A local privilege escalation vulnerability exists in the PAN-OS management web interface that allows the administrator to access the password hashes of local users by manipulating the HTML markup. (Ref. # PAN-91564; CVE-2018-9334)
Successful exploitation of this issue requires the attacker to be authenticated.
This issue affects PAN-OS 6.1.20 and earlier, PAN-OS 7.1.16 and earlier, PAN-OS 8.0.8 and earlier, and PAN-OS 8.1.0
|PAN-OS 8.1||None||>= 8.1.1|
|PAN-OS 8.0||<= 8.0.8||>= 8.0.9|
|PAN-OS 7.1||<= 7.1.16||>= 7.1.17|
|PAN-OS 6.1||<= 6.1.20||>= 6.1.21|
CVSSv3.1 Base Score: 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
PAN-OS 6.1.21 and later, PAN-OS 7.1.17 and later, PAN-OS 8.0.9 and later, and PAN-OS 8.1.1 and later
This issue affects the web-based management interface of PAN-OS and is strongly mitigated by following best practices for securing the management interface of PAN-OS. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/getting-started/best-practices-for-securing-administrative-access.