Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability (CVE-2024-9474)
Palo Alto Networks PAN-OS contains an OS command injection vulnerability that allows for privilege escalation through the web-based management interface for several PAN products, including firewalls and VPN concentrators.
A remote attacker, with administrative privileges, can achieve full data confidentiality loss, arbitrary modification of data, complete denial of service or system unavailability. CISA has confirmed use of this vulnerability in known ransomware campaigns — treat as high priority for remediation. Federal agencies are required to remediate by 2024-12-09 under CISA BOD 22-01.
This is a OS Command Injection (CWE-78) vulnerability in Palo Alto Networks PAN-OS. A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability. Exploitation requires remote network access, low attack complexity, an administrative account, and no user interaction required.
Probably yes if any of these apply:
Used in known ransomware campaigns. Threat-research write-up: https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/
Manual remediation steps
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.