Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-41872 | A vulnerability exists in Palo Alto Networks PAN-OS software that enables an authenticated administrator with the privilege to commit a specifically created configuration to read local files and resources from the system. |
Solution
This issue is fixed in PAN-OS 10.2.4, PAN-OS 11.0.1, and all later PAN-OS versions.
Workaround
This issue requires the attacker to have authenticated access to PAN-OS. You can mitigate the impact of this issue by following best practices for securing PAN-OS. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices .
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2023-38046 |
|
Mon, 10 Feb 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2025-02-10T21:58:15.424Z
Reserved: 2023-07-12T05:16:41.577Z
Link: CVE-2023-38046
Updated: 2024-08-02T17:30:13.102Z
Status : Modified
Published: 2023-07-12T17:15:08.877
Modified: 2024-11-21T08:12:44.443
Link: CVE-2023-38046
No data.
OpenCVE Enrichment
No data.
EUVD