Palo Alto Networks Security Advisories / CVE-2012-6601

CVE-2012-6601 Command Injection Vulnerability

Severity 8.4 · HIGH
Attack Vector LOCAL
Attack Complexity LOW
Confidentiality Impact HIGH
Privileges Required NONE
Integrity Impact HIGH
User Interaction NONE
Availability Impact HIGH


A vulnerability exists whereby an unauthenticated user can execute arbitrary code as root on the device. (Ref #36983)

This vulnerability can result in arbitrary command execution, and can result in total compromise of the device.

This issue affects PAN-OS 4.1.3 and earlier; PAN-OS 4.0.9 and earlier; PAN-OS 3.1.11 and earlier.

Product Status

PAN-OS 4.1<= 4.1.3>= 4.1.4
PAN-OS 4.0<= 4.0.9>= 4.0.10
PAN-OS 3.1<= 3.1.11>= 3.1.12


CVSSv3.1 Base Score:8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Weakness Type

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')


PAN-OS 4.1.4 and later; PAN-OS 4.0.10 and later; PAN-OS 3.1.12 and later.

Workarounds and Mitigations

This issue affects the management interface of the device. Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.

© 2023 Palo Alto Networks, Inc. All rights reserved.