Palo Alto 安全中心 2024年11月14日
CVE-2024-2552 PAN-OS: Arbitrary File Delete Vulnerability in the Command Line Interface (CLI) (Severity: MEDIUM)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks PAN-OS软件存在命令注入漏洞,使管理员可绕过限制删除防火墙文件。该公司未发现恶意利用,此问题在多个PAN-OS版本中已修复。同时建议用户正确配置管理界面访问权限。

📌Palo Alto Networks PAN-OS软件存在命令注入漏洞

📌该漏洞可使管理员绕过限制删除防火墙文件

📌此问题在PAN-OS 10.2.12等多个版本中已修复

📌建议用户按最佳实践部署指南配置管理界面访问

A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions in the management plane and delete files on the firewall.Palo Alto Networks is not aware of any malicious exploitation of this issue.This issue is fixed in PAN-OS 10.2.12, PAN-OS 11.0.6, PAN-OS 11.1.5, PAN-OS 11.2.4, and all later PAN-OS versions.We strongly recommend customers to ensure access to your management interface is configured correctly in accordance with our recommended best practice deployment guidelines. In particular, we recommend that you ensure that access to the management interface is possible only from trusted internal IPs and not from the Internet. The vast majority of firewalls already follow this Palo Alto Networks and industry best practice.cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.2:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h10::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h9::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h8::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h7::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h6::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h14::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h13::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h11::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h10::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h8::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h7::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h6::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h12::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h11::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h10::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h9::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h8::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h7::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h6::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.0:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h13::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h12::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h6::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h16::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h15::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h14::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h13::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h12::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h11::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h10::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h9::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h8::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h7::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h6::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h13::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h12::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h11::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h10::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h9::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h8::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h7::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h6::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2:-::::::Show MoreShow Less

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Palo Alto Networks 命令注入漏洞 软件修复 安全防护
相关文章