First published: Wed Nov 13 2024(Updated: )
A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write Panorama administrator to push a specially crafted configuration to a PAN-OS node. This enables impersonation of a legitimate PAN-OS administrator who can perform restricted actions on the PAN-OS node after the execution of JavaScript in the legitimate PAN-OS administrator's browser.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=10.1.0<10.1.14 | |
Palo Alto Networks PAN-OS | >=10.2.0<10.2.11 | |
Palo Alto Networks PAN-OS | >=11.0.0<11.0.6 | |
Palo Alto Networks PAN-OS | >=11.1.0<11.1.4 | |
Palo Alto Networks Cloud NGFW | ||
Palo Alto PAN-OS | <11.1.4=11.1.0<11.0.6=11.0.0<10.2.11=10.2.0<10.1.14=10.1.0 | 11.1.4 11.0.6 10.2.11 10.1.14 |
Prisma |
This issue is fixed in PAN-OS 10.1.14, PAN-OS 10.2.11, PAN-OS 11.0.6, PAN-OS 11.1.4, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-5920 is classified as high due to its potential for unauthorized impersonation of a PAN-OS administrator.
To fix CVE-2024-5920, upgrade to PAN-OS versions 11.1.5, 11.0.7, 10.2.12, or 10.1.15 or later.
CVE-2024-5920 affects PAN-OS versions up to and including 11.1.4, 11.0.6, 10.2.11, and 10.1.14.
CVE-2024-5920 requires authenticated access to the Panorama administrator account, hence it is not remotely exploitable.
CVE-2024-5920 is a cross-site scripting (XSS) vulnerability that impacts Palo Alto Networks PAN-OS software.