CVE-2024-0012

Published Nov 18, 2024

Last updated 2 days ago

Insights

Analysis from the Intruder Security Team
Published Nov 19, 2024 Updated Nov 19, 2024

The vulnerabilities CVE-2024-0012 and CVE-2024-9474 can be combined to allow for an unauthenticated attacker to gain command line access to the vulnerable device. Compromising a vulnerable device would allow an attacker to gain access to internal networks as these devices are designed to sit on the edge of networks.

The vulnerability is due to a misconfigured Nginx instance and a command injection vulnerability, both of which are exploitable in the devices default state. Watchtowr have released a technical blog post detailing the vulnerability and its exploitation.

Palo Alto have released patches and hotfixes for the PAN-OS vulnerabilities, details are available here and here.

Overview

Description
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 . The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended  best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Source
psirt@paloaltonetworks.com
NVD status
Analyzed

Risk scores

CVSS 4.0

Type
Secondary
Base score
9.3
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:H/U:Red
Severity
CRITICAL

CVSS 3.1

Type
Primary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability
Exploit added on
Nov 18, 2024
Exploit action due
Dec 9, 2024
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, management interface for affected devices should not be exposed to untrusted networks, including the internet.

Weaknesses

nvd@nist.gov
CWE-306
psirt@paloaltonetworks.com
CWE-306

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

19

  1. 🚨PSA: Don't forget to patch your @PaloAltoNtwks firewalls, or at a minimum, disable public access to the management interfaces if you have them wide open ... CVE-2024-0012 enables an unauthenticated attacker to gain administrator privileges! CVE-2024-9474 also in the wild! htt

    @cloudpropeller

    21 Nov 2024

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    2 Replies

    0 Quotes

  2. [Threat][MY]🔴 Active Exploitation of Critical RCE in Palo Alto Networks PAN-OS [CVE-2024-0012 and CVE-2024-9474] Type: Critical Vuln Date: 18 Nov 2024 Refer: https://t.co/n5iGR0L5iB Malaysia: 89 hosts potentially affected #rectifyq #cti #threatintel #threatintelligence https:/

    @_rectifyq

    20 Nov 2024

    1093 Impressions

    6 Retweets

    10 Likes

    8 Bookmarks

    1 Reply

    0 Quotes

  3. Latest Known Exploited Vulnerabilities (#KEV) : #CVE-2024-0012 Palo Alto Networks #PAN-OS Management Interface Authentication Bypass Vulnerability https://t.co/lPCcIeEDMi

    @ScyScan

    20 Nov 2024

    66 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. 🚨 Operation Lunar Peek: Critical PAN-OS Vulnerabilities Need Immediate Action! Authentication bypass allows unauthorized admin access. #CyberSecurity 🔑 Key Details: - 🛡️ Two critical vulnerabilities (CVE-2024-0012 & CVE-2024-9474) - 🔍 Active exploitation with webshell… h

    @ctilabs

    20 Nov 2024

    113 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. 𝗪𝗵𝗮𝘁 𝗶𝘀 𝗶𝘁? CVE-2024-0012 is a command injection vulnerability that allows attackers to execute code in your Palo Alto firewall. 𝗛𝗼𝘄 𝗱𝗼𝗲𝘀 𝗶𝘁 𝘄𝗼𝗿𝗸? Attackers access the login page for the web interface and enter metacharacters into the username field. https:

    @CERTJersey

    20 Nov 2024

    107 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  6. Palo Alto Networks ha lanzado oficialmente parches para dos #vulnerabilidades que (CVE-2024-0012 / CVE-2024-9474) están siendo explotadas activamente en el entorno reales, permitiendo a los #ciberdelincuentes realizar actividades maliciosas. https://t.co/VMEwnQQl2G

    @AlexMilla_

    20 Nov 2024

    31 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. Analysis & PoC Exploits Released for Palo Alto Zero-Days – CVE-2024-0012 and CVE-2024-9474 https://t.co/R1RQ73ZYu7

