Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47043 | An arbitrary file upload vulnerability in Palo Alto Networks Panorama software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and crash the Panorama. Repeated attacks eventually cause the Panorama to enter maintenance mode, which requires manual intervention to bring the Panorama back online. |
Solution
This issue is fixed in PAN-OS 10.1.9, PAN-OS 10.2.4, and all later PAN-OS versions.
Workaround
This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices .
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2024-5911 |
|
Fri, 30 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Paloaltonetworks
Paloaltonetworks pan-os |
|
| CPEs | cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Paloaltonetworks
Paloaltonetworks pan-os |
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-08-01T21:25:03.109Z
Reserved: 2024-06-12T15:27:56.004Z
Link: CVE-2024-5911
Updated: 2024-08-01T21:25:03.109Z
Status : Analyzed
Published: 2024-07-10T19:15:11.547
Modified: 2026-01-30T21:11:32.447
Link: CVE-2024-5911
No data.
OpenCVE Enrichment
Updated: 2025-07-13T11:31:41Z
EUVD