Paloaltonetworks

Prisma Access

27 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 13.08.2025 17:03:21
  • Zuletzt bearbeitet 13.08.2025 17:33:46

A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity association key (CAK). This issue is only applicable to PA-7500 Series devices which are in an NGFW cluster. ...

  • EPSS 0.18%
  • Veröffentlicht 12.06.2025 23:30:15
  • Zuletzt bearbeitet 16.06.2025 12:32:18

A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to th...

  • EPSS 0.02%
  • Veröffentlicht 14.05.2025 18:12:14
  • Zuletzt bearbeitet 16.05.2025 14:43:56

Using the AES-128-CCM algorithm for IPSec on certain Palo Alto Networks PAN-OS® firewalls (PA-7500, PA-5400, PA-5400f, PA-3400, PA-1600, PA-1400, and PA-400 Series) leads to unencrypted data transfer to devices that are connected to the PAN-OS firewa...

Medienbericht
  • EPSS 0.09%
  • Veröffentlicht 14.05.2025 17:37:40
  • Zuletzt bearbeitet 06.10.2025 16:18:22

A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled allows an unauthenticated attacker to send a burst of maliciously crafted packets that causes the firewall to become unresponsive and eventually reboo...

  • EPSS 0.02%
  • Veröffentlicht 11.04.2025 22:25:36
  • Zuletzt bearbeitet 13.06.2025 21:15:19

An improper exception check in Palo Alto Networks Prisma Access Browser allows a low privileged user to prevent Prisma Access Browser from applying it's Policy Rules. This enables the user to use Prisma Access Browser without any restrictions.

  • EPSS 0.01%
  • Veröffentlicht 11.04.2025 17:43:05
  • Zuletzt bearbeitet 15.04.2025 18:39:43

A vulnerability in the Palo Alto Networks PAN-OS® software enables unlicensed administrators to view clear-text data captured using the packet capture feature https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/monitoring/take-packet-captures...

Medienbericht
  • EPSS 0.07%
  • Veröffentlicht 11.04.2025 02:15:19
  • Zuletzt bearbeitet 11.04.2025 15:39:52

A denial-of-service (DoS) vulnerability in the Simple Certificate Enrollment Protocol (SCEP) authentication feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted pack...

Medienbericht
  • EPSS 0.06%
  • Veröffentlicht 11.04.2025 02:15:18
  • Zuletzt bearbeitet 11.04.2025 15:39:52

When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click ...

Medienbericht
  • EPSS 0.05%
  • Veröffentlicht 11.04.2025 02:15:18
  • Zuletzt bearbeitet 11.04.2025 15:39:52

An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables a malicious authenticated read-write administrator to impersonate another legitimate authenticated PAN-OS administrator....

  • EPSS 0.05%
  • Veröffentlicht 12.03.2025 18:34:38
  • Zuletzt bearbeitet 18.03.2025 00:15:12

A Denial of Service (DoS) vulnerability in Palo Alto Networks PAN-OS software causes the firewall to unexpectedly reboot when processing a specially crafted LLDP frame sent by an unauthenticated adjacent attacker. Repeated attempts to initiate this c...