    @Dinosn

    20 Nov 2024

    2738 Impressions

    15 Retweets

    48 Likes

    9 Bookmarks

    0 Replies

    0 Quotes

  8. A threat brief on Operation Lunar Peek reveals limited activity related to CVE-2024-0012, an authentication bypass vulnerability in specific PAN-OS versions, along with protections and mitigations. #CyberSecurity #ThreatBrief https://t.co/8ew02AirRV

    @Cyber_O51NT

    20 Nov 2024

    1055 Impressions

    4 Retweets

    16 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  9. 【更新】Palo Alto Networks製PAN-OSの管理インタフェースにおける複数の脆弱性(CVE-2024-0012、CVE-2024-9474)に関する注意喚起を更新。「本脆弱性の詳細を解説する情報が公開されており、その後新たに観測された攻撃活動を追跡している」と同社がブログを更新。^KK https://t.co/O3opNfFEno

    @jpcert

    20 Nov 2024

    3092 Impressions

    10 Retweets

    13 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  10. This threat brief discusses observed exploitation activity of authentication bypass vulnerability CVE-2024-0012, which affects specific versions of PAN-OS software. https://t.co/rZigbVICu6

    @DetRiley

    20 Nov 2024

    47 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. Our threat brief on CVE-2024-0012 and CVE-2024-9474 has been updated to include new IoCs, as well as expand the Current Scope of the Attack section — read the details now: https://t.co/8wvD9yREyp https://t.co/aQctVY6AsY

    @Unit42_Intel

    20 Nov 2024

    3767 Impressions

    10 Retweets

    29 Likes

    7 Bookmarks

    0 Replies

    1 Quote

  12. PaloAlto'nun SSLVPN cihazlarında iki Güvenlik Açığı (CVE-2024-0012 / CVE-2024-9474) Bu açıklardan biri, cihazın yönetim arayüzüne erişim sağlayarak kimlik doğrulamayı atlatmayı ve kullanıcı yetkisi yükseltme imkanı tanıyor. Diğer açık ise uzaktan komut yürütme imkanı sağlıyor.…

    @AydemirSerhat

    19 Nov 2024

    136 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. Palo Alto Networks 製 PAN-OS の脆弱性対策について(CVE-2024-0012等) | 情報セキュリティ | IPA 独立行政法人 情報処理推進機構 https://t.co/dMrzOhvjkz

    @fyi787

    19 Nov 2024

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. 🛡️ Palo Alto PAN-OS Pre-Auth RCE Chain (CVE-2024-0012 & CVE-2024-9474) 🔗 Research: https://t.co/eypPlzx1UY 🔗 PoC: https://t.co/CUOsfGeoGU 🔗 Exploit: https://t.co/HR8scShAl2 #paloalto #panos #sslvpn #unauth #rce https://t.co/uT72W2OZZN

    @HackingTeam777

    19 Nov 2024

    3847 Impressions

    30 Retweets

    95 Likes

    53 Bookmarks

    0 Replies

    0 Quotes

  15. Palo Alto Networks製PAN-OSの管理インタフェースにおける複数の脆弱性(CVE-2024-0012、CVE-2024-9474)に関する注意喚起 #JPCERTCC (Nov 19) https://t.co/ACXsVAmjn4

    @foxbook

    19 Nov 2024

    296 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. CVE-2024-0012 and CVE-2024-9474 : Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) and Authenticated Command Injection in Palo Alto PAN-OS https://t.co/qjYit9vR9A https://t.co/JbhycILNc9

    @cyber_advising

    19 Nov 2024

    5323 Impressions

    20 Retweets

    91 Likes

    27 Bookmarks

    0 Replies

    0 Quotes

  17. CVE-2024-0012, CVE-2024-9474: vulnerabilidades de dia zero no Palo Alto PAN-OS exploradas na natureza https://t.co/b0S5EJ6qEU https://t.co/JQp4MHjgs6

