First published: Wed Feb 14 2024(Updated: )
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript (in the context of a user’s browser) if a user clicks on a malicious link, allowing phishing attacks that could lead to credential theft.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=10.1.0<10.1.11 | |
Palo Alto Networks PAN-OS | =10.1.11 | |
Palo Alto Networks PAN-OS | >=9.1.0<9.1.17 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.17 | |
Palo Alto Networks PAN-OS | =9.0.17 | |
Palo Alto Networks PAN-OS | =9.0.17-h1 | |
Palo Alto Networks PAN-OS | =9.0.17-h2 | |
Palo Alto Networks PAN-OS | =9.0.17-h3 |
This issue is fixed in PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.11-h1, PAN-OS 10.1.12, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0010 is considered a high-severity reflected cross-site scripting vulnerability.
To fix CVE-2024-0010, users should upgrade to the latest version of Palo Alto Networks PAN-OS that addresses this vulnerability.
CVE-2024-0010 affects PAN-OS versions from 9.0.0 to 10.1.11.
CVE-2024-0010 allows execution of malicious JavaScript, enabling phishing attacks and potentially compromising user data.
To protect your environment from CVE-2024-0010, ensure fostering safe browsing habits and applying security patches promptly.