Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-9474— PAN-OS: Privilege Escalation (PE) Vulnerability in the Web Management Interface

KEV · Ransomware EPSS 94.17% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-9474

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
PAN-OS: Privilege Escalation (PE) Vulnerability in the Web Management Interface
Source: NVD (National Vulnerability Database)
Vulnerability Description
A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Palo Alto Networks PAN-OS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Palo Alto Networks PAN-OS是美国Palo Alto Networks公司的一套为其防火墙设备开发的操作系统。 Palo Alto Networks PAN-OS存在安全漏洞,该漏洞源于存在权限提升漏洞,允许有权访问管理Web界面的PAN-OS管理员以root权限在防火墙上执行操作。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Palo Alto NetworksCloud NGFW--
Palo Alto NetworksPAN-OS 11.2.0 ~ 11.2.4-h1 -
Palo Alto NetworksPrisma Access--

II. Public POCs for CVE-2024-9474

#POC DescriptionSource LinkShenlong Link
1PAN-OS auth bypass + RCEhttps://github.com/Chocapikk/CVE-2024-9474POC Details
2Nonehttps://github.com/k4nfr3/CVE-2024-9474POC Details
3PoC for PAN-OS Exploithttps://github.com/deathvu/CVE-2024-9474POC Details
4Palo Alto Networks PAN-OS(CVE-2024-9474) POChttps://github.com/coskper-papa/PAN-OS_CVE-2024-9474POC Details
5Palo Alto RCE Vulnhttps://github.com/aratane/CVE-2024-9474POC Details
6PAN-OS auth bypass + RCEhttps://github.com/uniformince/CVE-2024-9474POC Details
7PAN-OS auth bypass + RCEhttps://github.com/concretesign/CVE-2024-9474POC Details
8PAN-OS auth bypass + RCEhttps://github.com/optimistickn/CVE-2024-9474POC Details
9PAN-OS auth bypass + RCEhttps://github.com/dazzlingteap/CVE-2024-9474POC Details
10PAN-OS auth bypass + RCEhttps://github.com/experiencedt/CVE-2024-9474POC Details
11PAN-OS auth bypass + RCEhttps://github.com/stupidgossi/CVE-2024-9474POC Details
12PAN-OS auth bypass + RCEhttps://github.com/worthytop/CVE-2024-9474POC Details
13A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-9474.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-9474

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-9474

No comments yet


Leave a comment