CVE-2025-0107
- EPSS 79.83%
- Veröffentlicht 11.01.2025 03:15:22
- Zuletzt bearbeitet 23.01.2026 21:50:52
An OS command injection vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device conf...
CVE-2024-3393
- EPSS 77.69%
- Veröffentlicht 27.12.2024 10:15:17
- Zuletzt bearbeitet 04.11.2025 16:49:18
A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to t...
CVE-2024-9474
- EPSS 94.18%
- Veröffentlicht 18.11.2024 16:15:29
- Zuletzt bearbeitet 04.11.2025 16:49:14
A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impact...
CVE-2024-0012
- EPSS 94.32%
- Veröffentlicht 18.11.2024 16:15:11
- Zuletzt bearbeitet 04.11.2025 16:49:23
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configur...
CVE-2024-5919
- EPSS 0.15%
- Veröffentlicht 14.11.2024 10:15:09
- Zuletzt bearbeitet 24.01.2025 16:06:00
A blind XML External Entities (XXE) injection vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker to exfiltrate arbitrary files from firewalls to an attacker controlled server. This attack requires network access...
CVE-2024-5920
- EPSS 0.43%
- Veröffentlicht 14.11.2024 10:15:09
- Zuletzt bearbeitet 24.01.2025 16:06:43
A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write Panorama administrator to push a specially crafted configuration to a PAN-OS node. This enables impersonation of a legitimate PAN-OS ...
CVE-2024-9472
- EPSS 0.25%
- Veröffentlicht 14.11.2024 10:15:09
- Zuletzt bearbeitet 15.11.2024 13:58:08
A null pointer dereference in Palo Alto Networks PAN-OS software on PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series hardware platforms when Decryption policy is enabled allows an unauthenticated attacker to crash PAN-OS by sending s...
CVE-2024-5917
- EPSS 0.2%
- Veröffentlicht 14.11.2024 10:15:08
- Zuletzt bearbeitet 24.01.2025 16:04:54
A server-side request forgery in PAN-OS software enables an authenticated attacker with administrative privileges to use the administrative web interface as a proxy, which enables the attacker to view internal network resources not otherwise accessib...
CVE-2024-5918
- EPSS 0.15%
- Veröffentlicht 14.11.2024 10:15:08
- Zuletzt bearbeitet 01.10.2025 18:41:27
An improper certificate validation vulnerability in Palo Alto Networks PAN-OS software enables an authorized user with a specially crafted client certificate to connect to an impacted GlobalProtect portal or GlobalProtect gateway as a different legit...
CVE-2024-2550
- EPSS 0.36%
- Veröffentlicht 14.11.2024 10:15:04
- Zuletzt bearbeitet 24.01.2025 16:02:49
A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop the GlobalProtect service on the firewall by sending a specially crafted packet that causes a deni...