PAN-OS 漏洞列表
共找到 25 个与 PAN-OS 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2024-0012: Palo Alto Networks PAN-OS身份认证绕过导致RCE漏洞(CVE-2024-0012) POC
fofa: icon_hash="873381299" PAN-OS 设备管理 Web 界面中存在身份认证绕过漏洞,未经身份验证的远程攻击者可以通过网络访问管理 Web 界面,从而进行后续活动,包括修改设备配置、访问其他管理功能以及利用 Palo Alto NetwrKS PAN-OS 权限提升漏洞(CVE-2024-9474)获取r00t访问权限,执行任意命令,目前该漏洞技术细节与P0C已在互联网上公开,鉴于此漏洞已发现在野利用,建议用户尽快做好自査及防护。 -
CVE-2017-15944: Palo Alto Network PAN-OS - Remote Code Execution POC
Palo Alto Network PAN-OS and Panorama before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.6 allows remote attackers to execute arbitrary code via vectors involving the management interface. -
CVE-2018-10141: Palo Alto Networks PAN-OS GlobalProtect <8.1.4 - Cross-Site Scripting POC
Palo Alto Networks PAN-OS before 8.1.4 GlobalProtect Portal Login page allows an unauthenticated attacker to inject arbitrary JavaScript or HTML, making it vulnerable to cross-site scripting. -
CVE-2020-2036: Palo Alto Networks PAN-OS Web Interface - Cross Site-Scripting POC
PAN-OS management web interface is vulnerable to reflected cross-site scripting. A remote attacker able to convince an administrator with an active authenticated session on the firewall management interface to click on a crafted link to that management web interface could potentially execute arbitrary JavaScript code in the administrator's browser and perform administrative actions. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9. -
CVE-2024-0012: PAN-OS Management Web Interface - Authentication Bypass POC
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities -
CVE-2024-9474: PAN-OS Management Web Interface - Command Injection POC
A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability. -
CVE-2025-0108: PAN-OS Management Interface - Path Confusion to Authentication Bypass POC
A vulnerability in PAN-OS management interface allows authentication bypass through path confusion between Nginx and Apache handlers.The issue occurs due to differences in path processing between Nginx and Apache, where double URL encoding combined with directory traversal can bypass authentication checks enforced by X-pan-AuthCheck header. -
CVE-2025-0133: PAN-OS - Reflected Cross-Site Scripting POC
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link.The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN. -
CVE-2017-15944: Palo Alto Network PAN-OS - Remote Code Execution POC
Palo Alto Network PAN-OS and Panorama before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.6 allows remote attackers to execute arbitrary code via vectors involving the management interface. -
CVE-2018-10141: Palo Alto Networks PAN-OS GlobalProtect <8.1.4 - Cross-Site Scripting POC
Palo Alto Networks PAN-OS before 8.1.4 GlobalProtect Portal Login page allows an unauthenticated attacker to inject arbitrary JavaScript or HTML, making it vulnerable to cross-site scripting. -
CVE-2020-2036: Palo Alto Networks PAN-OS Web Interface - Cross Site-Scripting POC
PAN-OS management web interface is vulnerable to reflected cross-site scripting. A remote attacker able to convince an administrator with an active authenticated session on the firewall management interface to click on a crafted link to that management web interface could potentially execute arbitrary JavaScript code in the administrator's browser and perform administrative actions. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9. -
CVE-2024-0012: PAN-OS Management Web Interface - Authentication Bypass POC
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities -
CVE-2024-9474: PAN-OS Management Web Interface - Command Injection POC
A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability. -
CVE-2025-0108: PAN-OS Management Interface - Path Confusion to Authentication Bypass POC
A vulnerability in PAN-OS management interface allows authentication bypass through path confusion between Nginx and Apache handlers.The issue occurs due to differences in path processing between Nginx and Apache, where double URL encoding combined with directory traversal can bypass authentication checks enforced by X-pan-AuthCheck header. -
CVE-2025-0133: PAN-OS - Reflected Cross-Site Scripting POC
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link.The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN. -
panos-default-login: Palo Alto Networks PAN-OS Default Login POC
Palo Alto Networks PAN-OS application default admin credentials were discovered. -
Palo Alto Networks PAN-OS /ssl-XXX/hipreport.esp 命令执行漏洞(CVE-2024-3400) 无POC
Palo Alto Networks PAN-OS 是一款广泛应用于企业网络的防火墙操作系统。该漏洞存在于 PAN-OS 的 GlobalProtect 功能中,攻击者可以通过路径遍历字符串任意写入文件,并利用会话 ID 句柄中的命令注入,最终以 root 权限在防火墙上执行任意代码。该漏洞的 CVSS 评分为 10(严重),并已在野外被积极利用。 -
PAN-OS 反射xss CVE-2025-0133 无POC
Palo Alto Networks PAN-OS® 软件的 GlobalProtect™ 网关和门户功能中存在一个反射型跨站点脚本 (XSS)漏洞,当经过身份验证的强制网络门户用户单击特制链接时,该漏洞允许在其浏览器上下文中执行恶意 JavaScript -
Palo Alto Networks PAN-OS /unauth/%252e%252e/php/ztp_gate.php/PAN_help/x.css 未授权访问漏洞(CVE-2025-0108) 无POC
Palo Alto Networks PAN-OS GlobalProtect 是Palo Alto Networks 的一款防火墙产品。Palo Alto Networks PAN-OS Management 管理端权限绕过漏洞。攻击者可构造恶意请求绕过身份认证进入后台,执行恶意操作。 -
Palo Alto Networks PAN-OS 身份验证绕过漏洞 无POC
Palo Alto Networks PAN-OS是美国Palo Alto Networks公司的一套为其防火墙设备开发的操作系统。 Palo Alto Networks PAN-OS存在安全漏洞,该漏洞源于存在认证绕过漏洞,会影响PAN-OS完整性和保密性。 -
Palo Alto Networks PAN-OS 身份验证绕过漏洞(CVE-2025-0108) 无POC
该漏洞是由于PAN-OS中Nginx/Apache对路径的处理不同导致的。未经授权的攻击者可以利用这一漏洞绕过系统身份验证直接访问Web界面从而造成敏感数据泄露或系统被接管等更大的危害。 -
Palo Alto Networks PAN-OS 身份认证绕过漏洞 POC
鉴权绕过漏洞是指攻击者通过某些手段绕过系统的正常权限验证机制,获取未授权的访问或执行权限。这种漏洞通常存在于身份验证、授权检查、权限控制等环节的不足或缺陷中,使得未经授权的用户能够访问或操作敏感数据、执行关键操作,甚至获取系统控制权。 -
Palo Alto Networks PAN-OS GlobalProtect CVE-2024-3400 命令注入漏洞 无POC
Palo Alto Networks PAN-OS Global Protect存在命令注入漏洞,此漏洞是由于/api/接口对用户的请求验证不当导致的。 -
Palo Alto Networks PAN-OS GlobalProtect CVE-2024-3400 命令注入漏洞 无POC
Palo Alto Networks PAN-OS Global Protect存在命令注入漏洞,此漏洞是由于login.esp和hipreport.esp接口对用户的请求验证不当导致的。 -
PaloAlto PAN-OS /global-protect/login.esp 存在命令注入漏洞 无POC
Palo Alto Networks PAN-OS是美国Palo Alto Networks公司的一款下一代防火墙软件。 Palo Alto Networks PAN-OS 10.2、11.0、11.1存在命令注入漏洞,该漏洞源于GlobalProtect 功能中存在命令注入漏洞,可能使未经身份验证的攻击者在防火墙上以 root权限执行任意代码。