{"document":{"category":"csaf_vex","csaf_version":"2.1","notes":[{"category":"summary","text":"Palo Alto Networks PSIRT provided VEX document. This document is autogenerated.","title":"Informational Bulletin: Impact of OSS CVEs in PAN-OS"}],"publisher":{"category":"vendor","name":"Palo Alto Networks","namespace":"https://security.paloaltonetworks.com"},"title":"Palo Alto Networks PSIRT provided VEX document: PAN-SA-2024-0001","distribution":{"text":"Copyright © 2024 Palo Alto Networks. All rights reserved.","tlp":{"label":"CLEAR","url":"https://www.first.org/tlp/"}},"tracking":{"current_release_date":"2026-04-11T00:32:43.006Z","generator":{"date":"2026-04-11T00:32:43.006Z","engine":{"name":"vulnogram","version":"0.1.0-rc1"}},"id":"PAN-SA-2024-0001","initial_release_date":"2024-02-14T17:00:00.000Z","revision_history":[{"number":"1","date":"2026-04-10T17:32:43.000Z","summary":"Initial release"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"name":"Palo Alto Networks","category":"vendor","branches":[{"name":"PAN-OS","category":"product_name","branches":[{"category":"product_version","name":"PAN-OS All","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-1"}}]}]}]},"vulnerabilities":[{"cve":"CVE-2017-8923","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This issue is only practical to exploit only when the memory limit is raised from its default to a value larger than 2 GiB. PAN-OS limits it to 128MB."}],"references":[{"category":"external","summary":"NVD - CVE-2017-8923","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8923"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"This issue is only practical to exploit only when the memory limit is raised from its default to a value larger than 2 GiB. PAN-OS limits it to 128MB."}]},{"cve":"CVE-2017-9120","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This only impacts PHP scripts calling mysqli_real_escape_string(). PAN-OS does not make use of this function."}],"references":[{"category":"external","summary":"NVD - CVE-2017-9120","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-9120"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"This only impacts PHP scripts calling mysqli_real_escape_string(). PAN-OS does not make use of this function."}]},{"cve":"CVE-2017-18342","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Prerequisites for exploitating the vulnerable function do not exist on PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2017-18342","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18342"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Prerequisites for exploitating the vulnerable function do not exist on PAN-OS."}]},{"cve":"CVE-2019-1551","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the vulnerable OpenSSL versions."}],"references":[{"category":"external","summary":"NVD - CVE-2019-1551","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-1551"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the vulnerable OpenSSL versions."}]},{"cve":"CVE-2019-16865","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2019-16865","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16865"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2019-16905","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as our OpenSSH build does not support XMSS."}],"references":[{"category":"external","summary":"NVD - CVE-2019-16905","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16905"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as our OpenSSH build does not support XMSS."}]},{"cve":"CVE-2019-19523","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2019-19523","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19523"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2019-19528","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2019-19528","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19528"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2019-19911","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2019-19911","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19911"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2020-0404","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-0404","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0404"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-0431","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-0431","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0431"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-0466","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-0466","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0466"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-1967","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the vulnerable OpenSSL function."}],"references":[{"category":"external","summary":"NVD - CVE-2020-1967","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1967"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the vulnerable OpenSSL function."}]},{"cve":"CVE-2020-5310","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2020-5310","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5310"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2020-5313","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2020-5313","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-5313"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2020-7760","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"CodeMirror bundled in PAN-OS does not have vulnerable code parts"}],"references":[{"category":"external","summary":"NVD - CVE-2020-7760","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7760"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"CodeMirror bundled in PAN-OS does not have vulnerable code parts"}]},{"cve":"CVE-2020-10379","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2020-10379","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-10379"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2020-11538","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11538","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11538"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2020-11608","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11608","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11608"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-12114","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-12114","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-12114"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-12321","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This only impacts some Intel Wireless Bluetooth devices, which are not part of any products."}],"references":[{"category":"external","summary":"NVD - CVE-2020-12321","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-12321"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"This only impacts some Intel Wireless Bluetooth devices, which are not part of any products."}]},{"cve":"CVE-2020-12362","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This only impacts Intel(R) Graphics Drivers for Windows. Does not affect PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2020-12362","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-12362"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"This only impacts Intel(R) Graphics Drivers for Windows. Does not affect PAN-OS."}]},{"cve":"CVE-2020-12363","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-12363","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-12363"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-12364","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-12364","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-12364"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-13757","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The vulnerable API isn't used in PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2020-13757","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13757"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The vulnerable API isn't used in PAN-OS."}]},{"cve":"CVE-2020-14314","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-14314","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14314"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-14351","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-14351","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14351"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-15778","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"File uploads to PAN-OS can only be initiated from within the PAN-OS firewall CLI. This CVE requires initiating the file upload from an external system, so PAN-OS is not affected."}],"references":[{"category":"external","summary":"NVD - CVE-2020-15778","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15778"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"File uploads to PAN-OS can only be initiated from within the PAN-OS firewall CLI. This CVE requires initiating the file upload from an external system, so PAN-OS is not affected."}]},{"cve":"CVE-2020-24394","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-24394","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24394"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-24504","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-24504","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-24504"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-25211","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-25211","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-25211"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-25212","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-25212","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-25212"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-25284","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-25284","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-25284"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-25285","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-25285","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-25285"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-25717","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Though PAN-OS software contains Samba packages, there isn't a Samba file and print server that runs in PAN-OS software. This CVE can not be exploited on PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2020-25717","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-25717"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Though PAN-OS software contains Samba packages, there isn't a Samba file and print server that runs in PAN-OS software. This CVE can not be exploited on PAN-OS."