{"document":{"category":"csaf_vex","csaf_version":"2.1","notes":[{"category":"summary","text":"Palo Alto Networks PSIRT provided VEX document. This document is autogenerated.","title":"Informational Bulletin: Impact of OSS CVEs in Prisma SD-WAN ION"}],"publisher":{"category":"vendor","name":"Palo Alto Networks","namespace":"https://security.paloaltonetworks.com"},"title":"Palo Alto Networks PSIRT provided VEX document: PAN-SA-2024-0003","distribution":{"text":"Copyright © 2024 Palo Alto Networks. All rights reserved.","tlp":{"label":"CLEAR","url":"https://www.first.org/tlp/"}},"tracking":{"current_release_date":"2026-04-11T00:24:59.922Z","generator":{"date":"2026-04-11T00:24:59.922Z","engine":{"name":"vulnogram","version":"0.1.0-rc1"}},"id":"PAN-SA-2024-0003","initial_release_date":"2024-04-05T23:30:00.000Z","revision_history":[{"number":"1","date":"2026-04-10T17:24:59.000Z","summary":"Initial release"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"name":"Palo Alto Networks","category":"vendor","branches":[{"name":"Prisma SD-WAN ION","category":"product_name","branches":[{"category":"product_version","name":"Prisma SD-WAN ION All","product":{"name":"Palo Alto Networks Prisma SD-WAN ION","product_id":"PANW-Prisma-SD-WAN-ION-1"}}]}]}]},"vulnerabilities":[{"cve":"CVE-2007-2768","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"One-Time Passwords in Everything (OPIE) is not used on Prisma SD-WAN ION, so there is no impact."}],"references":[{"category":"external","summary":"NVD - CVE-2007-2768","url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2768"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"One-Time Passwords in Everything (OPIE) is not used on Prisma SD-WAN ION, so there is no impact."}]},{"cve":"CVE-2016-8858","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"Prisma SD-WAN ION devices do not use the affected version of OpenSSH."}],"references":[{"category":"external","summary":"NVD - CVE-2016-8858","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-8858"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"Prisma SD-WAN ION devices do not use the affected version of OpenSSH."}]},{"cve":"CVE-2016-10010","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"Prisma SD-WAN ION devices do not use the affected version of OpenSSH."}],"references":[{"category":"external","summary":"NVD - CVE-2016-10010","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10010"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"Prisma SD-WAN ION devices do not use the affected version of OpenSSH."}]},{"cve":"CVE-2016-10011","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"Prisma SD-WAN ION devices do not use the affected version of OpenSSH."}],"references":[{"category":"external","summary":"NVD - CVE-2016-10011","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10011"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"Prisma SD-WAN ION devices do not use the affected version of OpenSSH."}]},{"cve":"CVE-2016-10012","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"Prisma SD-WAN ION devices do not use the affected version of OpenSSH."}],"references":[{"category":"external","summary":"NVD - CVE-2016-10012","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10012"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"Prisma SD-WAN ION devices do not use the affected version of OpenSSH."}]},{"cve":"CVE-2016-20012","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"This is disputed by the OpenSSH maintainers and no official patch has been released for OpenSSH. This will not be treated as a valid vulnerability."}],"references":[{"category":"external","summary":"NVD - CVE-2016-20012","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-20012"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"This is disputed by the OpenSSH maintainers and no official patch has been released for OpenSSH. This will not be treated as a valid vulnerability."}]},{"cve":"CVE-2019-6109","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"Prisma SD-WAN ION devices do not use the affected version of OpenSSH."}],"references":[{"category":"external","summary":"NVD - CVE-2019-6109","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6109"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"Prisma SD-WAN ION devices do not use the affected version of OpenSSH."}]},{"cve":"CVE-2019-6110","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"Prisma SD-WAN ION devices do not expose scp to users or super users and are therefore not impacted."}],"references":[{"category":"external","summary":"NVD - CVE-2019-6110","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6110"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"Prisma SD-WAN ION devices do not expose scp to users or super users and are therefore not impacted."}]},{"cve":"CVE-2019-6111","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"Prisma SD-WAN ION devices do not use the affected version of OpenSSH."}],"references":[{"category":"external","summary":"NVD - CVE-2019-6111","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6111"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"Prisma SD-WAN ION devices do not use the affected version of OpenSSH."