Loading HuntDB...

CVE-2024-9474

UNKNOWN
Published 2024-11-18T15:48:23.405Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2024-9474. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges.

Cloud NGFW and Prisma Access are not impacted by this vulnerability.

Understanding This Vulnerability

This Common Vulnerabilities and Exposures (CVE) entry provides detailed information about a security vulnerability that has been publicly disclosed. CVEs are standardized identifiers assigned by MITRE Corporation to track and catalog security vulnerabilities across software and hardware products.

The severity rating (UNKNOWN) indicates the potential impact of this vulnerability based on the CVSS (Common Vulnerability Scoring System) framework. Higher severity ratings typically indicate vulnerabilities that could lead to more significant security breaches if exploited. Security teams should prioritize remediation efforts based on severity, exploit availability, and the EPSS (Exploit Prediction Scoring System) score, which predicts the likelihood of exploitation in the wild.

If this vulnerability affects products or systems in your infrastructure, we recommend reviewing the affected products section, checking for available patches or updates from vendors, and implementing recommended workarounds or solutions until a permanent fix is available. Organizations should also monitor security advisories and threat intelligence feeds for updates about active exploitation of this vulnerability.

Available Exploits

No exploits available for this CVE.

Related News

Palo Alto Firewalls Under Attack As Miscreants Chain Flaws For Root Access

A recently patched Palo Alto Networks vulnerability (CVE-2025-0108) is being actively exploited alongside two older flaws (CVE-2024-9474 and CVE-2025-0111), allowing attackers to gain root access to unpatched firewalls. The Register reports: This story starts…

Slashdot.org 2025-02-19 21:40

Affected Products

References

Workarounds

Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you haven’t already, we strongly recommend that you secure access to your management interface according to our best practice deployment guidelines. Specifically, you should restrict access to the management interface to only trusted internal IP addresses to prevent external access from the internet.
Review information about how to secure management access to your Palo Alto Networks firewalls:

* Palo Alto Networks LIVEcommunity article:  https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices

Solutions

This issue is fixed in PAN-OS 10.1.14-h6, PAN-OS 10.2.12-h2, PAN-OS 11.0.6-h1, PAN-OS 11.1.5-h1, PAN-OS 11.2.4-h1, and all later PAN-OS versions.

In addition, in an attempt to provide the most seamless upgrade path for our customers, we are making fixes available for other TAC-preferred and commonly deployed maintenance releases.

* Additional PAN-OS 11.2 fixes: * ​​11.2.0-h1
* 11.2.1-h1
* 11.2.2-h2
* 11.2.3-h3
* 11.2.4-h1

* Additional PAN-OS 11.1 fixes: * 11.1.0-h4
* 11.1.1-h2
* 11.1.2-h15
* 11.1.3-h11
* 11.1.4-h7
* 11.1.5-h1

* Additional PAN-OS 11.0 fixes: * 11.0.0-h4
* 11.0.1-h5
* 11.0.2-h5
* 11.0.3-h13
* 11.0.4-h6
* 11.0.5-h2
* 11.0.6-h1

* Additional PAN-OS 10.2 fixes: * 10.2.0-h4
* 10.2.1-h3
* 10.2.2-h6
* 10.2.3-h14
* 10.2.4-h32
* 10.2.5-h9
* 10.2.6-h6
* 10.2.7-h18
* 10.2.8-h15
* 10.2.9-h16
* 10.2.10-h9
* 10.2.11-h6
* 10.2.12-h2

* Additional PAN-OS 10.1 fixes: * 10.1.9-h14
* 10.1.10-h9
* 10.1.11-h10
* 10.1.12-h3
* 10.1.13-h5
* 10.1.14-h6

Credits & Acknowledgments

finder

Palo Alto Networks thanks our Deep Product Security Research Team for discovering this issue internally from threat activity.

Timeline

Initial publication

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

December 9, 2024

Added to KEV

November 18, 2024

Required Action

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, the management interfaces for affected devices should not be exposed to untrusted networks, including the internet.

Affected Product

Vendor/Project: Palo Alto Networks
Product: PAN-OS

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.01.24 Released: January 24, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed MODERATE

GHSA-cgvw-jh5j-mgq3

Advisory Details

A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.

CVSS Scoring

CVSS Score

5.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: November 18, 2024, Modified: October 22, 2025

References

Published: 2024-11-18T15:48:23.405Z
Last Modified: 2025-07-28T19:42:39.202Z
Copied to clipboard!