An improper authorization vulnerability in Palo Alto Networks Panorama software enables an authenticated read-only administrator to upload files using the web interface and completely fill one of the disk partitions with those uploaded files, which prevents the ability to log into the web interface or to download PAN-OS, WildFire, and content images.



This issue affects only the web interface of the management plane; the dataplane is unaffected.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-27384 An improper authorization vulnerability in Palo Alto Networks Panorama software enables an authenticated read-only administrator to upload files using the web interface and completely fill one of the disk partitions with those uploaded files, which prevents the ability to log into the web interface or to download PAN-OS, WildFire, and content images. This issue affects only the web interface of the management plane; the dataplane is unaffected.
Fixes

Solution

This issue is fixed in Panorama on PAN-OS 9.0.17-h4, PAN-OS 9.1.18, PAN-OS 10.1.12, PAN-OS 10.2.11, PAN-OS 11.0.4, and all later PAN-OS versions.


Workaround

This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the effect of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices .

History

Fri, 30 Jan 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Paloaltonetworks
Paloaltonetworks pan-os
CPEs cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:-:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h1:*:*:*:*:*:*
Vendors & Products Paloaltonetworks
Paloaltonetworks pan-os

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2024-08-12T18:54:08.465Z

Reserved: 2024-03-13T16:19:27.817Z

Link: CVE-2024-2433

cve-icon Vulnrichment

Updated: 2024-08-01T19:11:53.562Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-13T18:15:08.893

Modified: 2026-01-30T20:58:17.900

Link: CVE-2024-2433

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses