First published: Wed Apr 10 2024(Updated: )
A vulnerability in the GlobalProtect Gateway in Palo Alto Networks PAN-OS software enables an authenticated attacker to impersonate another user and send network packets to internal assets. However, this vulnerability does not allow the attacker to receive response packets from those internal assets.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | ||
Paloaltonetworks Pan-os | >=8.1.0<8.1.26 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.17 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.17 | |
Paloaltonetworks Pan-os | >=10.1.0<10.1.11 | |
Paloaltonetworks Pan-os | >=10.2.0<10.2.7 | |
Paloaltonetworks Pan-os | >=11.0.0<11.0.3 | |
Paloaltonetworks Pan-os | =9.0.17 | |
Paloaltonetworks Pan-os | =9.0.17-h1 | |
Paloaltonetworks Pan-os | =10.1.11 | |
Paloaltonetworks Pan-os | =10.1.11-h1 | |
Paloaltonetworks Pan-os | =10.1.11-h3 | |
Paloaltonetworks Pan-os | =10.2.7 | |
Paloaltonetworks Pan-os | =10.2.7-h1 | |
Paloaltonetworks Prisma Access |
This issue is fixed in PAN-OS 8.1.26, PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.11-h4, PAN-OS 10.2.7-h3, PAN-OS 11.0.3, and all later PAN-OS versions. This issue is fixed in Prisma Access 10.2.4 and later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.