Palo Alto Networks Security Advisories /CVE-2024-8688CVE-2024-8688 PAN-OS: Arbitrary File Read Vulnerability in the Command Line Interface (CLI)UrgencyMODERATEResponse EffortMODERATERecoveryUSERValue DensityCONCENTRATEDAttack VectorLOCALAttack ComplexityLOWAttack RequirementsNONEAutomatableNOUser InteractionNONEProduct ConfidentialityHIGHProduct IntegrityNONEProduct AvailabilityNONEPrivileges RequiredHIGHSubsequent ConfidentialityNONESubsequent IntegrityNONESubsequent AvailabilityNONENVDJSON Published2024-09-11 Updated2024-09-11ReferencePAN-151792 andPAN-82874DiscoveredexternallyDescriptionAn improper neutralization of matching symbols vulnerability in the Palo Alto Networks PAN-OS command line interface (CLI) enables authenticated administrators (including read-only administrators) with access to the CLI to to read arbitrary files on the firewall.Product StatusVersionsAffectedUnaffectedCloud NGFW NoneAllPAN-OS 11.2NoneAllPAN-OS 11.1NoneAllPAN-OS 11.0NoneAllPAN-OS 10.2NoneAllPAN-OS 10.1< 10.1.1>= 10.1.1PAN-OS 10.0< 10.0.10>= 10.0.10PAN-OS 9.1< 9.1.15>= 9.1.15Prisma Access NoneAllSeverity:MEDIUMCVSSv4.0Base Score:6.7 (CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Amber)Exploitation StatusPalo Alto Networks is not aware of any malicious exploitation of this issue.Weakness TypeCWE-155 Improper Neutralization of Wildcards or Matching SymbolsSolutionThis issue is fixed in PAN-OS 9.1.15, PAN-OS 10.0.10, PAN-OS 10.1.1, and all later PAN-OS versions.AcknowledgmentsPalo Alto Networks thanks Matei "Mal" Badanoiu of Deloitte for discovering and reporting this issue.Timeline2024-09-11Initial publication