{"document":{"category":"csaf_vex","csaf_version":"2.1","notes":[{"category":"summary","text":"Palo Alto Networks PSIRT provided VEX document. This document is autogenerated.","title":"Local Privilege Escalation in the Management Web Interface "}],"publisher":{"category":"vendor","name":"Palo Alto Networks","namespace":"https://security.paloaltonetworks.com"},"title":"Palo Alto Networks PSIRT provided VEX document: CVE-2017-7218","distribution":{"text":"Copyright © 2024 Palo Alto Networks. All rights reserved.","tlp":{"label":"CLEAR","url":"https://www.first.org/tlp/"}},"tracking":{"current_release_date":"2026-04-08T08:18:34.455Z","generator":{"date":"2026-04-08T08:18:34.455Z","engine":{"name":"Vulnogram","version":"0.0.9"}},"id":"CVE-2017-7218","initial_release_date":"2017-04-10T17:30:01.000Z","revision_history":[{"number":"1","date":"2026-04-08T01:18:34.000Z","summary":"Initial release"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"name":"Palo Alto Networks","category":"vendor","branches":[]}]},"vulnerabilities":[{"cve":"CVE-2017-7218","product_status":{"fixed":["PANW-PAN-OS-418"],"known_affected":["PANW-PAN-OS-425"]},"notes":[{"category":"description","text":"A vulnerability exists in the Management Web Interface that could allow for local privilege escalation. The Management Web Interface does not properly validate specific request parameters which can potentially allow executing code with higher privileges.  (Ref # PAN-70426/ CVE-2017-7218)\nSuccessfully exploiting this issue would require an attacker to be authenticated.\nThis issue affects PAN-OS 7.1.8 and earlier\r"}],"references":[{"category":"external","summary":"NVD - CVE-2017-7218","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7218"},{"category":"self","summary":"Palo Alto Networks Security Advisory CVE-2017-7218","url":"https://security.paloaltonetworks.com/CVE-2017-7218"}],"threats":[{"category":"impact","description":"A vulnerability exists in the Management Web Interface that could allow for local privilege escalation. The Management Web Interface does not properly validate specific request parameters which can potentially allow executing code with higher privileges.  (Ref # PAN-70426/ CVE-2017-7218)\nSuccessfully exploiting this issue would require an attacker to be authenticated.\nThis issue affects PAN-OS 7.1.8 and earlier\r"}],"scores":[{"cvss_v3":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"products":["PANW-PAN-OS-425"]}]}]}