}]},{"cve":"CVE-2020-26541","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-26541","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-26541"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-27152","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-27152","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27152"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-27835","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-27835","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27835"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-28915","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-28915","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-28915"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-28974","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-28974","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-28974"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-29368","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-29368","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-29368"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-29661","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-29661","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-29661"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-35508","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-35508","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35508"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-35653","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2020-35653","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35653"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2020-35654","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2020-35654","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-35654"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2020-36312","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-36312","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36312"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-36322","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-36322","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36322"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-36385","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-36385","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36385"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-36558","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-36558","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36558"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2020-36694","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2020-36694","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36694"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-0342","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-0342","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-0342"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-0512","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-0512","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-0512"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-0920","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-0920","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-0920"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-0941","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-0941","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-0941"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-3347","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3347","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3347"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-3428","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3428","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3428"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-3450","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the vulnerable OpenSSL versions."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3450","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3450"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the vulnerable OpenSSL versions."}]},{"cve":"CVE-2021-3489","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3489","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3489"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-3501","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3501","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3501"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-3564","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3564","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3564"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-3609","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3609","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3609"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-3635","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3635","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3635"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-3653","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3653","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3653"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-3659","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3659","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3659"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-3669","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3669","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3669"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-3679","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3679","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3679"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-3743","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3743","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3743"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-3744","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3744","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3744"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-3764","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3764","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3764"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-3773","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the vulnerable functionality is not used in PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3773","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3773"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the vulnerable functionality is not used in PAN-OS."}]},{"cve":"CVE-2021-3923","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3923","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3923"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-4002","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-4002","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4002"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-4028","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-4028","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4028"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-4083","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-4083","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4083"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-4093","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-4093","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4093"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-4154","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-4154","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4154"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-4155","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-4155","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-4155"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-20239","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-20239","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20239"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-20317","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-20317","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20317"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-20321","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-20321","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20321"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-20325","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The affected components are not present or not used in PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2021-20325","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20325"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The affected components are not present or not used in PAN-OS."}]},{"cve":"CVE-2021-21706","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This is a Windows-specific vulnerability, and does not impact PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2021-21706","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21706"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"This is a Windows-specific vulnerability, and does not impact PAN-OS."}]},{"cve":"CVE-2021-21708","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This only affects PHP scripts that use FILTER_VALIDATE_FLOAT. PAN-OS does not make use of this function."}],"references":[{"category":"external","summary":"NVD - CVE-2021-21708","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21708"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"This only affects PHP scripts that use FILTER_VALIDATE_FLOAT. PAN-OS does not make use of this function."