CVE-2024-8686

A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as root on the firewall.
References
Configurations

Configuration 1 (hide)

cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*

History

03 Oct 2024, 01:35

Type Values Removed Values Added
First Time Paloaltonetworks pan-os
Paloaltonetworks
References () https://security.paloaltonetworks.com/CVE-2024-8686 - () https://security.paloaltonetworks.com/CVE-2024-8686 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CPE cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*

12 Sep 2024, 12:35

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de inyección de comandos en el software PAN-OS de Palo Alto Networks permite a un administrador autenticado eludir las restricciones del sistema y ejecutar comandos arbitrarios como superusuario en el firewall.

11 Sep 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-11 17:15

Updated : 2024-10-03 01:35


NVD link : CVE-2024-8686

Mitre link : CVE-2024-8686

CVE.ORG link : CVE-2024-8686


JSON object : View

Products Affected

paloaltonetworks

  • pan-os
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')