First published: Wed Feb 14 2024(Updated: )
A reflected cross-site scripting (XSS) vulnerability in the Captive Portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript (in the context of an authenticated Captive Portal user’s browser) if a user clicks on a malicious link, allowing phishing attacks that could lead to credential theft.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=8.1.0<8.1.24 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.17 | |
Palo Alto Networks PAN-OS | >=9.1.0<9.1.13 | |
Palo Alto Networks PAN-OS | >=10.0.0<10.0.11 | |
Palo Alto Networks PAN-OS | >=10.1.0<10.1.3 |
This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.13, PAN-OS 10.0.11, PAN-OS 10.1.3, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0011 is classified as a reflected cross-site scripting (XSS) vulnerability, which poses a high risk to the security of affected systems.
To mitigate CVE-2024-0011, it is recommended to update Palo Alto Networks PAN-OS to a fixed version that addresses this vulnerability.
CVE-2024-0011 affects Palo Alto Networks PAN-OS versions between 8.1.0 and 8.1.24, 9.0.0 to 9.0.17, 9.1.0 to 9.1.13, 10.0.0 to 10.0.11, and 10.1.0 to 10.1.3.
Exploitation of CVE-2024-0011 allows attackers to execute malicious JavaScript in the context of an authenticated user's browser, potentially leading to phishing attacks.
Yes, exploitation of CVE-2024-0011 requires user interaction, as the attack relies on victims clicking on a malicious link.