Palo Alto PAN-OS Multiple vulnerabilities
Release Date:
15 Nov 2024
7386
Views
RISK: Medium Risk
TYPE: Security software and application - Security Software & Appliance
Multiple vulnerabilities were identified in Palo Alto PAN-OS. A remote user could exploit these vulnerabilities to trigger cross-site scripting, remote code execution, denial of service, sensitive information disclosure, and security restriction bypass on the targeted system.
Impact
- Cross-Site Scripting
- Remote Code Execution
- Denial of Service
- Information Disclosure
- Security Restriction Bypass
System / Technologies affected
- PAN-OS 10.1 versions earlier than PAN-OS 10.1.7
- PAN-OS 10.1 versions earlier than PAN-OS 10.1.10
- PAN-OS 10.1 versions earlier than PAN-OS 10.1.11
- PAN-OS 10.1 versions earlier than PAN-OS 10.1.14
- PAN-OS 10.2 versions earlier than PAN-OS 10.2.2
- PAN-OS 10.2 versions earlier than PAN-OS 10.2.4-h5
- PAN-OS 10.2 versions earlier than PAN-OS 10.2.4-h6
- PAN-OS 10.2 versions earlier than PAN-OS 10.2.5
- PAN-OS 10.2 versions earlier than PAN-OS 10.2.7-h16
- PAN-OS 10.2 versions earlier than PAN-OS 10.2.8-h13
- PAN-OS 10.2 versions earlier than PAN-OS 10.2.9-14
- PAN-OS 10.2 versions earlier than PAN-OS 10.2.10-h7
- PAN-OS 10.2 versions earlier than PAN-OS 10.2.11
- PAN-OS 10.2 versions earlier than PAN-OS 10.2.11-h4
- PAN-OS 10.2 versions earlier than PAN-OS 10.2.12
- PAN-OS 11.0 versions earlier than PAN-OS 11.0.2
- PAN-OS 11.0 versions earlier than PAN-OS 11.0.3
- PAN-OS 11.0 versions earlier than PAN-OS 11.0.5
- PAN-OS 11.0 versions earlier than PAN-OS 11.0.6
- PAN-OS 11.1 versions earlier than PAN-OS 11.1.2-h14
- PAN-OS 11.1 versions earlier than PAN-OS 11.1.3-h10
- PAN-OS 11.1 versions earlier than PAN-OS 11.1.4
- PAN-OS 11.1 versions earlier than PAN-OS 11.1.5
- PAN-OS 11.2 versions earlier than PAN-OS 11.2.2-h3
- PAN-OS 11.2 versions earlier than PAN-OS 11.2.3
- PAN-OS 11.2 versions earlier than PAN-OS 11.2.4
Solutions
Before installation of the software, please visit the vendor web-site for more details.
- Apply fixes issued by the vendor. For detail, please refer to the link below:
https://securityadvisories.paloaltonetworks.com/CVE-2024-2550
https://securityadvisories.paloaltonetworks.com/CVE-2024-2551
https://securityadvisories.paloaltonetworks.com/CVE-2024-2552
https://securityadvisories.paloaltonetworks.com/CVE-2024-5917
https://securityadvisories.paloaltonetworks.com/CVE-2024-5918
https://securityadvisories.paloaltonetworks.com/CVE-2024-5919
https://securityadvisories.paloaltonetworks.com/CVE-2024-5920
https://securityadvisories.paloaltonetworks.com/CVE-2024-9472
Vulnerability Identifier
- CVE-2024-2550
- CVE-2024-2551
- CVE-2024-2552
- CVE-2024-5917
- CVE-2024-5918
- CVE-2024-5919
- CVE-2024-5920
- CVE-2024-9472
Source
Related Link
- https://securityadvisories.paloaltonetworks.com/CVE-2024-2550
- https://securityadvisories.paloaltonetworks.com/CVE-2024-2551
- https://securityadvisories.paloaltonetworks.com/CVE-2024-2552
- https://securityadvisories.paloaltonetworks.com/CVE-2024-5917
- https://securityadvisories.paloaltonetworks.com/CVE-2024-5918
- https://securityadvisories.paloaltonetworks.com/CVE-2024-5919
- https://securityadvisories.paloaltonetworks.com/CVE-2024-5920
- https://securityadvisories.paloaltonetworks.com/CVE-2024-9472
Related Tags
Share with