📦 Pan Os
by Paloaltonetworks
🔍 What is Pan Os?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
An authentication bypass vulnerability in Palo Alto Networks PAN-OS software allows unauthenticated attackers with network access to the management web interface to bypass authentication and invoke ce...
An authentication bypass vulnerability in Palo Alto Networks PAN-OS software allows unauthenticated attackers with network access to the management web interface to gain administrator privileges. This...
CVE-2024-3400 is a critical command injection vulnerability in Palo Alto Networks PAN-OS GlobalProtect feature that allows unauthenticated attackers to execute arbitrary code with root privileges. It ...
This is a critical memory corruption vulnerability in Palo Alto Networks GlobalProtect portal and gateway interfaces that allows unauthenticated attackers with network access to potentially execute ar...
A critical buffer overflow vulnerability in PAN-OS allows unauthenticated attackers to send malicious requests to the Captive Portal or Multi-Factor Authentication interface, potentially executing arb...
An unauthenticated attacker can send specially crafted requests to Palo Alto Networks PAN-OS firewalls, causing them to crash and enter maintenance mode. This denial-of-service vulnerability affects a...
An authenticated administrator can bypass system restrictions in Palo Alto Networks PAN-OS management web interface to execute arbitrary commands. This affects PAN-OS firewall administrators with web ...
An authenticated command injection vulnerability in Palo Alto Networks PAN-OS allows administrative users with management interface access to execute arbitrary commands with root privileges. This affe...
An unauthenticated attacker can cause a Denial of Service (DoS) in Palo Alto Networks PAN-OS GlobalProtect by sending specially crafted packets over time, rendering the GlobalProtect portal and gatewa...
An unauthenticated attacker can send a malicious DNS packet through a Palo Alto Networks firewall's data plane, causing the firewall to reboot. Repeated exploitation forces the firewall into maintenan...
This CVE describes a privilege escalation vulnerability in Palo Alto Networks PAN-OS software where an authenticated administrator with access to the management web interface can execute commands with...
An unauthenticated attacker can send a specially crafted packet to Palo Alto Networks PAN-OS GlobalProtect gateways, causing a null pointer dereference that stops the GlobalProtect service. Repeated e...
This CVE describes a command injection vulnerability in Palo Alto Networks PAN-OS software that allows authenticated administrators to bypass system restrictions and execute arbitrary commands with ro...
This vulnerability allows an authenticated GlobalProtect user to impersonate another GlobalProtect user, disconnecting the legitimate user while hiding the attacker's identity in logs. It affects Palo...
A vulnerability in Palo Alto Networks PAN-OS software allows remote attackers to reboot firewalls by sending Windows NTLM packets from Windows servers. Repeated exploitation can force firewalls into m...
A memory leak vulnerability in Palo Alto Networks PAN-OS software allows attackers to send crafted packets that eventually cause the firewall to stop processing traffic. This affects only PA-5400 Seri...
This DOM-based XSS vulnerability in Palo Alto Networks PAN-OS allows attackers to execute malicious JavaScript in an administrator's browser by tricking them into clicking a specially crafted link. Th...
This vulnerability in Palo Alto Networks PAN-OS software allows authenticated administrators to upload malicious configurations that can disrupt system processes and potentially execute arbitrary code...
This CVE-2021-3059 is an OS command injection vulnerability in Palo Alto Networks PAN-OS management interface that allows man-in-the-middle attackers to execute arbitrary OS commands and escalate priv...
An improper access control vulnerability in PAN-OS allows authenticated GlobalProtect users to access the EC2 instance metadata endpoint on AWS-hosted VM-Series firewalls. This enables attackers to pe...
A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN allows authenticated attackers to execute arbitrary code with root privileges during SAML authentication. Th...
An unauthenticated attacker can send specially crafted network traffic through Palo Alto Networks PAN-OS firewalls to crash the dataplane service. Repeated exploitation causes the device to restart in...
An authenticated file read vulnerability in Palo Alto Networks PAN-OS software allows authenticated attackers with management web interface access to read files accessible by the 'nobody' user. This a...
This XSS vulnerability in Palo Alto Networks PAN-OS allows an authenticated read-write Panorama administrator to push malicious configurations to PAN-OS nodes, enabling impersonation of legitimate adm...
An improper certificate validation vulnerability in Palo Alto Networks PAN-OS allows an authorized user with a specially crafted client certificate to connect to GlobalProtect portal/gateway as a diff...
This CVE describes a command injection vulnerability in Palo Alto Networks PAN-OS software that allows authenticated administrators to bypass system restrictions and delete files on the firewall. The ...
This vulnerability allows authenticated administrators (including read-only admins) with CLI access to read arbitrary files on Palo Alto Networks firewalls. It affects PAN-OS systems where administrat...
This vulnerability in Palo Alto Networks PAN-OS allows read-only administrators with config log access to unintentionally view secrets, passwords, and tokens for external systems. It affects organizat...
An improper input validation vulnerability in Palo Alto Networks PAN-OS software allows attackers with physical file system access to elevate privileges. This affects PAN-OS firewalls and Panorama man...
An authenticated administrator in Palo Alto Networks PAN-OS software can view session tokens of users logged into the firewall web UI, potentially enabling impersonation of those users. This affects P...