{"document":{"category":"csaf_vex","csaf_version":"2.1","notes":[{"category":"summary","text":"Palo Alto Networks PSIRT provided VEX document. This document is autogenerated.","title":"Privilege Escalation in PAN-OS"}],"publisher":{"category":"vendor","name":"Palo Alto Networks","namespace":"https://security.paloaltonetworks.com"},"title":"Palo Alto Networks PSIRT provided VEX document: CVE-2018-14634","distribution":{"text":"Copyright © 2024 Palo Alto Networks. All rights reserved.","tlp":{"label":"CLEAR","url":"https://www.first.org/tlp/"}},"tracking":{"current_release_date":"2026-03-11T22:36:10.945Z","generator":{"date":"2026-03-11T22:36:10.945Z","engine":{"name":"Vulnogram","version":"0.0.9"}},"id":"CVE-2018-14634","initial_release_date":"2019-03-20T21:20:00.000Z","revision_history":[{"number":"1","date":"2026-03-11T15:36:10.000Z","summary":"Initial release"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"name":"Palo Alto Networks","category":"vendor","branches":[]}]},"vulnerabilities":[{"cve":"CVE-2018-14634","product_status":{"fixed":["PANW-PAN-OS-367","PANW-PAN-OS-375","PANW-PAN-OS-377"],"known_affected":["PANW-PAN-OS-373","PANW-PAN-OS-374","PANW-PAN-OS-376"]},"notes":[{"category":"description","text":"Palo Alto Networks is aware of an integer overflow vulnerability in the Linux kernel's create_elf_tables() function.  (Ref # PAN-105966, CVE-2018-14634)\nSuccessful exploitation of this issue may allow an unprivileged local user to escalate their privileges on the system.  \n\nTo successfully exploit this vulnerability, an attacker would need local user account to access CLI, as well as, an unrelated vulnerability allowing the local user to execute arbitrary code in a chained attack. This combination would result in the execution of malicious code and achieving complete control of the affected system.\n\nThis issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw. \nThis issue affects This only affects 64bit systems with more than 32 GB of available memory.  \n\nThe affected platform and versions are  PAN-OS 7.1.22 and earlier running on M-500 and WF-500;   PAN-OS 8.0.15 and earlier running on PA-5220, PA-5250, PA-5260, M-500 and WF-500;  and PAN-OS 8.1.6 and earlier running on PA-5220, PA-5250, PA-5260, PA-5280, M-500, M-600 and WF-500.   PAN-OS 9.0 is NOT affected."}],"references":[{"category":"external","summary":"NVD - CVE-2018-14634","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14634"},{"category":"self","summary":"Palo Alto Networks Security Advisory CVE-2018-14634","url":"https://security.paloaltonetworks.com/CVE-2018-14634"}],"threats":[{"category":"impact","description":"Palo Alto Networks is aware of an integer overflow vulnerability in the Linux kernel's create_elf_tables() function.  (Ref # PAN-105966, CVE-2018-14634)\nSuccessful exploitation of this issue may allow an unprivileged local user to escalate their privileges on the system.  \n\nTo successfully exploit this vulnerability, an attacker would need local user account to access CLI, as well as, an unrelated vulnerability allowing the local user to execute arbitrary code in a chained attack. This combination would result in the execution of malicious code and achieving complete control of the affected system.\n\nThis issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw. \nThis issue affects This only affects 64bit systems with more than 32 GB of available memory.  \n\nThe affected platform and versions are  PAN-OS 7.1.22 and earlier running on M-500 and WF-500;   PAN-OS 8.0.15 and earlier running on PA-5220, PA-5250, PA-5260, M-500 and WF-500;  and PAN-OS 8.1.6 and earlier running on PA-5220, PA-5250, PA-5260, PA-5280, M-500, M-600 and WF-500.   PAN-OS 9.0 is NOT affected."}],"scores":[{"cvss_v3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"products":["PANW-PAN-OS-373","PANW-PAN-OS-374","PANW-PAN-OS-376"]}]}]}