A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Published: 2024-11-18
Palo Alto Networks confirmed two zero-day vulnerabilities were exploited as part of attacks in the wild against PAN-OS devices, with one being attributed to Operation Lunar Peek.
https://www.securityweek.com/second-recently-patched-flaw-exploited-to-hack-palo-alto-firewalls/
https://www.theregister.com/2025/02/19/palo_alto_firewall_attack/
https://thehackernews.com/2025/02/cisa-adds-palo-alto-networks-and.html
https://cyberscoop.com/edge-device-vulnerabilities-fuel-attack-sprees/
https://www.securityweek.com/palo-alto-networks-confirms-exploitation-of-firewall-vulnerability/
https://www.securityweek.com/hackers-exploit-palo-alto-firewall-vulnerability-day-after-disclosure/
https://www.securityweek.com/cisa-warns-of-zyxel-firewall-vulnerability-exploited-in-attacks/
https://www.theregister.com/2024/11/22/palo_alto_firewalls_under_exploit/
https://www.securityweek.com/2000-palo-alto-firewalls-compromised-via-new-vulnerabilities/
https://www.securityweek.com/palo-alto-patches-firewall-zero-day-exploited-in-operation-lunar-peek/
https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/
Published: 2024-11-18
Updated: 2024-12-20
Known Exploited Vulnerability (KEV)
Base Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:C
Severity: High
Base Score: 7.2
Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Severity: High
Base Score: 5.9
Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Severity: Medium
EPSS: 0.94283
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest