Looking for the vulnerability index of Invicti's legacy products?
Palo Alto PAN-OS Management Interface Auth Bypass (CVE-2024-0012/CVE-2024-9474) - Vulnerability Database

Palo Alto PAN-OS Management Interface Auth Bypass (CVE-2024-0012/CVE-2024-9474)

Description

The Palo Alto PAN-OS management web interface contains a critical authentication bypass vulnerability (CVE-2024-0012) that allows unauthenticated attackers to access administrative functionality without credentials. This vulnerability can be chained with a privilege escalation flaw (CVE-2024-9474) to achieve remote code execution, enabling complete system compromise. Only systems with the management interface exposed to untrusted networks are vulnerable.

Remediation

Apply the vendor-provided security patches immediately by upgrading to a fixed version of PAN-OS as specified in PAN-SA-2024-0015. As an immediate mitigation, restrict access to the management interface by implementing the following controls:

1. Ensure the management interface is accessible only from trusted internal networks, not the internet
2. Configure firewall rules to limit management access to specific authorized IP addresses
3. Enable multi-factor authentication for all administrative accounts
4. If remote management is required, use a VPN or jump host architecture rather than direct exposure
5. Monitor logs for suspicious authentication attempts or unusual administrative activity

Verify your exposure by checking if TCP ports 443 or 80 for the management interface are accessible from untrusted networks. Consult the official Palo Alto Networks security advisory for version-specific patch information and additional hardening guidance.

Related Vulnerabilities