Palo Alto 安全中心 2024年07月04日
CVE-2024-2433 PAN-OS: Improper Privilege Management Vulnerability in Panorama Software Leads to Availability Loss (Severity: MEDIUM)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks Panorama 软件存在一个权限管理漏洞,允许经过身份验证的只读管理员通过 Web 界面上传文件,并用上传的文件填满磁盘分区,从而导致无法登录 Web 界面或下载 PAN-OS、WildFire 和内容镜像。该漏洞仅影响管理平面的 Web 界面,数据平面不受影响。

🎯 该漏洞允许经过身份验证的只读管理员通过 Web 界面上传文件,并用上传的文件填满磁盘分区,从而导致无法登录 Web 界面或下载 PAN-OS、WildFire 和内容镜像。

🛡️ 该漏洞仅影响管理平面的 Web 界面,数据平面不受影响。

🔧 该漏洞已在 PAN-OS 9.0.17-h4、PAN-OS 9.1.17、PAN-OS 10.1.12、PAN-OS 10.2.8、PAN-OS 11.0.3 及更高版本的 Panorama 中修复。

⚠️ 攻击者需要对 PAN-OS Web 界面进行身份验证才能利用该漏洞。

🧰 可以通过遵循 PAN-OS 技术文档中的“保护管理访问的最佳实践”来缓解该漏洞的影响。

🆘 有关如何从 CLI 清除受影响的磁盘分区的详细信息,请参阅 https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PLSJCA4。

Palo Alto Networks Security Advisories /CVE-2024-2433CVE-2024-2433 PAN-OS: Improper Privilege Management Vulnerability in Panorama Software Leads to Availability LossUrgencyMODERATEResponse EffortLOWRecoveryUSERValue DensityDIFFUSEAttack VectorNETWORKAttack ComplexityLOWAttack RequirementsNONEAutomatableYESUser InteractionNONEProduct ConfidentialityNONEProduct IntegrityNONEProduct AvailabilityLOWPrivileges RequiredHIGHSubsequent ConfidentialityNONESubsequent IntegrityNONESubsequent AvailabilityNONENVDJSON Published2024-03-13 Updated2024-03-13ReferencePAN-181876 andPAN-218663DiscoveredexternallyDescriptionAn improper authorization vulnerability in Palo Alto Networks Panorama software enables an authenticated read-only administrator to upload files using the web interface and completely fill one of the disk partitions with those uploaded files, which prevents the ability to log into the web interface or to download PAN-OS, WildFire, and content images. This issue affects only the web interface of the management plane; the dataplane is unaffected.Product StatusVersionsAffectedUnaffectedCloud NGFW NoneAllPAN-OS 11.1NoneAllPAN-OS 11.0< 11.0.3 on Panorama>= 11.0.3 on PanoramaPAN-OS 10.2< 10.2.8 on Panorama>= 10.2.8 on PanoramaPAN-OS 10.1< 10.1.12 on Panorama>= 10.1.12 on PanoramaPAN-OS 9.1< 9.1.17 on Panorama>= 9.1.17 on PanoramaPAN-OS 9.0< 9.0.17-h4 on Panorama>= 9.0.17-h4 on PanoramaPrisma Access NoneAllSeverity:MEDIUMCVSSv4.0Base Score:5.1 (CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/AU:Y/R:U/V:D/RE:L/U:Amber)Exploitation StatusPalo Alto Networks is not aware of any malicious exploitation of this issue.Weakness TypeCWE-269 Improper Privilege ManagementSolutionThis issue is fixed in Panorama on PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.12, PAN-OS 10.2.8, PAN-OS 11.0.3, and all later PAN-OS versions.Workarounds and MitigationsThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the effect of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.Please see https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PLSJCA4 for information about how to clear the affected disk partition from the CLI.AcknowledgmentsPalo Alto Networks thanks Omar Eissa (https://de.linkedin.com/in/oeissa) for discovering and reporting this issue.Timeline2024-03-13Initial publication

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Palo Alto Networks Panorama 权限管理 漏洞 安全
相关文章