Palo Alto Networks Security Advisories

Found 4
VersionsAffectedUnaffected
5.4CVE-2024-5913 PAN-OS: Improper Input Validation Vulnerability in PAN-OS
Cloud NGFW
PAN-OS 11.2
PAN-OS 11.1
PAN-OS 11.0
PAN-OS 10.2
PAN-OS 10.1
Prisma Access
None
< 11.2.1
< 11.1.4
< 11.0.5
< 10.2.10
< 10.1.14-h2
None
All
>= 11.2.1
>= 11.1.4
>= 11.0.5
>= 10.2.10
>= 10.1.14-h2
All
2024-07-102024-07-10
5.3CVE-2024-3596 PAN-OS: CHAP and PAP When Used with RADIUS Authentication Lead to Privilege Escalation
Cloud NGFW
PAN-OS 11.2
PAN-OS 11.1
PAN-OS 11.0
PAN-OS 10.2
PAN-OS 10.1
PAN-OS 9.1
Prisma Access
None
None
< 11.1.3
< 11.0.4-h4, < 11.0.6
< 10.2.10
< 10.1.14
< 9.1.19
All
All
All
>= 11.1.3
>= 11.0.4-h4, 11.0.6
>= 10.2.10
>= 10.1.14
>= 9.1.19
None (Fix ETA: July 30)
2024-07-102024-07-26
10 NCVE-2024-3400 PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect
Cloud NGFW
PAN-OS 11.1
PAN-OS 11.0
PAN-OS 10.2
PAN-OS 10.1
PAN-OS 10.0
➔ View additional products
none
< 11.1.0-h3, < 11.1.1-h1, < 11.1.2-h3
< 11.0.0-h3, < 11.0.1-h4, < 11.0.2-h4, < 11.0.3-h10, < 11.0.4-h1
< 10.2.0-h3, < 10.2.1-h2, < 10.2.2-h5, < 10.2.3-h13, < 10.2.4-h16, < 10.2.5-h6, < 10.2.6-h3, < 10.2.7-h8, < 10.2.8-h3, < 10.2.9-h1
none
none
none
All
>= 11.1.0-h3, >= 11.1.1-h1, >= 11.1.2-h3
>= 11.0.0-h3, >= 11.0.1-h4, >= 11.0.2-h4, >= 11.0.3-h10, >= 11.0.4-h1
>= 10.2.0-h3, >= 10.2.1-h2, >= 10.2.2-h5, >= 10.2.3-h13, >= 10.2.4-h16, >= 10.2.5-h6, >= 10.2.6-h3, >= 10.2.7-h8, >= 10.2.8-h3, >= 10.2.9-h1
All
All
all
2024-04-122024-05-03
6CVE-2023-48795 Impact of Terrapin SSH Attack
PAN-OS 11.1
PAN-OS 11.0
PAN-OS 10.2
PAN-OS 10.1
PAN-OS 9.1
PAN-OS 9.0
Prisma SD-WAN ION 6.2
Prisma SD-WAN ION 6.1
Prisma SD-WAN ION 5.6
< 11.1.3
< 11.0.7
< 10.2.11
All
All
All
< 6.2.4
< 6.1.8
< 5.6.19
>= 11.1.3
>= 11.0.7 (ETA: end of November)
>= 10.2.11 (ETA: end of July)
TBD
TBD
None
>= 6.2.4 (ETA: end of July)
>= 6.1.8
>= 5.6.19 (ETA: end of July)
2024-01-092024-03-29
N = Exploitable over the network with low complexity, unauthenticated attack.
© 2024 Palo Alto Networks, Inc. All rights reserved.