An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges.
This issue impacts:
PAN-OS 9.0 versions earlier than 9.0.10;
PAN-OS 9.1 versions earlier than 9.1.4;
PAN-OS 10.0 versions earlier than 10.0.1.
|PAN-OS 10.0||< 10.0.1||>= 10.0.1|
|PAN-OS 9.1||< 9.1.4||>= 9.1.4|
|PAN-OS 9.0||< 9.0.10||>= 9.0.10|
CVSSv3.1 Base Score: 7.2 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.
This issue is fixed in PAN-OS 9.0.10, PAN-OS 9.1.4, PAN-OS 10.0.1, and all later PAN-OS versions.
This issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.