}]},{"cve":"CVE-2021-21781","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-21781","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21781"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-22543","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-22543","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22543"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-22555","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-22555","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22555"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-23133","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-23133","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23133"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-23840","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the vulnerable OpenSSL versions."}],"references":[{"category":"external","summary":"NVD - CVE-2021-23840","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23840"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the vulnerable OpenSSL versions."}]},{"cve":"CVE-2021-23841","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the vulnerable OpenSSL function."}],"references":[{"category":"external","summary":"NVD - CVE-2021-23841","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23841"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the vulnerable OpenSSL function."}]},{"cve":"CVE-2021-25217","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Prerequities for this CVE do not exist on PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2021-25217","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25217"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Prerequities for this CVE do not exist on PAN-OS."}]},{"cve":"CVE-2021-25289","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected by this CVE as the underlying operating system used by PAN-OS is not affected."}],"references":[{"category":"external","summary":"NVD - CVE-2021-25289","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25289"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected by this CVE as the underlying operating system used by PAN-OS is not affected."}]},{"cve":"CVE-2021-25290","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2021-25290","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25290"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2021-25291","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2021-25291","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25291"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2021-25293","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2021-25293","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-25293"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2021-26708","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-26708","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-26708"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-27364","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-27364","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27364"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-27365","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-27365","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27365"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-27921","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2021-27921","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27921"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2021-27922","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2021-27922","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27922"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2021-27923","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2021-27923","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27923"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2021-28676","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2021-28676","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28676"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2021-28677","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2021-28677","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28677"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2021-28950","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-28950","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28950"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-29646","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-29646","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29646"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-30002","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-30002","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-30002"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-30139","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use Alpine Linux."}],"references":[{"category":"external","summary":"NVD - CVE-2021-30139","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-30139"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use Alpine Linux."}]},{"cve":"CVE-2021-31440","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-31440","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-31440"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-31829","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-31829","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-31829"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-31916","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-31916","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-31916"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-32399","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-32399","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32399"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-33034","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-33034","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33034"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-33655","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-33655","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33655"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-33909","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-33909","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33909"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-33910","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The vulnerable systemd software is not included in PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2021-33910","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33910"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The vulnerable systemd software is not included in PAN-OS."}]},{"cve":"CVE-2021-36159","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as external FTP is disabled, and PAN-OS does not use vulnerable component libfetch/apk-tools."}],"references":[{"category":"external","summary":"NVD - CVE-2021-36159","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-36159"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as external FTP is disabled, and PAN-OS does not use vulnerable component libfetch/apk-tools."}]},{"cve":"CVE-2021-36368","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the underlying operating system used by PAN-OS is not affected"}],"references":[{"category":"external","summary":"NVD - CVE-2021-36368","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-36368"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the underlying operating system used by PAN-OS is not affected"}]},{"cve":"CVE-2021-37159","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-37159","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37159"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-37576","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-37576","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37576"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-41864","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-41864","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41864"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-42739","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-42739","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-42739"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-43056","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-43056","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43056"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-43267","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The affected functionality does not exist in the kernel version used by PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2021-43267","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43267"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The affected functionality does not exist in the kernel version used by PAN-OS."}]},{"cve":"CVE-2021-43975","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-43975","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43975"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-43976","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-43976","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43976"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-44733","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2021-44733","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44733"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2021-44790","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS does not use the vulnerable mod_lua or proxy forwarding."}],"references":[{"category":"external","summary":"NVD - CVE-2021-44790","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44790"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS does not use the vulnerable mod_lua or proxy forwarding."