Paloaltonetworks

Pan-os

233 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 11.02.2026 18:16:07
  • Zuletzt bearbeitet 12.02.2026 15:11:02

An improper certificate validation vulnerability in PAN-OS allows users to connect Terminal Server Agents on Windows to PAN-OS using expired certificates even if the PAN-OS configuration would not normally permit them to do so.

  • EPSS 0.03%
  • Veröffentlicht 11.02.2026 18:16:07
  • Zuletzt bearbeitet 12.02.2026 15:11:02

A denial-of-service (DoS) vulnerability in the Advanced DNS Security (ADNS) feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiat...

  • EPSS 0.03%
  • Veröffentlicht 15.01.2026 18:45:08
  • Zuletzt bearbeitet 06.02.2026 17:37:28

A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode.

  • EPSS 0.1%
  • Veröffentlicht 13.11.2025 20:24:19
  • Zuletzt bearbeitet 14.11.2025 16:42:03

A denial-of-service (DoS) vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to reboot a firewall by sending a specially crafted packet through the dataplane. Repeated attempts to initiate a reboot causes the fire...

  • EPSS 0.06%
  • Veröffentlicht 09.10.2025 18:28:04
  • Zuletzt bearbeitet 22.10.2025 17:50:00

An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and execute arbitrary commands. The security risk posed by...

  • EPSS 0.04%
  • Veröffentlicht 09.10.2025 18:13:22
  • Zuletzt bearbeitet 06.02.2026 17:13:34

An information disclosure vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to view session tokens of users authenticated to the firewall web UI. This may allow impersonation of users whose session tokens are...

  • EPSS 0.01%
  • Veröffentlicht 13.08.2025 17:03:21
  • Zuletzt bearbeitet 13.08.2025 17:33:46

A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity association key (CAK). This issue is only applicable to PA-7500 Series devices which are in an NGFW cluster. ...

  • EPSS 0.1%
  • Veröffentlicht 13.06.2025 05:42:38
  • Zuletzt bearbeitet 16.06.2025 12:32:18

An information disclosure vulnerability in the SD-WAN feature of Palo Alto Networks PAN-OS® software enables an unauthorized user to view unencrypted data sent from the firewall through the SD-WAN interface. This requires the user to be able to inter...

  • EPSS 0.09%
  • Veröffentlicht 12.06.2025 23:30:15
  • Zuletzt bearbeitet 16.06.2025 12:32:18

A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to th...

  • EPSS 0.12%
  • Veröffentlicht 12.06.2025 23:27:31
  • Zuletzt bearbeitet 22.10.2025 12:57:48

A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user. The attacker must have network access to the management web interface and successfully authenticate to ...