Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Palo Alto Networks — Vulnerabilities & Security Advisories 281

Browse all 281 CVE security advisories affecting Palo Alto Networks. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Palo Alto Networks operates as a prominent cybersecurity vendor, primarily providing next-generation firewalls, cloud security solutions, and endpoint protection platforms to enterprise clients. The company’s software ecosystem, particularly its PAN-OS operating system, has historically been associated with a significant volume of Common Vulnerabilities and Exposures, currently totaling 280 recorded instances. These vulnerabilities frequently involve remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from input validation errors or improper access controls within management interfaces. While the firm maintains a robust security posture through regular patching cycles and proactive threat intelligence integration, the high CVE count reflects the complexity of its extensive feature set and the broad attack surface inherent in critical infrastructure components. Major incidents have been limited, with most issues resolved via timely updates, though the sheer number of disclosed flaws underscores the challenges of securing large-scale, continuously updated network security appliances.

CVE IDTitleCVSSSeverityPublished
CVE-2021-3050 PAN-OS: OS Command Injection Vulnerability in Web Interface — PAN-OSCWE-78 8.8 High2021-08-11
CVE-2021-3048 PAN-OS: Invalid URLs in an External Dynamic List (EDL) can Lead to Firewall Outage — PAN-OSCWE-20 5.9 Medium2021-08-11
CVE-2021-3047 PAN-OS: Weak Cryptography Used in Web Interface Authentication — PAN-OSCWE-338 4.2 Medium2021-08-11
CVE-2021-3046 PAN-OS: Improper SAML Authentication Vulnerability in GlobalProtect Portal — PAN-OSCWE-287 6.8 Medium2021-08-11
CVE-2021-3045 PAN-OS: OS Command Argument Injection in Web Interface — PAN-OSCWE-88 4.9 Medium2021-08-11
CVE-2021-3043 Prisma Cloud: Cross-Site Scripting (XSS) Vulnerability in Prisma Cloud Compute Web Console — Prisma Cloud ComputeCWE-79 7.5 High2021-07-15
CVE-2021-3042 Cortex XDR Agent: Improper Control of User-Controlled File Leads to Local Privilege Escalation — Cortex XDR AgentCWE-427 7.8 High2021-07-15
CVE-2021-3044 Cortex XSOAR: Unauthorized Usage of the REST API — Cortex XSOARCWE-285 9.8 Critical2021-06-22
CVE-2021-3041 Cortex XDR Agent: Improper control of user-controlled file leads to local privilege escalation — Cortex XDR AgentCWE-427 7.8 High2021-06-10
CVE-2021-3039 Prisma Cloud Compute: User role authorization secret for Console leaked through log file export — Prisma Cloud ComputeCWE-532 3.8 Low2021-06-10
CVE-2021-3040 Bridgecrew Checkov: Unsafe deserialization of Terraform files allows code execution — Bridgecrew CheckovCWE-502 6.7 Medium2021-06-10
CVE-2021-3038 GlobalProtect App: Windows VPN kernel driver denial of service (DoS) — GlobalProtect AppCWE-20 5.5 Medium2021-04-20
CVE-2021-3037 PAN-OS: Secrets for scheduled configuration exports are logged in system logs — PAN-OSCWE-534 2.3 Low2021-04-20
CVE-2021-3035 Bridgecrew Checkov: Unsafe deserialization of Terraform files allows code execution — Bridgecrew CheckovCWE-502 6.7 Medium2021-04-20
CVE-2021-3036 PAN-OS: Administrator secrets are logged in web server logs when using the PAN-OS XML API incorrectly — PAN-OSCWE-532 4.4 Medium2021-04-20
CVE-2021-3034 Cortex XSOAR: Secrets for SAML single sign-on (SSO) integration may be logged in system logs — Cortex XSOARCWE-532 5.1 Medium2021-03-10
CVE-2021-3033 Prisma Cloud Compute: SAML Authentication Bypass Vulnerability in Console — Prisma Cloud ComputeCWE-347 9.1 Critical2021-02-10
CVE-2021-3032 PAN-OS: Configuration secrets for log forwarding may be logged in system logs — PAN-OSCWE-532 4.4 Medium2021-01-13
CVE-2021-3031 PAN-OS: Information exposure in Ethernet data frame construction (Etherleak) — PAN-OSCWE-200 4.3 Medium2021-01-13
CVE-2020-2049 Cortex XDR Agent: Improper control of loaded DLL leads to local privilege escalation — Cortex XDR AgentCWE-427 7.8 High2020-12-09
CVE-2020-2020 Cortex XDR Agent: Exceptional condition denial-of-service (DoS) — Cortex XDR AgentCWE-755 5.5 Medium2020-12-09
CVE-2020-2050 PAN-OS: Authentication bypass vulnerability in GlobalProtect SSL VPN client certificate verification — PAN-OSCWE-285 8.2 High2020-11-12
CVE-2020-2048 PAN-OS: System proxy passwords may be logged in clear text while viewing system state — PAN-OSCWE-532 3.3 Low2020-11-12
CVE-2020-2022 PAN-OS: Panorama session disclosure during context switch into managed device — PAN-OSCWE-200 7.5 High2020-11-12
CVE-2020-1999 PAN-OS: Threat signatures are evaded by specifically crafted packets — PAN-OSCWE-754 5.3 Medium2020-11-12
CVE-2020-2000 PAN-OS: OS command injection and memory corruption vulnerability — PAN-OSCWE-20 7.2 High2020-11-12
CVE-2020-2043 PAN-OS: Passwords may be logged in clear text when using after-change-detail custom syslog field for config logs — PAN-OSCWE-532 3.3 Low2020-09-09
CVE-2020-2044 PAN-OS: Passwords may be logged in clear text while storing operational command (op command) history — PAN-OSCWE-532 3.3 Low2020-09-09
CVE-2020-2042 PAN-OS: Buffer overflow in the management web interface — PAN-OSCWE-121 7.2 High2020-09-09
CVE-2020-2040 PAN-OS: Buffer overflow when Captive Portal or Multi-Factor Authentication (MFA) is enabled — PAN-OSCWE-120 9.8 Critical2020-09-09

This page lists every published CVE security advisory associated with Palo Alto Networks. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.