Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you haven’t already, we strongly recommend that you secure access to your management interface according to our best practice deployment guidelines. Specifically, you should restrict access to the management interface to only trusted internal IP addresses to prevent external access from the internet. Review information about how to secure management access to your Palo Alto Networks firewalls: * Palo Alto Networks LIVEcommunity article: https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Sun, 13 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 29 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sun, 24 Nov 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 19 Nov 2024 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.6:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:* |
|
Metrics |
cvssV3_1
|
Mon, 18 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Paloaltonetworks
Paloaltonetworks pan-os |
|
CPEs | cpe:2.3:o:paloaltonetworks:pan-os:-:*:*:*:*:*:*:* | |
Vendors & Products |
Paloaltonetworks
Paloaltonetworks pan-os |
|
Metrics |
kev
|
Mon, 18 Nov 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability. | |
Title | PAN-OS: Privilege Escalation (PE) Vulnerability in the Web Management Interface | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2025-07-30T01:36:25.829Z
Reserved: 2024-10-03T11:35:20.568Z
Link: CVE-2024-9474

Updated: 2024-11-24T14:45:36.690Z

Status : Analyzed
Published: 2024-11-18T16:15:29.780
Modified: 2024-12-20T16:49:55.993
Link: CVE-2024-9474

No data.

No data.