Missing authentication for critical function in the FortiManager fgfmd daemon [CWE-306] vulnerability could allow a remote unauthenticated attacker to execute arbitrary code or commands through specially crafted requests.
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474.
The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines.
This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software on PA-Series, VM-Series, and CN-Series firewalls and on Panorama (virtual and M-Series).
Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Affected Systems
Version | Affected | Unaffected |
---|---|---|
Cloud NGFW | None | All |
PAN-OS 11.2 | < 11.2.4-h1 | >= 11.2.4-h1 |
PAN-OS 11.1 | < 11.1.5-h1 | >= 11.1.5-h1 |
PAN-OS 11.0 | < 11.0.6-h1 | >= 11.0.6-h1 |
PAN-OS 10.2 | < 10.2.12-h2 | >= 10.2.12-h2 |
PAN-OS 10.1 | None | All |
Prisma Access | None | All |
IoC’s
-
Recommended Solution(s)
We strongly recommend that you secure access to your management interface following the instructions in the workarounds section below.
This issue is fixed in PAN-OS 10.2.12-h2, PAN-OS 11.0.6-h1, PAN-OS 11.1.5-h1, PAN-OS
11.2.4-h1, and all later PAN-OS versions.
In addition, in an attempt to provide the most seamless upgrade path for our customers,
we are making fixes available for other TAC-preferred and commonly deployed maintenance
releases.
Workarounds and Mitigations
Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks
and industry best practices. However, if you haven’t already, we strongly recommend that
you secure access to your management interface according to our best practice deployment
guidelines. Specifically, you should restrict access to the management interface to only
trusted internal IP addresses to prevent external access from the internet.
Additionally, if you have a Threat Prevention subscription, you can block these attacks
using Threat IDs 95746, 95747, 95752, 95753, 95759, and 95763 (available in Applications
and Threats content version 8915-9075 and later). For these Threat IDs to protect
against attacks for this vulnerability,
Mitigations
-
CVE / CWE
Related Website(s)
* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.