CVE-2024-9474
HIGH KEV RANSOMWARE NUCLEIPaloaltonetworks Pan-os < 10.1.14 - OS Command Injection
Title source: ruleDescription
A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Exploits (10)
github
WORKING POC
8 stars
by TalatumLabs · pythonremote
https://github.com/TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC
github
WORKING POC
4 stars
by dcollaoa · pythonremote
https://github.com/dcollaoa/cve-2024-0012-gui-poc
github
WORKING POC
3 stars
by Regent8SH · pythonremote
https://github.com/Regent8SH/PanOsExploitMultitool
nomisec
WORKING POC
2 stars
by coskper-papa · remote
https://github.com/coskper-papa/PAN-OS_CVE-2024-9474
metasploit
WORKING POC
EXCELLENT
by watchTowr, sfewer-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/panos_management_unauth_rce.rb
Nuclei Templates (1)
PAN-OS Management Web Interface - Command Injection
HIGHVERIFIEDby watchTowr,iamnoooob,rootxharsh,pdresearch
Shodan:
cpe:"cpe:2.3:o:paloaltonetworks:pan-os" || http.favicon.hash:"-631559155"
FOFA:
icon_hash="-631559155"
References (5)
Scores
CVSS v3
7.2
EPSS
0.9418
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2024-11-18
VulnCheck KEV
2024-11-18
InTheWild.io
2024-11-18
ENISA EUVD
EUVD-2024-50354
Ransomware Use
Confirmed
CWE
CWE-78
Status
published
Products (6)
paloaltonetworks/pan-os
10.1.14 (3 CPE variants)
paloaltonetworks/pan-os
10.2.12 (2 CPE variants)
paloaltonetworks/pan-os
11.0.6
paloaltonetworks/pan-os
11.1.5
paloaltonetworks/pan-os
11.2.4
paloaltonetworks/pan-os
10.1.0 - 10.1.14
Published
Nov 18, 2024
KEV Added
Nov 18, 2024
Tracked Since
Feb 18, 2026