    @dansantanna

    19 Nov 2024

    88 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. CVE-2024-9463 is getting exploited #inthewild. Find out more at https://t.co/1tb5ZXWUiM CVE-2024-9474 is getting exploited #inthewild. Find out more at https://t.co/4mYMUZJast CVE-2024-0012 is getting exploited #inthewild. Find out more at https://t.co/QEsNwNF3YH

    @inthewildio

    19 Nov 2024

    119 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  19. We now have a @metasploit exploit module in the pull queue for the PAN-OS management interface unauthenticated RCE exploit chain (CVE-2024-0012 + CVE-2024-9474), based upon the technical analysis published today by @watchtowrcyber. https://t.co/dk7XXN7s1O https://t.co/xpu4iNn0A5

    @stephenfewer

    19 Nov 2024

    23779 Impressions

    96 Retweets

    249 Likes

    87 Bookmarks

    3 Replies

    6 Quotes

  20. GitHub - watchtowrlabs/palo-alto-panos-cve-2024-0012 - https://t.co/28XxivR4a3

    @piedpiper1616

    19 Nov 2024

    2567 Impressions

    17 Retweets

    31 Likes

    16 Bookmarks

    0 Replies

    0 Quotes

  21. Palo Alto Networks has addressed two critical vulnerabilities in their PAN-OS software, identified as CVE-2024-0012 and CVE-2024-9474, which were exploited in an operation named 'Lunar Peek'. These vulnerabilities allowed attackers to execute commands remotely without… https://t.

    @XArthurDent

    19 Nov 2024

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. CVE-2024-0012, CVE-2024-9474: Zero-Day Vulnerabilities in Palo Alto PAN-OS Exploited In The Wild https://t.co/orD3lW1HJ5 https://t.co/irWOY9G2Xx

    @ggrubamn

    19 Nov 2024

    71 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. CVE-2024-0012, CVE-2024-9474: Zero-Day Vulnerabilities in Palo Alto PAN-OS Exploited In The Wild https://t.co/o3HueSKg3v https://t.co/BVv7kWnENO

    @Trej0Jass

    19 Nov 2024

    54 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  24. Palo Alto patches two firewall zero-days used in attacks. Palo Alto Networks has finally released security updates for two actively exploited zero-day vulnerabilities in its Next-Generation Firewalls (NGFW) tracked as CVE-2024-0012 and (CVE-2024-9474). https://t.co/iYnHIDIz36 ht

    @riskigy

    19 Nov 2024

    79 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. CVE-2024-0012, CVE-2024-9474: Zero-Day Vulnerabilities in Palo Alto PAN-OS Exploited In The Wild https://t.co/I9i6N3b8I2 https://t.co/AxazYFjpyJ

    @secured_cyber

    19 Nov 2024

    76 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  26. CVE-2024-0012, CVE-2024-9474: Zero-Day Vulnerabilities in Palo Alto PAN-OS Exploited In The Wild https://t.co/u0dBtZ02yB https://t.co/RxiVrSRkzn

    @Art_Capella

    19 Nov 2024

    88 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. paloalto PAN-OS: 管理 Web インターフェイスでの認証バイパス CVE-2024-0012 この脆弱性により、認証なしで管理用Webインターフェイスにアクセスできるようになるため、攻撃者は管理者権限を得て不正な操作を行うリスクがあります。 CISAより既知の悪用された脆弱性カタログに追加されました。 https://t.co/XiUiTwLtmw

    @t_nihonmatsu

    19 Nov 2024

    358 Impressions

    0 Retweets

    6 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  28. Pots and Pans, AKA an SSLVPN - Palo Alto PAN-OS CVE-2024-0012 and CVE-2024-9474 - watchTowr Labs https://t.co/gex42uHJQC

