Palo Alto Networks Security Advisories / CVE-2021-3050

CVE-2021-3050 PAN-OS: OS Command Injection Vulnerability in Web Interface

Severity 8.8 · HIGH
Attack Vector NETWORK
Attack Complexity LOW
Confidentiality Impact HIGH
Privileges Required LOW
Integrity Impact HIGH
User Interaction NONE
Availability Impact HIGH


An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to execute arbitrary OS commands to escalate privileges.

This issue impacts:

PAN-OS 9.0 version 9.0.10 through PAN-OS 9.0.14;

PAN-OS 9.1 version 9.1.4 through PAN-OS 9.1.10;

PAN-OS 10.0 version 10.0.7 and earlier PAN-OS 10.0 versions;

PAN-OS 10.1 version 10.1.0 through PAN-OS 10.1.1.

Prisma Access firewalls and firewalls running PAN-OS 8.1 versions are not impacted by this issue.

Product Status

PAN-OS 10.1>= 10.1.0>= 10.1.2
PAN-OS 10.0>= 10.0.0>= 10.0.8
PAN-OS 9.1>= 9.1.4>= 9.1.11
PAN-OS 9.0>= 9.0.10>= 9.0.15
PAN-OS 8.1None8.1.*

Severity: HIGH

CVSSv3.1 Base Score: 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue. However, exploits for this issue are publicly available.

Weakness Type

CWE-78 OS Command Injection


We intend to fix this issue in PAN-OS 9.0.15 (ETA November 2021), PAN-OS 9.1.11 (ETA September 2021), PAN-OS 10.0.8 (ETA September 2021), PAN-OS 10.1.2 (ETA September 2021) and all later PAN-OS versions.

Workarounds and Mitigations

Enable signatures for Unique Threat ID 91439 on traffic destined for the web interface to block attacks against CVE-2021-3050.

This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at


This issue was found by an external security researcher.


Initial publication
© 2024 Palo Alto Networks, Inc. All rights reserved.