🔐 CVE Alert

CVE-2024-0012

UNKNOWN 0.0 ⚠️ CISA KEV

PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015)

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 . The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended  best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability.

CWE CWE-306
Vendor palo alto networks
Product cloud ngfw
Published Nov 18, 2024
Last Updated Oct 21, 2025
⚠️ Actively Exploited — Act Now

Get instant alerts for palo alto networks cloud ngfw

This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2024-0012.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Palo Alto Networks / Cloud NGFW
All versions affected
Palo Alto Networks / PAN-OS
11.2.0 < 11.2.4-h1 11.1.0 < 11.1.5-h1 11.0.0 < 11.0.6-h1 10.2.0 < 10.2.12-h2
Palo Alto Networks / Prisma Access
All versions affected

References

NVD ↗ CVE.org ↗ EPSS Data ↗
security.paloaltonetworks.com: https://security.paloaltonetworks.com/CVE-2024-0012 labs.watchtowr.com: https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/ cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-0012 unit42.paloaltonetworks.com: https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/

Credits

Palo Alto Networks thanks our Deep Product Security Research Team for discovering this issue internally from threat activity.