    @_r_netsec

    19 Nov 2024

    835 Impressions

    0 Retweets

    3 Likes

    2 Bookmarks

    0 Replies

    0 Quotes

  29. in today's 'no way, is it real?' we found out that Palo Alto's PAN-OS CVE-2024-0012 and CVE-2024-9474 were the equivalents of saying 'turn off auth and give me a shell'. Enjoy! https://t.co/P0PZq0diFF

    @watchtowrcyber

    19 Nov 2024

    62800 Impressions

    135 Retweets

    361 Likes

    151 Bookmarks

    11 Replies

    9 Quotes

  30. CISA KEV Catalog Update Part IV- November 2024 #USCISA #CVE-2024-0012 #CVE-2024-1212 #CVE-2024-9474 https://t.co/dXjn5kH72t

    @pravin_karthik

    19 Nov 2024

    57 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  31. やめてくれぇ…これ以上虐めないでくれぇ… Palo Alto Networks製PAN-OSの管理インタフェースにおける複数の脆弱性(CVE-2024-0012、CVE-2024-9474)に関する注意喚起 https://t.co/mK0X9UmKYm

    @na_nicomas

    19 Nov 2024

    34 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  32. Palo Alto Networks製PAN-OSの管理インタフェースにおける複数の脆弱性(CVE-2024-0012、CVE-2024-9474)に関する注意喚起 https://t.co/xFPqhqBNjh @jpcert

    @QXM399BRH

    19 Nov 2024

    108 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. Palo Alto Networks 製 PAN-OS の脆弱性対策について(CVE-2024-0012等) | 情報セキュリティ | IPA 独立行政法人 情報処理推進機構 https://t.co/bMBXGhOsV8

    @piyokango

    19 Nov 2024

    4701 Impressions

    4 Retweets

    16 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  34. Palo Alto Networks 製 PAN-OS の脆弱性対策について(CVE-2024-0012等) https://t.co/eBYHxpsf1G

    @ICATalerts

    19 Nov 2024

    7309 Impressions

    8 Retweets

    16 Likes

    2 Bookmarks

    0 Replies

    1 Quote

  35. 🚨 CISA Adds 3 New Vulnerabilities to KEV Catalog 🚨 CVE-2024-0012: PAN-OS Authentication Bypass CVE-2024-9474: PAN-OS Command Injection CVE-2024-1212: Kemp LoadMaster OS Command Injection More details ➡️ https://t.co/ALCbFIaroK #CyberSecurity #CISAUpdates

    @decrypting_sec

    19 Nov 2024

    67 Impressions

    0 Retweets

    2 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  36. 注意喚起: Palo Alto Networks製PAN-OSの管理インタフェースにおける複数の脆弱性(CVE-2024-0012、CVE-2024-9474)に関する注意喚起 (公開) https://t.co/EX4pWNPxHq

    @AileenWoodstock

    19 Nov 2024

    70 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  37. Palo Alto Networks製PAN-OSの管理インタフェースにおける複数の脆弱性(CVE-2024-0012、CVE-2024-9474)に関する注意喚起を公開。同社は脆弱性を悪用する攻撃を確認しています。対策や緩和策の適用、調査の実施などをご検討ください。^KK https://t.co/O3opNfFEno

    @jpcert

    19 Nov 2024

    4696 Impressions

    18 Retweets

    34 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

  38. 統合版 JPCERT/CC | 注意喚起: Palo Alto Networks製PAN-OSの管理インタフェースにおける複数の脆弱性(CVE-2024-0012、CVE-2024-9474)に関する注意喚起 (公開) https://t.co/cnvMwo7QHU #itsec_jp

    @itsec_jp

    19 Nov 2024

    38 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  39. Palo Alto Networks has recently patched multiple critical vulnerabilities in their products, notably an authentication bypass vulnerability in the PAN-OS management web interface (CVE-2024-0012), which has been exploited in real-world scenarios. This flaw allows attackers with… h

