Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-59003 | An OS command injection vulnerability in the XML API of Palo Alto Networks PAN-OS software enables an authenticated API user to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall. |
Solution
This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.15, PAN-OS 10.0.12, PAN-OS 10.1.6, and all later PAN-OS versions.
Workaround
Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 91715 (introduced in Applications and Threats content update 8473). This issue requires the attacker to have authenticated access to the PAN-OS XML API. You can mitigate the impact of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2023-6792 |
|
Tue, 08 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-10-08T14:26:00.308Z
Reserved: 2023-12-13T17:27:25.801Z
Link: CVE-2023-6792
Updated: 2024-08-02T08:42:07.471Z
Status : Modified
Published: 2023-12-13T19:15:09.640
Modified: 2024-11-21T08:44:34.293
Link: CVE-2023-6792
No data.
OpenCVE Enrichment
No data.
EUVD