First published: Wed Sep 11 2024(Updated: )
A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as root on the firewall.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | =11.2.2 | |
Palo Alto Networks Cloud NGFW | ||
Palo Alto Networks Prisma Access | ||
Palo Alto Networks PAN-OS | >=11.2.0<=11.2.2 |
This issue is fixed in PAN-OS 11.2.3 and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8686 is classified as a critical vulnerability due to its ability to allow authenticated administrators to execute arbitrary commands as root.
To remediate CVE-2024-8686, upgrade Palo Alto Networks PAN-OS to version 11.2.3 or later.
CVE-2024-8686 affects authenticated administrators of Palo Alto Networks PAN-OS version 11.2.2 and earlier.
Exploitation of CVE-2024-8686 can lead to unauthorized access and control over the firewall, potentially compromising the entire network.
As of now, there are no known public proofs of concept available for exploiting CVE-2024-8686.