Palo Alto Networks Security Advisories / CVE-2012-6601

CVE-2012-6601 Command Injection Vulnerability

Severity 8.4 · HIGH
Attack Vector LOCAL
Attack Complexity LOW
Privileges Required NONE
User Interaction NONE
Confidentiality Impact HIGH
Integrity Impact HIGH
Availability Impact HIGH


A vulnerability exists whereby an unauthenticated user can execute arbitrary code as root on the device. (Ref #36983)

This vulnerability can result in arbitrary command execution, and can result in total compromise of the device.

This issue affects PAN-OS 4.1.3 and earlier; PAN-OS 4.0.9 and earlier; PAN-OS 3.1.11 and earlier.

Product Status

PAN-OS 4.1<= 4.1.3>= 4.1.4
PAN-OS 4.0<= 4.0.9>= 4.0.10
PAN-OS 3.1<= 3.1.11>= 3.1.12

Severity: HIGH

CVSSv3.1 Base Score: 8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Weakness Type

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')


PAN-OS 4.1.4 and later; PAN-OS 4.0.10 and later; PAN-OS 3.1.12 and later.

Workarounds and Mitigations

This issue affects the management interface of the device. Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.

© 2020 Palo Alto Networks, Inc. All rights reserved.