CVE-2024-9468
- EPSS 0.6%
- Veröffentlicht 09.10.2024 17:15:20
- Zuletzt bearbeitet 01.12.2025 17:19:55
A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger ...
CVE-2024-8686
- EPSS 0.15%
- Veröffentlicht 11.09.2024 17:15:14
- Zuletzt bearbeitet 03.10.2024 01:35:10
A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as root on the firewall.
CVE-2024-8687
- EPSS 0.37%
- Veröffentlicht 11.09.2024 17:15:14
- Zuletzt bearbeitet 03.10.2024 00:26:56
An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a GlobalProtect end user to learn both the configured GlobalProtect uninstall password and the configured disable or disconnect passcode. After the passwo...
CVE-2024-8688
- EPSS 0.09%
- Veröffentlicht 11.09.2024 17:15:14
- Zuletzt bearbeitet 03.10.2024 00:19:32
An improper neutralization of matching symbols vulnerability in the Palo Alto Networks PAN-OS command line interface (CLI) enables authenticated administrators (including read-only administrators) with access to the CLI to to read arbitrary files on ...
CVE-2024-8691
- EPSS 0.23%
- Veröffentlicht 11.09.2024 17:15:14
- Zuletzt bearbeitet 01.11.2024 14:26:46
A vulnerability in the GlobalProtect portal in Palo Alto Networks PAN-OS software enables a malicious authenticated GlobalProtect user to impersonate another GlobalProtect user. Active GlobalProtect users impersonated by an attacker who is exploiting...
CVE-2024-5916
- EPSS 0.08%
- Veröffentlicht 14.08.2024 17:15:18
- Zuletzt bearbeitet 20.08.2024 19:30:11
An information exposure vulnerability in Palo Alto Networks PAN-OS software enables a local system administrator to unintentionally disclose secrets, passwords, and tokens of external systems. A read-only administrator who has access to the config lo...
- EPSS 0.21%
- Veröffentlicht 10.07.2024 19:15:11
- Zuletzt bearbeitet 21.11.2024 09:48:34
An arbitrary file upload vulnerability in Palo Alto Networks Panorama software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and crash the Panorama. Repeated attacks eventually cause th...
CVE-2024-5913
- EPSS 0.12%
- Veröffentlicht 10.07.2024 19:15:11
- Zuletzt bearbeitet 24.01.2025 16:00:42
An improper input validation vulnerability in Palo Alto Networks PAN-OS software enables an attacker with the ability to tamper with the physical file system to elevate privileges.
- EPSS 94.3%
- Veröffentlicht 12.04.2024 08:15:06
- Zuletzt bearbeitet 04.11.2025 16:49:20
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to exe...
CVE-2024-3383
- EPSS 0.25%
- Veröffentlicht 10.04.2024 17:15:57
- Zuletzt bearbeitet 24.01.2025 15:29:26
A vulnerability in how Palo Alto Networks PAN-OS software processes data received from Cloud Identity Engine (CIE) agents enables modification of User-ID groups. This impacts user access to network resources where users may be inappropriately denied ...