CVE-2024-0012

CRITICAL KEV RANSOMWARE NUCLEI

Paloaltonetworks Pan-os - Missing Authentication

Title source: rule

Description

An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 . The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended  best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability.

Exploits (14)

github WORKING POC 40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/Networks PAN-OS(CVE-2024-0012).py
nomisec SCANNER 24 stars
by watchtowrlabs · infoleak
https://github.com/watchtowrlabs/palo-alto-panos-cve-2024-0012
nomisec WORKING POC 20 stars
by Sachinart · remote
https://github.com/Sachinart/CVE-2024-0012-POC
nomisec WORKING POC 8 stars
by TalatumLabs · remote
https://github.com/TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC
nomisec WORKING POC 4 stars
by dcollaoa · remote
https://github.com/dcollaoa/cve-2024-0012-gui-poc
nomisec WORKING POC 3 stars
by Regent8SH · remote
https://github.com/Regent8SH/PanOsExploitMultitool
nomisec WORKING POC 3 stars
by 0xjessie21 · remote
https://github.com/0xjessie21/CVE-2024-0012
nomisec SUSPICIOUS 2 stars
by iSee857 · remote
https://github.com/iSee857/CVE-2024-0012-poc
nomisec SCANNER 1 stars
by greaselovely · remote
https://github.com/greaselovely/CVE-2024-0012
nomisec WORKING POC
by punitdarji · remote
https://github.com/punitdarji/Paloalto-CVE-2024-0012
nomisec WORKING POC
by Gr-1m · poc
https://github.com/Gr-1m/cve-2024-0012-poc
metasploit WORKING POC EXCELLENT
by watchTowr, sfewer-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/panos_management_unauth_rce.rb

Nuclei Templates (1)

PAN-OS Management Web Interface - Authentication Bypass
CRITICALVERIFIEDby johnk3r,watchtowr
Shodan: cpe:"cpe:2.3:o:paloaltonetworks:pan-os" || http.favicon.hash:"-631559155"
FOFA: icon_hash="-631559155"

Scores

CVSS v3 9.8
EPSS 0.9428
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2024-11-18
VulnCheck KEV 2024-11-18
InTheWild.io 2024-11-18
ENISA EUVD EUVD-2024-15815
Ransomware Use Confirmed
CWE
CWE-306
Status published
Products (11)
paloaltonetworks/pan-os 10.2.0 (4 CPE variants)
paloaltonetworks/pan-os 10.2.1 (3 CPE variants)
paloaltonetworks/pan-os 10.2.2 (5 CPE variants)
paloaltonetworks/pan-os 10.2.3 (7 CPE variants)
paloaltonetworks/pan-os 10.2.4 (6 CPE variants)
paloaltonetworks/pan-os 10.2.5 (4 CPE variants)
paloaltonetworks/pan-os 10.2.6 (3 CPE variants)
paloaltonetworks/pan-os 10.2.7 (7 CPE variants)
paloaltonetworks/pan-os 10.2.8 (5 CPE variants)
paloaltonetworks/pan-os 10.2.9 (5 CPE variants)
... and 1 more
Published Nov 18, 2024
KEV Added Nov 18, 2024
Tracked Since Feb 18, 2026