}]},{"cve":"CVE-2022-0001","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-0001","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0001"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-0002","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-0002","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0002"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-0168","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-0168","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0168"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-0185","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-0185","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0185"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-0286","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-0286","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0286"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-0322","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-0322","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0322"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-0330","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-0330","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0330"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-0492","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-0492","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0492"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-0494","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-0494","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0494"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-0516","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-0516","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0516"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-0617","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-0617","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0617"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-0847","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-0847","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0847"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-0850","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-0850","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0850"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-0854","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-0854","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0854"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-1016","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-1016","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1016"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-1048","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-1048","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1048"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-1055","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-1055","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1055"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-1158","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-1158","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1158"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-1184","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-1184","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1184"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-1292","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the \"c_rehash\" script affected by this CVE is not shipped with PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2022-1292","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1292"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the \"c_rehash\" script affected by this CVE is not shipped with PAN-OS."}]},{"cve":"CVE-2022-1462","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-1462","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1462"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-1586","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the vulnerable functionality is not used in PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2022-1586","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1586"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the vulnerable functionality is not used in PAN-OS."}]},{"cve":"CVE-2022-1679","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-1679","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1679"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-1729","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-1729","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1729"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-1941","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected by this CVE as the underlying operating system components used by PAN-OS are not affected."}],"references":[{"category":"external","summary":"NVD - CVE-2022-1941","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1941"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected by this CVE as the underlying operating system components used by PAN-OS are not affected."}]},{"cve":"CVE-2022-2068","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the \"c_rehash\" script affected by this CVE is not shipped with PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2022-2068","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2068"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the \"c_rehash\" script affected by this CVE is not shipped with PAN-OS."}]},{"cve":"CVE-2022-2078","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-2078","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2078"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-2153","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-2153","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2153"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-2196","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-2196","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2196"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-2526","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The vulnerable systemd software is not included in PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2022-2526","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2526"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The vulnerable systemd software is not included in PAN-OS."}]},{"cve":"CVE-2022-2586","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-2586","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2586"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-2588","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-2588","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2588"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-2639","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-2639","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2639"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-2873","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-2873","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2873"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-2964","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-2964","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2964"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-3105","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-3105","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3105"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-3106","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-3106","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3106"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-3107","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-3107","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3107"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-3108","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-3108","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3108"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-3239","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-3239","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3239"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-3524","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-3524","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3524"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-3625","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-3625","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3625"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-3707","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-3707","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3707"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-4139","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-4139","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4139"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-4269","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-4269","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4269"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-4378","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-4378","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4378"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-4662","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-4662","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4662"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-4744","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-4744","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4744"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-20141","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-20141","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-20141"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-20368","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-20368","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-20368"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-20572","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-20572","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-20572"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-21123","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-21123","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21123"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-21125","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-21125","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21125"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-22721","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires request body to be 350 MB. The request size in PAN-OS is 1MB. Therefore, this CVE does not impact PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2022-22721","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22721"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires request body to be 350 MB. The request size in PAN-OS is 1MB. Therefore, this CVE does not impact PAN-OS."}]},{"cve":"CVE-2022-22817","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS does not make use of the ImageMath module. Therefore, its eval() method is never called."