First published: Wed Mar 13 2024(Updated: )
An improper authorization vulnerability in Palo Alto Networks Panorama software enables an authenticated read-only administrator to upload files using the web interface and completely fill one of the disk partitions with those uploaded files, which prevents the ability to log into the web interface or to download PAN-OS, WildFire, and content images. This issue affects only the web interface of the management plane; the dataplane is unaffected.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks Panorama | ||
Palo Alto PAN-OS |
This issue is fixed in Panorama on PAN-OS 9.0.17-h4, PAN-OS 9.1.18, PAN-OS 10.1.12, PAN-OS 10.2.11, PAN-OS 11.0.4, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2433 is considered a high-severity vulnerability due to its potential impact on system availability.
To fix CVE-2024-2433, apply the latest security patches and updates provided by Palo Alto Networks for Panorama and PAN-OS.
CVE-2024-2433 affects authenticated read-only administrators using the web interface of Palo Alto Networks Panorama software.
The consequence of CVE-2024-2433 is that it allows unauthorized file uploads, potentially filling disk partitions and preventing logins.
A temporary workaround for CVE-2024-2433 is to restrict access for read-only administrators until a patch can be applied.