An OS command injection vulnerability in the Palo Alto Networks PAN-OS command line interface (CLI) enables an authenticated administrator with access to the CLI to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8; PAN-OS 10.1 versions earlier than PAN-OS 10.1.3. Prisma Access customers that have Prisma Access 2.1 firewalls are impacted by this issue.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| paloaltonetworks | prisma_access | - | - |
| paloaltonetworks | prisma_access | - | - |
| paloaltonetworks | pan-os |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
7
Affected Products
2
References
paloaltonetworks / prisma_access
| 8.1.0 - 8.1.20 |
| - |
| paloaltonetworks | pan-os | 9.0.0 - 9.0.14 | - |
| paloaltonetworks | pan-os | 9.1.0 - 9.1.11 | - |
| paloaltonetworks | pan-os | 10.0.0 - 10.0.8 | - |
| paloaltonetworks | pan-os | 10.1.0 - 10.1.3 | - |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Exploitability
Impact