First published: Wed Oct 09 2024(Updated: )
A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator beyond what the XML API permits.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | <11.0.3=11.0<10.1.11=10.1<10.2.8=10.2 | 11.0.3 10.1.11 10.2.8 |
Palo Alto Networks Cloud NGFW | ||
Palo Alto Networks Prisma Access | ||
Palo Alto Networks PAN-OS | >=9.0.0<10.0.0 | |
Palo Alto Networks PAN-OS | >=10.1.0<10.1.11 | |
Palo Alto Networks PAN-OS | >=10.2.0<10.2.8 | |
Palo Alto Networks PAN-OS | >=11.0.0<11.0.3 |
This issue is fixed in PAN-OS 10.1.11, PAN-OS 10.2.8, PAN-OS 11.0.3, and all later PAN-OS versions.
This issue requires the attacker to have authenticated access to the PAN-OS XML API. You can mitigate the effect this issue has on your environment by following the Administrative Access Best Practices in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices. Each XML API key is associated with a specific user. XML API keys are not meant to be shared between users.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9471 is categorized as a privilege escalation vulnerability affecting Palo Alto Networks PAN-OS.
To remediate CVE-2024-9471, upgrade your PAN-OS to the latest patched version provided by Palo Alto Networks.
CVE-2024-9471 affects PAN-OS versions 10.1.10 and earlier, 10.2.8, and 11.0.3 and earlier.
CVE-2024-9471 requires an authenticated user with restricted privileges to exploit the vulnerability.
Exploitation of CVE-2024-9471 allows an attacker to escalate their privileges and perform higher-privileged actions on the PAN-OS.