An improper privilege management vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-only administrator to revoke active XML API keys from the firewall and disrupt XML API usage.
Fixes

Solution

This issue is fixed in PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.11, PAN-OS 10.2.5, PAN-OS 11.0.2, and all later PAN-OS versions.


Workaround

This issue requires the attacker to have authenticated access to the PAN-OS XML API. You can mitigate the impact of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.

History

Mon, 02 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2024-12-02T14:27:51.212Z

Reserved: 2023-12-13T17:27:26.408Z

Link: CVE-2023-6793

cve-icon Vulnrichment

Updated: 2024-08-02T08:42:07.419Z

cve-icon NVD

Status : Modified

Published: 2023-12-13T19:15:09.937

Modified: 2024-11-21T08:44:34.440

Link: CVE-2023-6793

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.