First published: Wed Jul 10 2024(Updated: )
An improper input validation vulnerability in Palo Alto Networks PAN-OS software enables an attacker with the ability to tamper with the physical file system to elevate privileges.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=10.1.0<10.1.14 | |
Palo Alto Networks PAN-OS | >=10.2.0<10.2.10 | |
Palo Alto Networks PAN-OS | >=11.0.0<11.0.5 | |
Palo Alto Networks PAN-OS | >=11.1.0<11.1.4 | |
Palo Alto Networks PAN-OS | >=11.2.0<11.2.1 | |
Palo Alto Networks PAN-OS | =10.1.14 | |
Palo Alto PAN-OS |
This issue is fixed in PAN-OS 10.1.14-h2, PAN-OS 10.2.10, PAN-OS 11.0.5, PAN-OS 11.1.4, PAN-OS 11.2.1, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5913 has a high severity rating due to its potential for privilege escalation.
To fix CVE-2024-5913, ensure that you upgrade to the latest version of Palo Alto Networks PAN-OS that includes the necessary patches.
CVE-2024-5913 affects multiple versions of Palo Alto Networks PAN-OS including versions from 10.1.0 to 11.2.1.
CVE-2024-5913 requires an attacker to have physical access to the system to exploit the vulnerability.
CVE-2024-5913 is classified as an improper input validation vulnerability.