Paloaltonetworks

Pan-os

226 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 11.03.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 05:11:46

A predictable temporary filename vulnerability in PAN-OS allows local privilege escalation. This issue allows a local attacker who bypassed the restricted shell to execute commands as a low privileged user and gain root access on the PAN-OS hardware ...

  • EPSS 0.38%
  • Veröffentlicht 12.02.2020 23:15:11
  • Zuletzt bearbeitet 21.11.2024 05:11:46

Missing XML validation vulnerability in the PAN-OS web interface on Palo Alto Networks PAN-OS software allows authenticated users to inject arbitrary XML that results in privilege escalation. This issue affects PAN-OS 8.1 versions earlier than PAN-OS...

  • EPSS 0.45%
  • Veröffentlicht 20.12.2019 16:15:11
  • Zuletzt bearbeitet 21.11.2024 04:32:19

Improper restriction of communications to Log Forwarding Card (LFC) on PA-7000 Series devices with second-generation Switch Management Card (SMC) may allow an attacker with network access to the LFC to gain root access to PAN-OS. This issue affects P...

  • EPSS 0.13%
  • Veröffentlicht 05.12.2019 15:15:11
  • Zuletzt bearbeitet 21.11.2024 04:32:19

An improper authentication check in Palo Alto Networks PAN-OS may allow an authenticated low privileged non-superuser custom role user to elevate privileges and become superuser. This issue affects PAN-OS 7.1 versions prior to 7.1.25; 8.0 versions pr...

  • EPSS 2.2%
  • Veröffentlicht 23.08.2019 18:15:11
  • Zuletzt bearbeitet 21.11.2024 04:36:51

Memory corruption in PAN-OS 7.1.24 and earlier, PAN-OS 8.0.19 and earlier, PAN-OS 8.1.9 and earlier, and PAN-OS 9.0.3 and earlier will allow a remote, unauthenticated user to craft a message to Secure Shell Daemon (SSHD) and corrupt arbitrary memory.

  • EPSS 4.07%
  • Veröffentlicht 23.08.2019 18:15:11
  • Zuletzt bearbeitet 21.11.2024 04:36:51

A remote code execution vulnerability in the PAN-OS SSH device management interface that can lead to unauthenticated remote users with network access to the SSH management interface gaining root access to PAN-OS. This issue affects PAN-OS 7.1 version...

  • EPSS 0.57%
  • Veröffentlicht 23.08.2019 18:15:11
  • Zuletzt bearbeitet 21.11.2024 04:36:51

Memory corruption in PAN-OS 8.1.9 and earlier, and PAN-OS 9.0.3 and earlier will allow an administrative user to cause arbitrary memory corruption by rekeying the current client interactive session.

Warnung Exploit
  • EPSS 92.68%
  • Veröffentlicht 19.07.2019 22:15:11
  • Zuletzt bearbeitet 07.02.2025 15:04:40

Remote Code Execution in PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and PAN-OS 8.1.2 and earlier with GlobalProtect Portal or GlobalProtect Gateway Interface enabled may allow an unauthenticated remote attacker to execute arbitrary code...

  • EPSS 0.72%
  • Veröffentlicht 16.07.2019 14:15:12
  • Zuletzt bearbeitet 21.11.2024 04:36:50

Information disclosure in PAN-OS 7.1.23 and earlier, PAN-OS 8.0.18 and earlier, PAN-OS 8.1.8-h4 and earlier, and PAN-OS 9.0.2 and earlier may allow for an authenticated user with read-only privileges to extract the API key of the device and/or the us...

  • EPSS 3.93%
  • Veröffentlicht 16.07.2019 14:15:12
  • Zuletzt bearbeitet 21.11.2024 04:36:50

Command injection in PAN-0S 9.0.2 and earlier may allow an authenticated attacker to gain access to a remote shell in PAN-OS, and potentially run with the escalated user’s permissions.