First published: Wed Sep 11 2024(Updated: )
An improper neutralization of matching symbols vulnerability in the Palo Alto Networks PAN-OS command line interface (CLI) enables authenticated administrators (including read-only administrators) with access to the CLI to to read arbitrary files on the firewall.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=9.1.0<9.1.15 | |
Palo Alto Networks PAN-OS | >=10.0.0<10.0.10 | |
Palo Alto Networks PAN-OS | =10.1.0 | |
Palo Alto PAN-OS | <9.1.15=9.1<10.0.10=10.0<10.1.1=10.1 | |
Palo Alto Networks Cloud NGFW | ||
Prisma |
This issue is fixed in PAN-OS 9.1.15, PAN-OS 10.0.10, PAN-OS 10.1.1, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8688 is considered a high severity vulnerability due to its potential to allow unauthorized file access.
To fix CVE-2024-8688, update your Palo Alto Networks PAN-OS to the latest version as per the vendor's security advisories.
CVE-2024-8688 affects authenticated administrators, including read-only administrators, using specific versions of Palo Alto Networks PAN-OS.
An attacker leveraging CVE-2024-8688 could read arbitrary files on the firewall, compromising sensitive system data.
CVE-2024-8688 affects Palo Alto Networks PAN-OS versions prior to 9.1.15, 10.0.10, and includes version 10.1.0.