}]},{"cve":"CVE-2021-41617","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"AuthorizedKeysCommand and AuthorizedPrincipalsCommand are not set in sshd_config on Prisma SD-WAN ION devices, so there is no impact."}],"references":[{"category":"external","summary":"NVD - CVE-2021-41617","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41617"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"AuthorizedKeysCommand and AuthorizedPrincipalsCommand are not set in sshd_config on Prisma SD-WAN ION devices, so there is no impact."}]},{"cve":"CVE-2022-4450","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"Prisma SD-WAN ION devices are not affected as the vulnerability functions are not used in Prisma SD-WAN ION devices."}],"references":[{"category":"external","summary":"NVD - CVE-2022-4450","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-4450"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"Prisma SD-WAN ION devices are not affected as the vulnerability functions are not used in Prisma SD-WAN ION devices."}]},{"cve":"CVE-2023-0215","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"Prisma SD-WAN ION devices are not affected as the vulnerability functions are not used in Prisma SD-WAN ION devices."}],"references":[{"category":"external","summary":"NVD - CVE-2023-0215","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0215"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"Prisma SD-WAN ION devices are not affected as the vulnerability functions are not used in Prisma SD-WAN ION devices."}]},{"cve":"CVE-2023-0286","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"Prisma SD-WAN ION devices are not affected as the vulnerability functionality is not used in Prisma SD-WAN ION devices."}],"references":[{"category":"external","summary":"NVD - CVE-2023-0286","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0286"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"Prisma SD-WAN ION devices are not affected as the vulnerability functionality is not used in Prisma SD-WAN ION devices."}]},{"cve":"CVE-2023-28531","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"Prisma SD-WAN ION devices do not use ssh-agent and are therefore not impacted."}],"references":[{"category":"external","summary":"NVD - CVE-2023-28531","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28531"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"Prisma SD-WAN ION devices do not use ssh-agent and are therefore not impacted."}]},{"cve":"CVE-2023-38408","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"Prisma SD-WAN ION devices do not use ssh-agent and are therefore not impacted."}],"references":[{"category":"external","summary":"NVD - CVE-2023-38408","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38408"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"Prisma SD-WAN ION devices do not use ssh-agent and are therefore not impacted."}]},{"cve":"CVE-2023-51384","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"Prisma SD-WAN ION devices do not use ssh-agent and are therefore not impacted."}],"references":[{"category":"external","summary":"NVD - CVE-2023-51384","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-51384"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"Prisma SD-WAN ION devices do not use ssh-agent and are therefore not impacted."}]},{"cve":"CVE-2023-51385","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"The configuration settings required for exploitation are not made available in ssh_config, and customers do not have the ability to modify ssh_config. Therefore, there is no impact."}],"references":[{"category":"external","summary":"NVD - CVE-2023-51385","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-51385"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"The configuration settings required for exploitation are not made available in ssh_config, and customers do not have the ability to modify ssh_config. Therefore, there is no impact."}]},{"cve":"CVE-2023-51767","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"Prisma SD-WAN ION devices are not affected as no realistic scenarios exist where it is practical to exploit this issue."}],"references":[{"category":"external","summary":"NVD - CVE-2023-51767","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-51767"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"Prisma SD-WAN ION devices are not affected as no realistic scenarios exist where it is practical to exploit this issue."}]},{"cve":"CVE-2020-12062","product_status":{"known_not_affected":["PANW-Prisma-SD-WAN-ION-1"]},"notes":[{"category":"description","text":"Prisma SD-WAN ION devices are not affected as they do not expose scp to users or super users."}],"references":[{"category":"external","summary":"NVD - CVE-2020-12062","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-12062"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2024-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2024-0003"}],"threats":[{"category":"impact","description":"Prisma SD-WAN ION devices are not affected as they do not expose scp to users or super users."}]}]}