First published: Wed Feb 14 2024(Updated: )
Web sessions in the management interface in Palo Alto Networks PAN-OS software do not expire in certain situations, making it susceptible to unauthorized access.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=10.2.0<10.2.5 | |
Palo Alto Networks PAN-OS | >=11.0.0<11.0.2 | |
Palo Alto Networks PAN-OS | >=10.1.0<10.1.10 | |
Palo Alto Networks PAN-OS | =10.1.10 | |
Palo Alto Networks PAN-OS | >=10.0.0<10.0.12 | |
Palo Alto Networks PAN-OS | =10.0.12 | |
Palo Alto Networks PAN-OS | >=9.1.0<9.1.17 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.17 | |
Palo Alto Networks PAN-OS | =9.0.17 | |
Palo Alto Networks PAN-OS | =9.0.17-h1 |
This issue is fixed in PAN-OS 9.0.17-h2, PAN-OS 9.1.17, PAN-OS 10.0.12-h1, PAN-OS 10.1.10-h1, PAN-OS 10.2.5, PAN-OS 11.0.2, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-0008 is considered high due to the risk of unauthorized access to web sessions in the management interface.
To fix CVE-2024-0008, upgrade your Palo Alto Networks PAN-OS software to the latest version that addresses this vulnerability.
CVE-2024-0008 affects Palo Alto Networks PAN-OS versions 9.0.0 to 9.0.17, 10.0.0 to 10.2.5, and 11.0.0 to 11.0.2.
The potential risks of CVE-2024-0008 include unauthorized access to administrative functions and compromise of sensitive network configurations.
A potential workaround for CVE-2024-0008 is to manually log out of the management interface regularly to mitigate unauthorized session access.