CVE-2024-5913
- EPSS 0.14%
- Veröffentlicht 10.07.2024 19:15:11
- Zuletzt bearbeitet 24.01.2025 16:00:42
An improper input validation vulnerability in Palo Alto Networks PAN-OS software enables an attacker with the ability to tamper with the physical file system to elevate privileges.
- EPSS 94.32%
- Veröffentlicht 12.04.2024 08:15:06
- Zuletzt bearbeitet 04.11.2025 16:49:20
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to exe...
CVE-2024-3383
- EPSS 0.25%
- Veröffentlicht 10.04.2024 17:15:57
- Zuletzt bearbeitet 24.01.2025 15:29:26
A vulnerability in how Palo Alto Networks PAN-OS software processes data received from Cloud Identity Engine (CIE) agents enables modification of User-ID groups. This impacts user access to network resources where users may be inappropriately denied ...
CVE-2024-3384
- EPSS 0.73%
- Veröffentlicht 10.04.2024 17:15:57
- Zuletzt bearbeitet 24.01.2025 15:54:56
A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN Manager (NTLM) packets from Windows servers. Repeated attacks eventually cause the firewall to enter ...
CVE-2024-3385
- EPSS 2.66%
- Veröffentlicht 10.04.2024 17:15:57
- Zuletzt bearbeitet 24.01.2025 15:55:48
A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring th...
CVE-2024-3386
- EPSS 0.24%
- Veröffentlicht 10.04.2024 17:15:57
- Zuletzt bearbeitet 24.01.2025 15:58:52
An incorrect string comparison vulnerability in Palo Alto Networks PAN-OS software prevents Predefined Decryption Exclusions from functioning as intended. This can cause traffic destined for domains that are not specified in Predefined Decryption Exc...
CVE-2024-3387
- EPSS 0.11%
- Veröffentlicht 10.04.2024 17:15:57
- Zuletzt bearbeitet 30.01.2026 21:13:20
A weak (low bit strength) device certificate in Palo Alto Networks Panorama software enables an attacker to perform a meddler-in-the-middle (MitM) attack to capture encrypted traffic between the Panorama management server and the firewalls it manages...
- EPSS 0.17%
- Veröffentlicht 10.04.2024 17:15:57
- Zuletzt bearbeitet 24.01.2025 16:16:18
A vulnerability in the GlobalProtect Gateway in Palo Alto Networks PAN-OS software enables an authenticated attacker to impersonate another user and send network packets to internal assets. However, this vulnerability does not allow the attacker to r...
CVE-2024-3382
- EPSS 0.37%
- Veröffentlicht 10.04.2024 17:15:56
- Zuletzt bearbeitet 22.01.2025 15:44:24
A memory leak exists in Palo Alto Networks PAN-OS software that enables an attacker to send a burst of crafted packets through the firewall that eventually prevents the firewall from processing traffic. This issue applies only to PA-5400 Series devic...
CVE-2024-2433
- EPSS 0.05%
- Veröffentlicht 13.03.2024 18:15:08
- Zuletzt bearbeitet 30.01.2026 20:58:17
An improper authorization vulnerability in Palo Alto Networks Panorama software enables an authenticated read-only administrator to upload files using the web interface and completely fill one of the disk partitions with those uploaded files, which p...