First published: Fri Apr 12 2024(Updated: )
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
Credit: Kr0ff psirt@paloaltonetworks.com psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | ||
Paloaltonetworks Pan-os | =10.2.0 | |
Paloaltonetworks Pan-os | =10.2.0-h1 | |
Paloaltonetworks Pan-os | =10.2.0-h2 | |
Paloaltonetworks Pan-os | =10.2.0-h3 | |
Paloaltonetworks Pan-os | =10.2.1 | |
Paloaltonetworks Pan-os | =10.2.1-h1 | |
Paloaltonetworks Pan-os | =10.2.1-h2 | |
Paloaltonetworks Pan-os | =10.2.2 | |
Paloaltonetworks Pan-os | =10.2.2-h1 | |
Paloaltonetworks Pan-os | =10.2.2-h2 | |
Paloaltonetworks Pan-os | =10.2.2-h4 | |
Paloaltonetworks Pan-os | =10.2.2-h5 | |
Paloaltonetworks Pan-os | =10.2.3 | |
Paloaltonetworks Pan-os | =10.2.3-h11 | |
Paloaltonetworks Pan-os | =10.2.3-h12 | |
Paloaltonetworks Pan-os | =10.2.3-h13 | |
Paloaltonetworks Pan-os | =10.2.3-h2 | |
Paloaltonetworks Pan-os | =10.2.3-h4 | |
Paloaltonetworks Pan-os | =10.2.3-h9 | |
Paloaltonetworks Pan-os | =10.2.4 | |
Paloaltonetworks Pan-os | =10.2.4-h10 | |
Paloaltonetworks Pan-os | =10.2.4-h16 | |
Paloaltonetworks Pan-os | =10.2.4-h2 | |
Paloaltonetworks Pan-os | =10.2.4-h3 | |
Paloaltonetworks Pan-os | =10.2.4-h4 | |
Paloaltonetworks Pan-os | =10.2.5 | |
Paloaltonetworks Pan-os | =10.2.5-h1 | |
Paloaltonetworks Pan-os | =10.2.5-h4 | |
Paloaltonetworks Pan-os | =10.2.5-h6 | |
Paloaltonetworks Pan-os | =10.2.6 | |
Paloaltonetworks Pan-os | =10.2.6-h1 | |
Paloaltonetworks Pan-os | =10.2.6-h3 | |
Paloaltonetworks Pan-os | =10.2.7 | |
Paloaltonetworks Pan-os | =10.2.7-h1 | |
Paloaltonetworks Pan-os | =10.2.7-h3 | |
Paloaltonetworks Pan-os | =10.2.7-h6 | |
Paloaltonetworks Pan-os | =10.2.7-h8 | |
Paloaltonetworks Pan-os | =10.2.8 | |
Paloaltonetworks Pan-os | =10.2.8-h3 | |
Paloaltonetworks Pan-os | =10.2.9 | |
Paloaltonetworks Pan-os | =10.2.9-h1 | |
Paloaltonetworks Pan-os | =11.0.0 | |
Paloaltonetworks Pan-os | =11.0.0-h1 | |
Paloaltonetworks Pan-os | =11.0.0-h2 | |
Paloaltonetworks Pan-os | =11.0.0-h3 | |
Paloaltonetworks Pan-os | =11.0.1 | |
Paloaltonetworks Pan-os | =11.0.1-h2 | |
Paloaltonetworks Pan-os | =11.0.1-h3 | |
Paloaltonetworks Pan-os | =11.0.1-h4 | |
Paloaltonetworks Pan-os | =11.0.2 | |
Paloaltonetworks Pan-os | =11.0.2-h1 | |
Paloaltonetworks Pan-os | =11.0.2-h2 | |
Paloaltonetworks Pan-os | =11.0.2-h3 | |
Paloaltonetworks Pan-os | =11.0.2-h4 | |
Paloaltonetworks Pan-os | =11.0.3 | |
Paloaltonetworks Pan-os | =11.0.3-h1 | |
Paloaltonetworks Pan-os | =11.0.3-h10 | |
Paloaltonetworks Pan-os | =11.0.3-h3 | |
Paloaltonetworks Pan-os | =11.0.3-h5 | |
Paloaltonetworks Pan-os | =11.0.4 | |
Paloaltonetworks Pan-os | =11.0.4-h1 | |
Paloaltonetworks Pan-os | =11.1.0 | |
Paloaltonetworks Pan-os | =11.1.0-h1 | |
Paloaltonetworks Pan-os | =11.1.0-h2 | |
Paloaltonetworks Pan-os | =11.1.0-h3 | |
Paloaltonetworks Pan-os | =11.1.1 | |
Paloaltonetworks Pan-os | =11.1.1-h1 | |
Paloaltonetworks Pan-os | =11.1.2 | |
Paloaltonetworks Pan-os | =11.1.2-h1 | |
Paloaltonetworks Pan-os | =11.1.2-h3 | |
=10.2.0 | ||
=10.2.0-h1 | ||
=10.2.0-h2 | ||
=10.2.1 | ||
=10.2.1-h1 | ||
=10.2.2 | ||
=10.2.2-h1 | ||
=10.2.2-h2 | ||
=10.2.2-h4 | ||
=10.2.3 | ||
=10.2.3-h11 | ||
=10.2.3-h12 | ||
=10.2.3-h2 | ||
=10.2.3-h4 | ||
=10.2.3-h9 | ||
=10.2.4 | ||
=10.2.4-h10 | ||
=10.2.4-h2 | ||
=10.2.4-h3 | ||
=10.2.4-h4 | ||
=10.2.5 | ||
=10.2.5-h1 | ||
=10.2.5-h4 | ||
=10.2.6 | ||
=10.2.6-h1 | ||
=10.2.7 | ||
=10.2.7-h1 | ||
=10.2.7-h3 | ||
=10.2.7-h6 | ||
=10.2.8 | ||
=10.2.9 | ||
=11.0.0 | ||
=11.0.0-h1 | ||
=11.0.0-h2 | ||
=11.0.1 | ||
=11.0.1-h2 | ||
=11.0.1-h3 | ||
=11.0.2 | ||
=11.0.2-h1 | ||
=11.0.2-h2 | ||
=11.0.2-h3 | ||
=11.0.3 | ||
=11.0.3-h1 | ||
=11.0.3-h3 | ||
=11.0.3-h5 | ||
=11.0.4 | ||
=11.1.0 | ||
=11.1.0-h1 | ||
=11.1.0-h2 | ||
=11.1.1 | ||
=11.1.2 | ||
=11.1.2-h1 |
Apply mitigations per vendor instructions as they become available. Otherwise, users with vulnerable versions of affected devices should enable Threat Prevention IDs available from the vendor. See the vendor bulletin for more details and a patch release schedule.
We strongly advise customers to immediately upgrade to a fixed version of PAN-OS to protect their devices even when workarounds and mitigations have been applied. This issue is fixed in PAN-OS 10.2.9-h1, PAN-OS 11.0.4-h1, PAN-OS 11.1.2-h3, and in all later PAN-OS versions. Customers who upgrade to these versions will be fully protected.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.