Metrics
Affected Vendors & Products
Solution
This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.15, PAN-OS 10.0.12, PAN-OS 10.1.6, and all later PAN-OS versions.
Workaround
Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 91715 (introduced in Applications and Threats content update 8473). This issue requires the attacker to have authenticated access to the PAN-OS XML API. You can mitigate the impact of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.
Link | Providers |
---|---|
https://security.paloaltonetworks.com/CVE-2023-6792 |
![]() ![]() |
Tue, 08 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-10-08T14:26:00.308Z
Reserved: 2023-12-13T17:27:25.801Z
Link: CVE-2023-6792

Updated: 2024-08-02T08:42:07.471Z

Status : Modified
Published: 2023-12-13T19:15:09.640
Modified: 2024-11-21T08:44:34.293
Link: CVE-2023-6792

No data.

No data.