Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-15251 | An authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface allows a network-based attacker with specific knowledge of the target firewall or Panorama appliance to impersonate an existing PAN-OS administrator and perform privileged actions. |
Solution
This issue is fixed in PAN-OS 8.1.24 and all later PAN-OS versions. Please note that PAN-OS 8.1 has reached its software end-of-life (EoL) and is supported only on PA-200, PA-500, and PA-5000 Series firewalls and on M-100 appliances and only until each of their respective hardware EoL dates: https://www.paloaltonetworks.com/services/support/end-of-life-announcements/hardware-end-of-life-dates.html.
Workaround
Customers with a Threat Prevention subscription can block known attacks for this vulnerability by enabling Threat ID 92720 (Applications and Threats content update 8630-7638). To exploit this issue, the attacker must have network access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices.
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2022-0030 |
|
Thu, 15 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2025-05-15T14:00:04.162Z
Reserved: 2021-12-28T00:00:00.000Z
Link: CVE-2022-0030
Updated: 2024-08-02T23:18:41.402Z
Status : Modified
Published: 2022-10-12T17:15:10.493
Modified: 2024-11-21T06:37:51.437
Link: CVE-2022-0030
No data.
OpenCVE Enrichment
No data.
EUVD