}],"references":[{"category":"external","summary":"NVD - CVE-2022-22817","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22817"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS does not make use of the ImageMath module. Therefore, its eval() method is never called."}]},{"cve":"CVE-2022-22942","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-22942","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22942"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-23960","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-23960","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23960"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-24303","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected by this CVE as the underlying operating system components used by PAN-OS are not affected."}],"references":[{"category":"external","summary":"NVD - CVE-2022-24303","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24303"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected by this CVE as the underlying operating system components used by PAN-OS are not affected."}]},{"cve":"CVE-2022-24448","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-24448","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24448"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-25636","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-25636","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25636"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-27664","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as it does not use the vulnerable functionality"}],"references":[{"category":"external","summary":"NVD - CVE-2022-27664","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27664"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as it does not use the vulnerable functionality"}]},{"cve":"CVE-2022-27666","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-27666","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27666"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-27950","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-27950","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-27950"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-28331","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the underlying OS components used in PAN-OS are not affected."}],"references":[{"category":"external","summary":"NVD - CVE-2022-28331","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28331"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the underlying OS components used in PAN-OS are not affected."}]},{"cve":"CVE-2022-28388","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-28388","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28388"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-28390","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-28390","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28390"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-28615","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"No code distributed with the httpd server can exploit this flaw and the vulnerable function is not used in PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2022-28615","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28615"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"No code distributed with the httpd server can exploit this flaw and the vulnerable function is not used in PAN-OS."}]},{"cve":"CVE-2022-28893","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-28893","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28893"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-29217","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The vulnerable package is not used in PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2022-29217","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29217"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The vulnerable package is not used in PAN-OS."}]},{"cve":"CVE-2022-29804","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The CVE is specific to the Go distribution on Windows. Does not apply to PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2022-29804","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29804"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The CVE is specific to the Go distribution on Windows. Does not apply to PAN-OS."}]},{"cve":"CVE-2022-30634","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The CVE is specific to the Go distribution on Windows. Does not apply to PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2022-30634","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-30634"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The CVE is specific to the Go distribution on Windows. Does not apply to PAN-OS."}]},{"cve":"CVE-2022-31625","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS does not use the affected PostgreSQL extension."}],"references":[{"category":"external","summary":"NVD - CVE-2022-31625","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31625"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS does not use the affected PostgreSQL extension."}]},{"cve":"CVE-2022-31626","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS does not make use of the vulnerable PHP PDO MySQL driver and hence not impacted."}],"references":[{"category":"external","summary":"NVD - CVE-2022-31626","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31626"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS does not make use of the vulnerable PHP PDO MySQL driver and hence not impacted."}]},{"cve":"CVE-2022-31628","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS does not make use of the vulnerable phar functionality."}],"references":[{"category":"external","summary":"NVD - CVE-2022-31628","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31628"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS does not make use of the vulnerable phar functionality."}]},{"cve":"CVE-2022-31676","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"There are no scenarios that enable successful exploitation of this vulnerability on PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2022-31676","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31676"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"There are no scenarios that enable successful exploitation of this vulnerability on PAN-OS."}]},{"cve":"CVE-2022-32250","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-32250","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-32250"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-36760","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the vulnerable mod_proxy_ajp."}],"references":[{"category":"external","summary":"NVD - CVE-2022-36760","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36760"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the vulnerable mod_proxy_ajp."}]},{"cve":"CVE-2022-37454","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This issue is only practical to exploit only when the memory limit is raised from its default to a value larger than 4 GiB. PAN-OS has safer and restricted limits that do not enable exploting this vulnerability."}],"references":[{"category":"external","summary":"NVD - CVE-2022-37454","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-37454"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"This issue is only practical to exploit only when the memory limit is raised from its default to a value larger than 4 GiB. PAN-OS has safer and restricted limits that do not enable exploting this vulnerability."}]},{"cve":"CVE-2022-38023","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Though PAN-OS software contains Samba packages, there isn't a Samba file and print server that runs in PAN-OS software. This CVE can not be exploited on PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2022-38023","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-38023"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Though PAN-OS software contains Samba packages, there isn't a Samba file and print server that runs in PAN-OS software. This CVE can not be exploited on PAN-OS."}]},{"cve":"CVE-2022-39188","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-39188","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39188"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-39189","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-39189","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-39189"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-40133","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-40133","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40133"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-40897","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS does not allow customers to install custom packages."}],"references":[{"category":"external","summary":"NVD - CVE-2022-40897","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40897"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS does not allow customers to install custom packages."}]},{"cve":"CVE-2022-41218","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-41218","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41218"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-41222","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-41222","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41222"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-41716","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The CVE is specific to the Go distribution on Windows. Does not apply to PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2022-41716","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41716"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The CVE is specific to the Go distribution on Windows. Does not apply to PAN-OS."}]},{"cve":"CVE-2022-42703","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-42703","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42703"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-42720","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-42720","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42720"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-42721","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-42721","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42721"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-42722","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-42722","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42722"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-42898","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The vulnerable function/feature krb5_pac_parse() is not called from PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2022-42898","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42898"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The vulnerable function/feature krb5_pac_parse() is not called from PAN-OS."