CVE-2024-2552

6.0 MEDIUM

📋 TL;DR

This CVE describes a command injection vulnerability in Palo Alto Networks PAN-OS software that allows authenticated administrators to bypass system restrictions and delete files on the firewall. The vulnerability affects administrators with management plane access to PAN-OS firewalls. Attackers could exploit this to delete critical system files and potentially disrupt firewall operations.

💻 Affected Systems

Products:
  • Palo Alto Networks PAN-OS
Versions: Specific versions not provided in reference; check vendor advisory for exact affected versions
Operating Systems: PAN-OS (custom OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects PAN-OS firewalls with administrator accounts. Requires authenticated access to management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with administrator credentials could delete critical system files, causing firewall failure, service disruption, and potential loss of network security controls.

🟠

Likely Case

Malicious insider or compromised administrator account could delete configuration files, logs, or system files, leading to service disruption and operational impact.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized administrators performing legitimate file deletion operations.

🌐 Internet-Facing: LOW - This vulnerability requires authenticated administrator access to the management plane, which should not be internet-facing.
🏢 Internal Only: HIGH - Internal administrators or compromised admin accounts can exploit this vulnerability to delete critical files on firewalls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires authenticated administrator access but command injection is straightforward once authenticated.

Exploitation requires administrator credentials. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific fixed versions

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2024-2552

Restart Required: Yes

Instructions:

1. Check affected versions in vendor advisory. 2. Download appropriate PAN-OS update. 3. Apply update through management interface. 4. Reboot firewall as required. 5. Verify update applied successfully.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit administrator accounts to only trusted personnel and implement multi-factor authentication.

Network Segmentation

all

Ensure firewall management interfaces are not accessible from untrusted networks.

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for administrator accounts
  • Regularly audit administrator activities and file system changes on firewalls

🔍 How to Verify

Check if Vulnerable:

Check PAN-OS version against affected versions in vendor advisory. Review administrator access logs for suspicious file deletion activities.

Check Version:

show system info (in PAN-OS CLI) or check version in web interface

Verify Fix Applied:

Verify PAN-OS version is updated to patched version specified in vendor advisory. Test administrator file deletion capabilities are properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file deletion events in system logs
  • Administrator account performing unusual file operations
  • Failed file deletion attempts that bypass normal restrictions

Network Indicators:

  • Unusual management plane traffic patterns
  • Multiple file deletion requests from single administrator session

SIEM Query:

source="pan-firewall" AND (event_type="file_deletion" OR command="rm" OR command="delete") AND user_role="administrator"

🔗 References

📤 Share & Export