An OS command injection vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated API user to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
Fixes

Solution

This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.15, PAN-OS 10.0.12, PAN-OS 10.1.6, and all later PAN-OS versions.


Workaround

Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 91715 (introduced in Applications and Threats content update 8473). This issue requires the attacker to have authenticated access to the PAN-OS XML API. You can mitigate the impact of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.

History

Tue, 08 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2024-10-08T14:26:00.308Z

Reserved: 2023-12-13T17:27:25.801Z

Link: CVE-2023-6792

cve-icon Vulnrichment

Updated: 2024-08-02T08:42:07.471Z

cve-icon NVD

Status : Modified

Published: 2023-12-13T19:15:09.640

Modified: 2024-11-21T08:44:34.293

Link: CVE-2023-6792

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.