}]},{"cve":"CVE-2022-43750","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-43750","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-43750"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-45198","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The GIF images that are processed come with PAN-OS and cannot be submitted through any form of user input, so this is not exploitable."}],"references":[{"category":"external","summary":"NVD - CVE-2022-45198","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45198"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The GIF images that are processed come with PAN-OS and cannot be submitted through any form of user input, so this is not exploitable."}]},{"cve":"CVE-2022-45199","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The TIFF images that are processed come with PAN-OS and cannot be submitted through any form of user input, so this is not exploitable."}],"references":[{"category":"external","summary":"NVD - CVE-2022-45199","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45199"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The TIFF images that are processed come with PAN-OS and cannot be submitted through any form of user input, so this is not exploitable."}]},{"cve":"CVE-2022-45869","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-45869","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45869"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-45884","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-45884","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45884"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-45887","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-45887","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45887"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2022-45919","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2022-45919","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45919"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-0266","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-0266","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0266"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-0386","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-0386","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0386"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-0394","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-0394","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0394"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-0459","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-0459","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0459"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-0461","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-0461","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0461"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-0597","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-0597","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0597"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-1075","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-1075","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1075"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-1095","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-1095","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1095"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-1118","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-1118","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1118"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-1281","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-1281","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1281"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-1382","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-1382","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1382"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-1829","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-1829","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1829"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-1989","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-1989","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-1989"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-2124","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-2124","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2124"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-2177","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-2177","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2177"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-2235","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-2235","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2235"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-2513","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-2513","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2513"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-3090","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-3090","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3090"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-3141","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-3141","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3141"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-3161","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-3161","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3161"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-3390","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-3390","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3390"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-3609","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-3609","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3609"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-3611","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-3611","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3611"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-3772","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-3772","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3772"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-3776","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-3776","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3776"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-3812","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-3812","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3812"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-3961","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the vulnerable functionality is not used in PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2023-3961","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3961"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the vulnerable functionality is not used in PAN-OS."}]},{"cve":"CVE-2023-4004","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-4004","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4004"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-4132","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-4132","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4132"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-4155","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-4155","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4155"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-4206","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-4206","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4206"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-4207","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-4207","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4207"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-4208","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-4208","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4208"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-4622","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-4622","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4622"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-4623","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-4623","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4623"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-4732","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-4732","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4732"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-4921","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-4921","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4921"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-5178","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The affected kernel component is not used by PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2023-5178","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-5178"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The affected kernel component is not used by PAN-OS."}]},{"cve":"CVE-2023-5633","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-5633","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-5633"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-6546","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-6546","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6546"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-6817","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-6817","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6817"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-20900","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"There are no scenarios that enable successful exploitation of this vulnerability on PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2023-20900","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20900"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"There are no scenarios that enable successful exploitation of this vulnerability on PAN-OS."