    @XArthurDent

    19 Nov 2024

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  40. CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) https://t.co/KC0kt44fDD Palo Alto Networks thanks our Deep Product Security Research Team for discovering this issue internally from threat activity.🤡🤡🤡🤡

    @h4x0r_dz

    19 Nov 2024

    3927 Impressions

    13 Retweets

    78 Likes

    18 Bookmarks

    1 Reply

    0 Quotes

  41. CISA Adds Three Known Exploited Vulnerabilities to Catalog: CVE-2024-1212 - Progress Kemp LoadMaster CVE-2024-0012 - Palo Alto Networks PAN-OS CVE-2024-9474 - Palo Alto Networks PAN-OS https://t.co/Biz2eLeyrs https://t.co/FpucU4b5W3

    @TMJIntel

    19 Nov 2024

    124 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  42. Palo Alto Networks has recently addressed two critical zero-day vulnerabilities in their firewall systems, identified as CVE-2024-0012 and CVE-2024-9474. These vulnerabilities enabled attackers to execute remote commands without authentication and bypass authentication… https://t

    @XArthurDent

    18 Nov 2024

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. CVE-2024-0012, CVE-2024-9474: Zero-Day Vulnerabilities in Palo Alto PAN-OS Exploited In The Wild https://t.co/0f4ARoaYDn https://t.co/OCSWh3JoN0

    @ChrisMenjivar4

    18 Nov 2024

    78 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  44. 🚨 Critical Patch 🚨 Palo Alto Networks has just patched two critical zero-day vulnerabilities in their PAN-OS firewall software. These flaws were actively exploited in attacks: CVE-2024-0012 CVE-2024-9474 #CyberSecurity #Firewall #PatchNow https://t.co/aNr7SS8Ez9

    @IntCyberDigest

    18 Nov 2024

    70 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  45. 🛡️ We added #PaloAltoNetworks PAN-OS & #ProgressKemp LoadMaster vulnerabilities, CVE-2024-0012, CVE-2024-9474, & CVE-2024-1212 to our Known Exploited Vulnerabilities Catalog. Visit https://t.co/myxOwap1Tf & apply mitigations to protect your org from cyberattacks. #In

    @CISACyber

    18 Nov 2024

    7673 Impressions

    35 Retweets

    68 Likes

    8 Bookmarks

    4 Replies

    5 Quotes

  46. Palo Alto Networks has disclosed two critical zero-day vulnerabilities in their PAN-OS software, identified as CVE-2024-0012 and CVE-2024-9474. These vulnerabilities enable attackers to bypass authentication on the management web interface, potentially gaining administrative… htt

    @XArthurDent

    18 Nov 2024

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  47. Palo Alto Networks has disclosed multiple vulnerabilities in its PAN-OS software and Expedition Migration tool, with several being actively exploited. Key vulnerabilities include CVE-2024-0012, an authentication bypass in the management web interface, and CVE-2024-9474.… https://

    @XArthurDent

    18 Nov 2024

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  48. Recent cybersecurity disclosures have revealed critical vulnerabilities in widely used systems. Palo Alto Networks reported two zero-day vulnerabilities in their PAN-OS firewall software, CVE-2024-0012 and CVE-2024-9474, which are being actively exploited to bypass authentication

    @XArthurDent

    18 Nov 2024

    0 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  49. CVE-2024-0012 and CVE-2024-9474: Actively Exploited Vulnerabilities Impact Palo Alto Networks PAN-OS Learn about the critical vulnerabilities in Palo Alto Networks PAN-OS software. CVE-2024-0012 and CVE-2024-9474 pose significant risks to network security https://t.co/pSqc4jM3Ju

    @the_yellow_fall

    18 Nov 2024

    508 Impressions

    3 Retweets

    11 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  50. CVE-2024-0012 An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS ad… https://t.co/2u9Y2Lgwml

    @CVEnew

    18 Nov 2024

    309 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations