PAN-OS: Authentication Bypass in the Management Web Interface

PAN-OS: Authentication Bypass in the Management Web Interface

Missing authentication for critical function in the FortiManager fgfmd daemon [CWE-306] vulnerability could allow a remote unauthenticated attacker to execute arbitrary code or commands through specially crafted requests.

PAN-OS: Authentication Bypass in the Management Web Interface

An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474.

The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines.

This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software on PA-Series, VM-Series, and CN-Series firewalls and on Panorama (virtual and M-Series).

Cloud NGFW and Prisma Access are not impacted by this vulnerability.

Affected Systems

Version Affected Unaffected
Cloud NGFW None All
PAN-OS 11.2 < 11.2.4-h1 >= 11.2.4-h1
PAN-OS 11.1 < 11.1.5-h1 >= 11.1.5-h1
PAN-OS 11.0 < 11.0.6-h1 >= 11.0.6-h1
PAN-OS 10.2 < 10.2.12-h2 >= 10.2.12-h2
PAN-OS 10.1 None All
Prisma Access None All

IoC’s

-

Recommended Solution(s)

We strongly recommend that you secure access to your management interface following the instructions in the workarounds section below.

This issue is fixed in PAN-OS 10.2.12-h2, PAN-OS 11.0.6-h1, PAN-OS 11.1.5-h1, PAN-OS 11.2.4-h1, and all later PAN-OS versions.
In addition, in an attempt to provide the most seamless upgrade path for our customers, we are making fixes available for other TAC-preferred and commonly deployed maintenance releases.

Workarounds and Mitigations
Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you haven’t already, we strongly recommend that you secure access to your management interface according to our best practice deployment guidelines. Specifically, you should restrict access to the management interface to only trusted internal IP addresses to prevent external access from the internet.
Additionally, if you have a Threat Prevention subscription, you can block these attacks using Threat IDs 95746, 95747, 95752, 95753, 95759, and 95763 (available in Applications and Threats content version 8915-9075 and later). For these Threat IDs to protect against attacks for this vulnerability,

Mitigations

-

CVE / CWE

Related Website(s)

* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.