Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-0012— PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015)

KEV · Ransomware EPSS 94.28% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-0012

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015)
Source: NVD (National Vulnerability Database)
Vulnerability Description
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 . The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended  best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
关键功能的认证机制缺失
Source: NVD (National Vulnerability Database)
Vulnerability Title
Palo Alto Networks PAN-OS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Palo Alto Networks PAN-OS是美国Palo Alto Networks公司的一套为其防火墙设备开发的操作系统。 Palo Alto Networks PAN-OS存在安全漏洞,该漏洞源于存在身份验证绕过问题,导致攻击者能够获得PAN-OS管理员权限,以执行管理操作和篡改配置等。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Palo Alto NetworksCloud NGFW--
Palo Alto NetworksPAN-OS 11.2.0 ~ 11.2.4-h1 cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:*
Palo Alto NetworksPrisma Access--

II. Public POCs for CVE-2024-0012

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/watchtowrlabs/palo-alto-panos-cve-2024-0012POC Details
2CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POChttps://github.com/Sachinart/CVE-2024-0012-POCPOC Details
3PANW NGFW CVE-2024-0012https://github.com/greaselovely/CVE-2024-0012POC Details
4Palo Alto CVE-2024-0012 Exploit POChttps://github.com/VegetableLasagne/CVE-2024-0012POC Details
5CVE-2024-0012批量检测脚本https://github.com/iSee857/CVE-2024-0012-pocPOC Details
6CVE-2024-0012是Palo Alto Networks PAN-OS软件中的一个身份验证绕过漏洞。该漏洞允许未经身份验证的攻击者通过网络访问管理Web界面,获取PAN-OS管理员权限,从而执行管理操作、篡改配置,或利用其他需要身份验证的特权提升漏洞(如CVE-2024-9474) https://github.com/XiaomingX/cve-2024-0012-pocPOC Details
7Nonehttps://github.com/PunitTailor55/Paloalto-CVE-2024-0012POC Details
8CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POChttps://github.com/0xjessie21/CVE-2024-0012POC Details
9Nonehttps://github.com/punitdarji/Paloalto-CVE-2024-0012POC Details
10This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.https://github.com/TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoCPOC Details
11Python script for CVE-2024-0012 / CVE-2024-9474 exploithttps://github.com/dcollaoa/cve-2024-0012-gui-pocPOC Details
12An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-0012.yamlPOC Details
13Exploitation and Post-Exploitation Multitool for Palo Alto PAN-OS Systems affected by vulnerabilities CVE-2024-0012 and CVE-2024-9474https://github.com/Regent8SH/PanOsExploitMultitoolPOC Details
14CVE-2024-0012是Palo Alto Networks PAN-OS软件中的一个身份验证绕过漏洞。该漏洞允许未经身份验证的攻击者通过网络访问管理Web界面,获取PAN-OS管理员权限,从而执行管理操作、篡改配置,或利用其他需要身份验证的特权提升漏洞(如CVE-2024-9474) https://github.com/Gr-1m/cve-2024-0012-pocPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-0012

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-0012

No comments yet


Leave a comment