An authentication bypass in Palo Alto Networks PAN-OS...
        
  Critical severity
        
          Unreviewed
      
        Published
          Nov 18, 2024 
          to the GitHub Advisory Database
          •
          Updated Oct 22, 2025 
      
  
Description
        Published by the National Vulnerability Database
      Nov 18, 2024 
    
  
        Published to the GitHub Advisory Database
      Nov 18, 2024 
    
  
        Last updated
      Oct 22, 2025 
    
  
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 .
The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .
This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software.
Cloud NGFW and Prisma Access are not impacted by this vulnerability.
References