PT-2024-8335 · Palo Alto Networks · Pan-Os
K4Nfr3
·
Published
2024-10-03
·
Updated
2025-11-04
·
CVE-2024-9474
CVSS v3.1
7.2
7.2
High
| Base vector | Vector | AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Palo Alto Networks PAN-OS versions prior to 10.1.14
Palo Alto Networks PAN-OS versions prior to 10.2.12
Palo Alto Networks PAN-OS versions prior to 11.0.6
Palo Alto Networks PAN-OS versions prior to 11.1.5
Palo Alto Networks PAN-OS versions prior to 11.2.4
Description
A privilege escalation issue in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. The vulnerability has been exploited in real-world incidents, with a backdoor called LITTLELAMB.WOOLTEA discovered in compromised Palo Alto Networks devices. This backdoor provides attackers with persistent access, allowing them to gather intelligence and conduct further attacks. It operates stealthily, using encrypted communication and can be spread through phishing campaigns or exploitation of vulnerabilities in peripheral network devices.
Recommendations
For Palo Alto Networks PAN-OS versions prior to 10.1.14, update to version 10.1.14 or later.
For Palo Alto Networks PAN-OS versions prior to 10.2.12, update to version 10.2.12 or later.
For Palo Alto Networks PAN-OS versions prior to 11.0.6, update to version 11.0.6 or later.
For Palo Alto Networks PAN-OS versions prior to 11.1.5, update to version 11.1.5 or later.
For Palo Alto Networks PAN-OS versions prior to 11.2.4, update to version 11.2.4 or later.
As a temporary workaround, consider restricting access to the management web interface to minimize the risk of exploitation.
Exploit
Fix
RCE
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2024-09891
CVE-2024-9474
PANOS_CVE2024_9474
Affected Products
Pan-Os
References · 260
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/panos_management_unauth_rce.rb⭐ 35135 🔗 14217 · Exploit
- 🔥 https://github.com/Chocapikk/CVE-2024-9474⭐ 45 🔗 19 · Exploit
- 🔥 https://github.com/optimistickn/CVE-2024-9474⭐ 49 🔗 12 · Exploit
- 🔥 https://github.com/k4nfr3/CVE-2024-9474⭐ 7 🔗 2 · Exploit
- 🔥 https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474 · Exploit
- https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2024-9474 · Security Note
- https://bdu.fstec.ru/vul/2024-09891 · Security Note
- https://security.paloaltonetworks.com/CVE-2024-9474 · Security Note, Vendor Advisory
- https://twitter.com/MortyJin/status/1915356742424183140 · Twitter Post
- https://twitter.com/ajnurcs/status/1862422662418415885 · Twitter Post
- https://twitter.com/F_Chkeel/status/1861064149305848026 · Twitter Post
- https://t.me/aptreports/15073 · Telegram Post
- https://twitter.com/MBeltranPardo/status/1860006081382220178 · Twitter Post
- https://twitter.com/The_Cyber_News/status/1892221804124791058 · Twitter Post