Palo Alto Networks Security Advisories / PAN-SA-2014-0001

PAN-SA-2014-0001 Management API Key Bypass

Severity 5.3 · MEDIUM
Attack Vector NETWORK
Attack Complexity HIGH
Confidentiality Impact NONE
Privileges Required NONE
Integrity Impact HIGH
User Interaction REQUIRED
Availability Impact NONE


An XML API key can be bypassed if a session has been authorized. This can be used in a CSRF or XSS attack. (Ref # 58976)

This issue requires an authenticated administrator session to be successful.

This issue affects PAN-OS version 4.1.15 and earlier; 5.0.9 and earlier; 5.1.4 and earlier.

Product Status

PAN-OS 5.1<= 5.1.4>= 5.1.5
PAN-OS 5.0<= 5.0.9>= 5.0.10
PAN-OS 4.1<= 4.1.15>= 4.1.16


CVSSv3.1 Base Score:5.3 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N)

Weakness Type


PAN-OS 4.1.16; 5.0.10 and 5.1.5 address this issue.

Workarounds and Mitigations

This issue affects the management interface of the device. Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.


Anton Ziukin, Check Point Vulnerability Research Team
© 2023 Palo Alto Networks, Inc. All rights reserved.