CVE-2024-2433 PAN-OS: Improper Privilege Management Vulnerability in Panorama Software Leads to Availability Loss
An improper authorization vulnerability in Palo Alto Networks Panorama software enables an authenticated read-only administrator to upload files using the web interface and completely fill one of the disk partitions with those uploaded files, which prevents the ability to log into the web interface or to download PAN-OS, WildFire, and content images.
This issue affects only the web interface of the management plane; the dataplane is unaffected.
Versions | Affected | Unaffected |
---|---|---|
Cloud NGFW | None | All |
PAN-OS 11.1 | None | All |
PAN-OS 11.0 | < 11.0.3 on Panorama | >= 11.0.3 on Panorama |
PAN-OS 10.2 | < 10.2.8 on Panorama | >= 10.2.8 on Panorama |
PAN-OS 10.1 | < 10.1.12 on Panorama | >= 10.1.12 on Panorama |
PAN-OS 9.1 | < 9.1.17 on Panorama | >= 9.1.17 on Panorama |
PAN-OS 9.0 | < 9.0.17-h4 on Panorama | >= 9.0.17-h4 on Panorama |
Prisma Access | None | All |
CVSSv4.0 Base Score: 5.1 (CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/AU:Y/R:U/V:D/RE:L/U:Amber)
Palo Alto Networks is not aware of any malicious exploitation of this issue.
CWE-269 Improper Privilege Management
This issue is fixed in Panorama on PAN-OS 9.0.17-h4, PAN-OS 9.1.18, PAN-OS 10.1.12, PAN-OS 10.2.11, PAN-OS 11.0.4, and all later PAN-OS versions.
This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the effect of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.