Palo Alto 安全中心 2024年11月18日
CVE-2024-9474 PAN-OS: Privilege Escalation (PE) Vulnerability in the Web Management Interface (Severity: MEDIUM)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks发布安全公告,披露了PAN-OS软件中的一个权限提升漏洞(CVE-2024-9474)。该漏洞存在于Web管理界面,允许具有管理界面访问权限的管理员以root权限执行操作。该漏洞影响多个PAN-OS版本,但不影响Cloud NGFW和Prisma Access。Palo Alto Networks建议用户尽快升级到受影响版本的修复版本,并限制管理界面的访问权限,仅允许受信任的内部IP地址访问,以降低风险。

⚠️ **漏洞描述:** Palo Alto Networks PAN-OS软件的Web管理界面存在权限提升漏洞(CVE-2024-9474),允许具有管理界面访问权限的管理员以root权限执行操作。

💻 **受影响产品:** 该漏洞影响PAN-OS 10.1、10.2、11.0、11.1和11.2的特定版本,Cloud NGFW和Prisma Access不受影响。

🛡️ **缓解措施:** Palo Alto Networks建议用户升级到受影响版本的修复版本(例如PAN-OS 10.1.14-h6、PAN-OS 10.2.12-h2等),并限制管理界面的访问权限,仅允许受信任的内部IP地址访问。

📈 **风险等级:** 当允许外部IP地址从互联网访问管理界面时,风险最高。最严重的影响是恶意管理员能够篡改系统完整性。CVSS评分为6.9(如果限制IP地址访问,则降至5.9)。

🚨 **威胁活动:** Palo Alto Networks观察到有限数量的暴露于互联网流量的管理Web界面遭到该漏洞的攻击。

Palo Alto Networks Security Advisories /CVE-2024-9474CVE-2024-9474 PAN-OS: Privilege Escalation (PE) Vulnerability in the Web Management InterfaceExploit MaturityATTACKEDResponse EffortHIGHRecoveryUSERValue DensityCONCENTRATEDAttack VectorNETWORKAttack ComplexityLOWAttack RequirementsNONEAutomatableNOUser InteractionNONEProduct ConfidentialityNONEProduct IntegrityHIGHProduct AvailabilityNONEPrivileges RequiredHIGHSubsequent ConfidentialityNONESubsequent IntegrityNONESubsequent AvailabilityNONENVDJSON Published2024-11-18 Updated2024-11-18DiscoveredexternallyDescriptionA privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges.Cloud NGFW and Prisma Access are not impacted by this vulnerability.Product StatusVersionsAffectedUnaffectedCloud NGFWNoneAllPAN-OS 11.2< 11.2.4-h1>= 11.2.4-h1PAN-OS 11.1< 11.1.5-h1>= 11.1.5-h1PAN-OS 11.0< 11.0.6-h1>= 11.0.6-h1PAN-OS 10.2< 10.2.12-h2>= 10.2.12-h2PAN-OS 10.1< 10.1.14-h6>= 10.1.14-h6Prisma AccessNoneAllSee the Solution section for additional fixes to commonly deployed maintenance releases.Required Configuration for ExposureThe risk is greatest if you configure the management interface to enable access from the internet or any untrusted network either:DirectlyorThrough a dataplane interface that includes a management interface profile.The risk is greatly reduced if you make sure that only trusted internal IP addresses are allowed to access the management interface.Use the following steps to identify your recently detected devices in our Internet scans:To find your known assets that require remediation action, visit the Assets section of Customer Support Portal at https://support.paloaltonetworks.com (Products → Assets → All Assets → Remediation Required).The list of your known devices with an internet-facing management interface discovered in our scans are tagged with PAN-SA-2024-0015 with a last seen timestamp in UTC. If no such devices are listed, it indicates our scan did not find any devices with internet-facing management interface for your account in the last three days.Severity:MEDIUM, Suggested Urgency:HIGHESTThe risk is highest when you allow access to the management interface from external IP addresses on the internet. The worst impact is that a malicious administrator is able to tamper with the system integrity.CVSS-BT:6.9 /CVSS-B:6.9 (CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:A/AU:N/R:U/V:C/RE:H/U:Red)If you configure a specific list of IP addresses that only allow access to the management interface, you greatly reduce the risk of exploitation because attacks would require privileged access using only those IP addresses.CVSS-BT:5.9 /CVSS-B:5.9 (CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:A/AU:N/R:U/V:C/RE:H/U:Red)Exploitation StatusPalo Alto Networks observed threat activity that exploits this vulnerability against a limited number of management web interfaces that are exposed to internet traffic coming from outside the network.Weakness Type and ImpactCWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')CAPEC-88 OS Command InjectionSolutionThis issue is fixed in PAN-OS 10.1.14-h6, PAN-OS 10.2.12-h2, PAN-OS 11.0.6-h1, PAN-OS 11.1.5-h1, PAN-OS 11.2.4-h1, and all later PAN-OS versions.In addition, in an attempt to provide the most seamless upgrade path for our customers, we are making fixes available for other TAC-preferred and commonly deployed maintenance releases.Additional PAN-OS 11.2 fixes:​​11.2.0-h111.2.1-h111.2.2-h211.2.3-h311.2.4-h1Additional PAN-OS 11.1 fixes:11.1.0-h411.1.1-h211.1.2-h1511.1.3-h1111.1.4-h711.1.5-h1Additional PAN-OS 11.0 fixes:11.0.0-h411.0.1-h511.0.2-h511.0.3-h1311.0.4-h611.0.5-h211.0.6-h1Additional PAN-OS 10.2 fixes:10.2.0-h410.2.1-h310.2.2-h610.2.3-h1410.2.4-h3210.2.5-h910.2.6-h610.2.7-h1810.2.8-h1510.2.9-h1610.2.10-h910.2.11-h610.2.12-h2Additional PAN-OS 10.1 fixes:10.1.9-h1410.1.10-h910.1.11-h1010.1.12-h310.1.13-h510.1.14-h6Workarounds and MitigationsRecommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you haven’t already, we strongly recommend that you secure access to your management interface according to our best practice deployment guidelines. Specifically, you should restrict access to the management interface to only trusted internal IP addresses to prevent external access from the internet.Review information about how to secure management access to your Palo Alto Networks firewalls:AcknowledgmentsPalo Alto Networks thanks our Deep Product Security Research Team for discovering this issue internally from threat activity.Timeline2024-11-18Initial publication

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

PAN-OS 权限提升漏洞 CVE-2024-9474 网络安全 Palo Alto Networks
相关文章