}]},{"cve":"CVE-2023-22998","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-22998","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22998"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-23455","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-23455","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-23455"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-23931","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The vulnerable functions/features are not used in PAN-OS. Prerequities for this CVE do not exist on PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2023-23931","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-23931"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The vulnerable functions/features are not used in PAN-OS. Prerequities for this CVE do not exist on PAN-OS."}]},{"cve":"CVE-2023-25690","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS does not use the vulnerable component mod_proxy or mod_rewrite."}],"references":[{"category":"external","summary":"NVD - CVE-2023-25690","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25690"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS does not use the vulnerable component mod_proxy or mod_rewrite."}]},{"cve":"CVE-2023-25775","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS does not use the vulnerable drivers."}],"references":[{"category":"external","summary":"NVD - CVE-2023-25775","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25775"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS does not use the vulnerable drivers."}]},{"cve":"CVE-2023-26545","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-26545","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-26545"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-29400","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as it does not use the vulnerable functionality"}],"references":[{"category":"external","summary":"NVD - CVE-2023-29400","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-29400"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as it does not use the vulnerable functionality"}]},{"cve":"CVE-2023-29403","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as prerequisites for this vulnerability do not exist in PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2023-29403","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-29403"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as prerequisites for this vulnerability do not exist in PAN-OS."}]},{"cve":"CVE-2023-31436","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-31436","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-31436"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-32233","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-32233","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32233"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-33203","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-33203","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33203"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-33733","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the underlying operating system components used by PAN-OS are not affected"}],"references":[{"category":"external","summary":"NVD - CVE-2023-33733","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33733"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the underlying operating system components used by PAN-OS are not affected"}]},{"cve":"CVE-2023-33951","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-33951","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-33951"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-34058","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"There are no scenarios that enable successful exploitation of this vulnerability on PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2023-34058","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34058"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"There are no scenarios that enable successful exploitation of this vulnerability on PAN-OS."}]},{"cve":"CVE-2023-34059","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"There are no scenarios that enable successful exploitation of this vulnerability on PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2023-34059","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34059"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"There are no scenarios that enable successful exploitation of this vulnerability on PAN-OS."}]},{"cve":"CVE-2023-35001","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-35001","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-35001"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-35788","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-35788","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-35788"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-35824","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-35824","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-35824"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-37920","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The vulnerable component is not used in PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2023-37920","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-37920"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The vulnerable component is not used in PAN-OS."}]},{"cve":"CVE-2023-38408","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This issue affects ssh-agent, which is not used or enabled in PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2023-38408","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38408"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"This issue affects ssh-agent, which is not used or enabled in PAN-OS."}]},{"cve":"CVE-2023-40217","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The vulnerable Python features are not used in PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2023-40217","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40217"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The vulnerable Python features are not used in PAN-OS."}]},{"cve":"CVE-2023-42753","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-42753","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42753"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2023-44271","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2023-44271","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-44271"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2023-45283","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The CVE is specific to the Go distribution on Windows. Does not apply to PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2023-45283","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45283"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The CVE is specific to the Go distribution on Windows. Does not apply to PAN-OS."}]},{"cve":"CVE-2023-45284","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The CVE is specific to the Go distribution on Windows. Does not apply to PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2023-45284","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45284"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The CVE is specific to the Go distribution on Windows. Does not apply to PAN-OS."}]},{"cve":"CVE-2023-46324","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The affected component is not used in PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2023-46324","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46324"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The affected component is not used in PAN-OS."}]},{"cve":"CVE-2023-50447","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS does not make use of the ImageMath module. Therefore, its eval() method is never called."}],"references":[{"category":"external","summary":"NVD - CVE-2023-50447","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-50447"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"PAN-OS does not make use of the ImageMath module. Therefore, its eval() method is never called."}]},{"cve":"CVE-2023-51384","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This issue affects ssh-agent, which is not used or enabled in PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2023-51384","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-51384"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"This issue affects ssh-agent, which is not used or enabled in PAN-OS."}]},{"cve":"CVE-2023-51385","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"The ssh configuration file on PAN-OS does not contain the vulnerable configuration settings. Therefore, PAN-OS is not affected."}],"references":[{"category":"external","summary":"NVD - CVE-2023-51385","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-51385"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"The ssh configuration file on PAN-OS does not contain the vulnerable configuration settings. Therefore, PAN-OS is not affected."}]},{"cve":"CVE-2023-51781","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}],"references":[{"category":"external","summary":"NVD - CVE-2023-51781","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-51781"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"Exploit requires shell access on PAN-OS, or ability to run arbitrary binaries. This is not possible on PAN-OS as only Palo Alto Network's signed binaries and scripts can be run. System enters maintenance mode if system files are tampered with."}]},{"cve":"CVE-2024-4577","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This is a Windows-specific vulnerability, and does not impact PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2024-4577","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-4577"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0001","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0001"}],"threats":[{"category":"impact","description":"This is a Windows-specific vulnerability, and does not impact PAN-OS."}]}]}