.1.0<10.1.6 | |
Paloaltonetworks Pan-os | =8.1.24 | |
Any of | ||
Paloaltonetworks Panorama M-200 | ||
Paloaltonetworks Panorama M-500 | ||
Paloaltonetworks Panorama M-600 |
This issue is fixed on Panorama in PAN-OS 8.1.24-h1, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.11, PAN-OS 10.1.6, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.