CVE-2024-5920

4.8 MEDIUM

📋 TL;DR

This XSS vulnerability in Palo Alto Networks PAN-OS allows an authenticated read-write Panorama administrator to push malicious configurations to PAN-OS nodes, enabling impersonation of legitimate administrators. Attackers can perform restricted actions on PAN-OS nodes after executing JavaScript in an administrator's browser. Only organizations using affected PAN-OS versions with Panorama administrators are impacted.

💻 Affected Systems

Products:
  • Palo Alto Networks PAN-OS
Versions: PAN-OS 10.2 versions earlier than PAN-OS 10.2.11; PAN-OS 11.0 versions earlier than PAN-OS 11.0.6; PAN-OS 11.1 versions earlier than PAN-OS 11.1.3
Operating Systems: PAN-OS specific
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Panorama administrator with read-write privileges; affects PAN-OS nodes managed through Panorama.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with Panorama administrator access could impersonate legitimate PAN-OS administrators to modify firewall rules, create backdoors, exfiltrate sensitive network data, or disrupt network security controls.

🟠

Likely Case

Malicious or compromised Panorama administrators could escalate privileges to perform unauthorized actions on PAN-OS nodes, potentially bypassing security policies or gaining persistent access.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized Panorama administrators who would already have significant privileges, reducing the attack surface.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated Panorama administrator access; exploitation involves crafting malicious configurations and social engineering or waiting for legitimate administrator interaction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PAN-OS 10.2.11, PAN-OS 11.0.6, PAN-OS 11.1.3

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2024-5920

Restart Required: Yes

Instructions:

1. Download the appropriate PAN-OS version from the Palo Alto Networks support portal. 2. Upload the software to your firewall/Panorama. 3. Install the software update. 4. Reboot the device to complete installation. 5. Verify the new version is active.

🔧 Temporary Workarounds

Restrict Panorama Administrator Access

all

Limit read-write Panorama administrator accounts to only trusted personnel and implement strict access controls.

Implement Content Security Policy

all

Configure web application firewalls or browser security policies to restrict JavaScript execution in PAN-OS administrative interfaces.

🧯 If You Can't Patch

  • Implement strict least-privilege access controls for Panorama administrators and monitor their activities closely.
  • Use network segmentation to isolate Panorama management interfaces from general user networks and implement additional authentication layers.

🔍 How to Verify

Check if Vulnerable:

Check PAN-OS version via web interface (Device > Setup > Operations) or CLI with 'show system info' and compare against affected versions.

Check Version:

show system info | match version

Verify Fix Applied:

After patching, verify the PAN-OS version is 10.2.11, 11.0.6, 11.1.3 or later using 'show system info' command or web interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual configuration pushes from Panorama administrators
  • Multiple failed authentication attempts followed by successful Panorama login
  • JavaScript execution errors in PAN-OS administrative logs

Network Indicators:

  • Unusual traffic patterns from Panorama to PAN-OS nodes outside maintenance windows
  • Suspicious HTTP requests containing script tags or encoded payloads to administrative interfaces

SIEM Query:

source="pan_logs" AND (event_type="config_push" AND user="*admin*") OR (http_uri="*script*" AND dest_ip="PAN-OS_management_IP")

🔗 References

📤 Share & Export