Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Palo Alto Networks | Cloud NGFW | - | - | |
| Palo Alto Networks | PAN-OS | 11.2.0 ~ 11.2.4-h1 | cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:* | |
| Palo Alto Networks | Prisma Access | - | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/watchtowrlabs/palo-alto-panos-cve-2024-0012 | POC Details |
| 2 | CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC | https://github.com/Sachinart/CVE-2024-0012-POC | POC Details |
| 3 | PANW NGFW CVE-2024-0012 | https://github.com/greaselovely/CVE-2024-0012 | POC Details |
| 4 | Palo Alto CVE-2024-0012 Exploit POC | https://github.com/VegetableLasagne/CVE-2024-0012 | POC Details |
| 5 | CVE-2024-0012批量检测脚本 | https://github.com/iSee857/CVE-2024-0012-poc | POC Details |
| 6 | CVE-2024-0012是Palo Alto Networks PAN-OS软件中的一个身份验证绕过漏洞。该漏洞允许未经身份验证的攻击者通过网络访问管理Web界面,获取PAN-OS管理员权限,从而执行管理操作、篡改配置,或利用其他需要身份验证的特权提升漏洞(如CVE-2024-9474) | https://github.com/XiaomingX/cve-2024-0012-poc | POC Details |
| 7 | None | https://github.com/PunitTailor55/Paloalto-CVE-2024-0012 | POC Details |
| 8 | CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC | https://github.com/0xjessie21/CVE-2024-0012 | POC Details |
| 9 | None | https://github.com/punitdarji/Paloalto-CVE-2024-0012 | POC Details |
| 10 | This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution. | https://github.com/TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC | POC Details |
| 11 | Python script for CVE-2024-0012 / CVE-2024-9474 exploit | https://github.com/dcollaoa/cve-2024-0012-gui-poc | POC Details |
| 12 | An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-0012.yaml | POC Details |
| 13 | Exploitation and Post-Exploitation Multitool for Palo Alto PAN-OS Systems affected by vulnerabilities CVE-2024-0012 and CVE-2024-9474 | https://github.com/Regent8SH/PanOsExploitMultitool | POC Details |
| 14 | CVE-2024-0012是Palo Alto Networks PAN-OS软件中的一个身份验证绕过漏洞。该漏洞允许未经身份验证的攻击者通过网络访问管理Web界面,获取PAN-OS管理员权限,从而执行管理操作、篡改配置,或利用其他需要身份验证的特权提升漏洞(如CVE-2024-9474) | https://github.com/Gr-1m/cve-2024-0012-poc | POC Details |
No public POC found.
Login to generate AI POCNo comments yet