CVE-2024-9472
- EPSS 0.26%
- Veröffentlicht 14.11.2024 10:15:09
- Zuletzt bearbeitet 15.11.2024 13:58:08
A null pointer dereference in Palo Alto Networks PAN-OS software on PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series hardware platforms when Decryption policy is enabled allows an unauthenticated attacker to crash PAN-OS by sending s...
CVE-2024-5917
- EPSS 0.13%
- Veröffentlicht 14.11.2024 10:15:08
- Zuletzt bearbeitet 24.01.2025 16:04:54
A server-side request forgery in PAN-OS software enables an authenticated attacker with administrative privileges to use the administrative web interface as a proxy, which enables the attacker to view internal network resources not otherwise accessib...
CVE-2024-5918
- EPSS 0.06%
- Veröffentlicht 14.11.2024 10:15:08
- Zuletzt bearbeitet 01.10.2025 18:41:27
An improper certificate validation vulnerability in Palo Alto Networks PAN-OS software enables an authorized user with a specially crafted client certificate to connect to an impacted GlobalProtect portal or GlobalProtect gateway as a different legit...
CVE-2024-2550
- EPSS 0.17%
- Veröffentlicht 14.11.2024 10:15:04
- Zuletzt bearbeitet 24.01.2025 16:02:49
A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop the GlobalProtect service on the firewall by sending a specially crafted packet that causes a deni...
CVE-2024-2551
- EPSS 0.09%
- Veröffentlicht 14.11.2024 10:15:04
- Zuletzt bearbeitet 24.01.2025 16:03:41
A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop a core system service on the firewall by sending a crafted packet through the data plane that causes a denial of service (DoS) ...
- EPSS 0.19%
- Veröffentlicht 14.11.2024 10:15:04
- Zuletzt bearbeitet 24.01.2025 16:04:14
A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions in the management plane and delete files on the firewall.
CVE-2024-9471
- EPSS 0.41%
- Veröffentlicht 09.10.2024 17:15:21
- Zuletzt bearbeitet 15.10.2024 16:55:45
A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS ...
CVE-2024-9468
- EPSS 0.39%
- Veröffentlicht 09.10.2024 17:15:20
- Zuletzt bearbeitet 10.10.2024 12:51:56
A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger ...
CVE-2024-8686
- EPSS 0.48%
- Veröffentlicht 11.09.2024 17:15:14
- Zuletzt bearbeitet 03.10.2024 01:35:10
A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as root on the firewall.
CVE-2024-8687
- EPSS 0.06%
- Veröffentlicht 11.09.2024 17:15:14
- Zuletzt bearbeitet 03.10.2024 00:26:56
An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a GlobalProtect end user to learn both the configured GlobalProtect uninstall password and the configured disable or disconnect passcode. After the passwo...