
Analysis from the Intruder Security Team
 Published Nov 19, 2024
The vulnerabilities CVE-2024-0012 and CVE-2024-9474 can be combined to allow for an unauthenticated attacker to gain command line access to the vulnerable device. Compromising a vulnerable device would allow an attacker to gain access to internal networks as these devices are designed to sit on the edge of networks.
The vulnerability is due to a misconfigured Nginx instance and a command injection vulnerability, both of which are exploitable in the devices default state. Watchtowr have released a technical blog post detailing the vulnerability and its exploitation.
Palo Alto have released patches and hotfixes for the PAN-OS vulnerabilities, details are available here and here.
[
  {
    "nodes": [
      {
        "negate": false,
        "cpeMatch": [
          {
            "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "7D294CCB-C898-444E-BD41-D423B96F8E23",
            "versionEndExcluding": "10.2.12",
            "versionStartIncluding": "10.2.0"
          },
          {
            "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "47CBEECE-EA41-4A58-8AE9-D695C76D4019",
            "versionEndExcluding": "11.0.6",
            "versionStartIncluding": "11.0.0"
          },
          {
            "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "413284AC-F55E-4037-90D4-D63A5FFC20C3",
            "versionEndExcluding": "11.1.5",
            "versionStartIncluding": "11.1.0"
          },
          {
            "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "7E4D3A51-0A40-4B19-AAFC-A2484B1CF5D7",
            "versionEndExcluding": "11.2.4",
            "versionStartIncluding": "11.2.0"
          },
          {
            "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:-:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "3D33A0FB-7538-42BF-84E8-7CCD7EEF9355"
          },
          {
            "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h1:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "FB95D77F-1263-4D47-A0BB-94A6DA937115"
          },
          {
            "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.6:-:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "2B6C3AFF-3649-484C-A2FB-B71EE02FF176"
          },
          {
            "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:-:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "7B2C0E11-A6CE-419D-86A0-3930DE25B544"
          },
          {
            "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "C01AD190-F3C2-4349-A063-8C5C78B725B9"
          }
        ],
        "operator": "OR"
      }
    ]
  }
]