Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-0024 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Palo Alto PAN-OS Operating systems & Components / Operating system |
Vendor | Palo Alto Networks, Inc. |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU63073
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2022-0024
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise the affected system.
The vulnerability exists due to insufficient validation of user-supplied input. A authenticated network-based PAN-OS administrator can upload a specifically created configuration that disrupts system processes and potentially execute arbitrary code with root privileges when the configuration is committed on both hardware and virtual firewalls.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPalo Alto PAN-OS: 8.1 - 10.1.4
CPE2.3 External linkshttp://security.paloaltonetworks.com/CVE-2022-0024
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?