A file disclosure vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write administrator with access to the web interface to export local files from the firewall through a race condition.

Fixes

Solution

This issue is fixed in PAN-OS 8.1.25, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.12, PAN-OS 10.1.10, PAN-OS 10.2.4, PAN-OS 11.0.1, and all later PAN-OS versions.


Workaround

This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices https://docs.paloaltonetworks.com/best-practices .

History

Mon, 10 Feb 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2025-02-10T21:56:14.996Z

Reserved: 2022-10-27T18:48:17.776Z

Link: CVE-2023-0008

cve-icon Vulnrichment

Updated: 2024-08-02T04:54:32.571Z

cve-icon NVD

Status : Modified

Published: 2023-05-10T17:15:09.040

Modified: 2024-11-21T07:36:22.987

Link: CVE-2023-0008

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.