CVE-2024-9474

7.2 HIGH

📋 TL;DR

This CVE describes a privilege escalation vulnerability in Palo Alto Networks PAN-OS software where an authenticated administrator with access to the management web interface can execute commands with root privileges. Only PAN-OS administrators are affected, while Cloud NGFW and Prisma Access deployments are not impacted.

💻 Affected Systems

Products:
  • Palo Alto Networks PAN-OS
Versions: PAN-OS 10.2 versions earlier than 10.2.12, PAN-OS 11.0 versions earlier than 11.0.8, PAN-OS 11.1 versions earlier than 11.1.4
Operating Systems: PAN-OS specific
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects physical and virtual firewalls running PAN-OS. Cloud NGFW and Prisma Access are NOT affected. Requires administrator access to the management web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious administrator could gain full root control over the firewall, allowing them to modify configurations, exfiltrate sensitive data, disable security controls, or pivot to other network segments.

🟠

Likely Case

An administrator with legitimate access could unintentionally or intentionally execute privileged commands beyond their intended scope, potentially causing service disruption or configuration changes.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to authorized administrators who should already have significant system access, though they could still exceed intended privileges.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authenticated administrator access. Public proof-of-concept code is available. CISA has added this to their Known Exploited Vulnerabilities catalog.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PAN-OS 10.2.12, PAN-OS 11.0.8, PAN-OS 11.1.4

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2024-9474

Restart Required: Yes

Instructions:

1. Download the appropriate PAN-OS hotfix from the Palo Alto support portal. 2. Upload the hotfix to the firewall via the web interface or CLI. 3. Install the hotfix. 4. Reboot the firewall to complete the installation.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit the number of administrators with web interface access and implement strict access controls.

Enable Command Logging

all

Enable detailed command logging and monitoring for administrator activities.

🧯 If You Can't Patch

  • Implement strict role-based access control (RBAC) to limit administrator privileges
  • Enable comprehensive logging and monitoring of all administrator activities

🔍 How to Verify

Check if Vulnerable:

Check PAN-OS version via web interface (Device > Setup > Operations) or CLI (show system info). Compare against affected versions.

Check Version:

show system info | match version

Verify Fix Applied:

Verify PAN-OS version is 10.2.12, 11.0.8, 11.1.4 or later. Check that no unauthorized privilege escalation attempts are logged.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrator command execution patterns
  • Privilege escalation attempts in system logs
  • Unexpected configuration changes by administrators

Network Indicators:

  • Unusual administrative traffic patterns
  • Unexpected outbound connections from firewall management interface

SIEM Query:

source="pan-firewall" AND (event_type="admin" OR event_type="system") AND (command="*" OR action="escalate")

🔗 References

📤 Share & Export