A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Published: 2024-11-18
Palo Alto Networks confirmed two zero-day vulnerabilities were exploited as part of attacks in the wild against PAN-OS devices, with one being attributed to Operation Lunar Peek.
https://www.securityweek.com/cisa-warns-of-zyxel-firewall-vulnerability-exploited-in-attacks/
https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-02
https://www.theregister.com/2024/11/22/palo_alto_firewalls_under_exploit/
https://www.securityweek.com/2000-palo-alto-firewalls-compromised-via-new-vulnerabilities/
https://www.securityweek.com/palo-alto-patches-firewall-zero-day-exploited-in-operation-lunar-peek/
https://security.paloaltonetworks.com/CVE-2024-9474
https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/
Published: 2024-11-18
Updated: 2024-11-29
Base Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:C
Severity: High
Base Score: 7.2
Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Severity: High
Base Score: 5.9
Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Severity: Medium