Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-9471— PAN-OS: Privilege Escalation (PE) Vulnerability in XML API

EPSS 0.28% · P51
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-9471

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
PAN-OS: Privilege Escalation (PE) Vulnerability in XML API
Source: NVD (National Vulnerability Database)
Vulnerability Description
A privilege escalation (PE) vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated PAN-OS administrator with restricted privileges to use a compromised XML API key to perform actions as a higher privileged PAN-OS administrator. For example, an administrator with "Virtual system administrator (read-only)" access could use an XML API key of a "Virtual system administrator" to perform write operations on the virtual system configuration even though they should be limited to read-only operations.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
特权管理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Palo Alto Networks PAN-OS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Palo Alto Networks PAN-OS是美国Palo Alto Networks公司的一套为其防火墙设备开发的操作系统。 Palo Alto Networks PAN-OS存在安全漏洞。攻击者利用该漏洞可以提升权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Palo Alto NetworksPAN-OS 11.0.0 ~ 11.0.3 cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h4:*:*:*:*:*:*
Palo Alto NetworksCloud NGFW--
Palo Alto NetworksPrisma Access--

II. Public POCs for CVE-2024-9471

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-9471

登录查看更多情报信息。

Same Patch Batch · Palo Alto Networks · 2024-10-09 · 10 CVEs total

CVE-2024-9463Expedition: Unauthenticated OS Command Injection Vulnerability Leads to Firewall Credentia
CVE-2024-9464Expedition: Authenticated OS Command Injection Vulnerability Leads to Firewall Admin Crede
CVE-2024-9465Expedition: SQL Injection Leads to Firewall Admin Credential Disclosure
CVE-2024-9466Expedition: Cleartext Storage of Information Leads to Firewall Admin Credential Disclosure
CVE-2024-9467Expedition: Reflected Cross-Site Scripting Vulnerability Leads to Expedition Session Discl
CVE-2024-9468PAN-OS: Firewall Denial of Service (DoS) via a Maliciously Crafted Packet
CVE-2024-9469Cortex XDR Agent: Local Windows User Can Disable the Agent
CVE-2024-9470Cortex XSOAR: Information Disclosure Vulnerability
CVE-2024-9473GlobalProtect App: Local Privilege Escalation (PE) Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2024-9471

No comments yet


Leave a comment