First published: Wed Feb 14 2024(Updated: )
An improper verification vulnerability in the GlobalProtect gateway feature of Palo Alto Networks PAN-OS software enables a malicious user with stolen credentials to establish a VPN connection from an unauthorized IP address.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | =11.0.0 | |
Palo Alto Networks PAN-OS | =11.0.0-h1 | |
Palo Alto Networks PAN-OS | =11.0.0-h2 | |
Palo Alto Networks PAN-OS | =11.0.0-h3 | |
Palo Alto Networks PAN-OS | =11.0.0-h4 | |
Palo Alto Networks PAN-OS | >=10.2.0<10.2.4 |
This issue is fixed in PAN-OS 10.2.4, PAN-OS 11.0.1, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0009 is classified as a critical vulnerability due to its potential for unauthorized VPN access.
To fix CVE-2024-0009, update your Palo Alto Networks PAN-OS software to the latest patched version.
CVE-2024-0009 affects Palo Alto Networks PAN-OS 11.0.0 and versions between 10.2.0 and 10.2.4.
An attacker exploiting CVE-2024-0009 can establish a VPN connection from an unauthorized IP address using stolen credentials.
Currently, there is no official workaround for CVE-2024-0009, and prompt patching is recommended.