Palo Alto Networks Security Advisories / CVE-2024-5917

CVE-2024-5917 PAN-OS: Server-Side Request Forgery in WildFire

Urgency MODERATE

047910
Severity 0.5 · LOW
Exploit Maturity UNREPORTED
Response Effort MODERATE
Recovery AUTOMATIC
Value Density DIFFUSE
Attack Vector NETWORK
Attack Complexity LOW
Attack Requirements PRESENT
Automatable NO
User Interaction NONE
Product Confidentiality NONE
Product Integrity LOW
Product Availability NONE
Privileges Required HIGH
Subsequent Confidentiality LOW
Subsequent Integrity NONE
Subsequent Availability NONE

Description

A server-side request forgery in PAN-OS software enables an authenticated attacker to use the administrative web interface as a proxy, which enables the attacker to view internal network resources not otherwise accessible.

Product Status

VersionsAffectedUnaffected
Cloud NGFWNoneAll
PAN-OS 11.2NoneAll
PAN-OS 11.1NoneAll
PAN-OS 11.0NoneAll
PAN-OS 10.2< 10.2.2>= 10.2.2
PAN-OS 10.1< 10.1.7>= 10.1.7

Required Configuration for Exposure

No special configuration is required to be affected by this issue.

Severity: LOW, Suggested Urgency: MODERATE

CVSS-BT: 0.5 / CVSS-B: 2.1 (CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N/E:U/AU:N/R:A/V:D/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-918 Server-Side Request Forgery (SSRF)

CAPEC-664 Server Side Request Forgery

Solution

This issue is fixed in PAN-OS 10.1.7, PAN-OS 10.2.2, and all later PAN-OS versions.

Workarounds and Mitigations

Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you haven’t already, we strongly recommend that you secure access to your management interface according to our best practice deployment guidelines. Specifically, you should restrict access to the management interface to only trusted internal IP addresses to prevent external access from the internet.

Review information about how to secure management access to your Palo Alto Networks firewalls:

Acknowledgments

Palo Alto Networks thanks Michael Baker from AC3 for discovering and reporting the issue.

Timeline

Corrected the required configuration for exposure and provided mitigation steps.
Corrected the description and the CVSS score to reflect that the attacker must be authenticated.
Initial publication
© 2025 Palo Alto Networks, Inc. All rights reserved.