{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-0030","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2022-10-12T16:30:12.300Z","dateUpdated":"2025-05-15T14:00:04.162Z","dateReserved":"2021-12-28T00:00:00.000Z"},"containers":{"cna":{"title":"PAN-OS: Authentication Bypass in Web Interface","datePublic":"2022-10-12T00:00:00.000Z","providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2022-10-12T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"An authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface allows a network-based attacker with specific knowledge of the target firewall or Panorama appliance to impersonate an existing PAN-OS administrator and perform privileged actions."}],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0 All","status":"unaffected"},{"version":"9.1 All","status":"unaffected"},{"version":"10.1 All","status":"unaffected"},{"version":"10.2 All","status":"unaffected"},{"version":"10.0 All","status":"unaffected"},{"version":"8.1","status":"affected","lessThan":"8.1.24","versionType":"custom","changes":[{"at":"8.1.24","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2022-0030"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks the security researcher that discovered and reported this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-290 Authentication Bypass by Spoofing","cweId":"CWE-290"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-195571"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Customers with a Threat Prevention subscription can block known attacks for this vulnerability by enabling Threat ID 92720 (Applications and Threats content update 8630-7638).\n\nTo exploit this issue, the attacker must have network access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices."}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}],"timeline":[{"lang":"en","time":"2022-10-12T00:00:00.000Z","value":"Initial publication"}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.24 and all later PAN-OS versions.\n\nPlease note that PAN-OS 8.1 has reached its software end-of-life (EoL) and is supported only on PA-200, PA-500, and PA-5000 Series firewalls and on M-100 appliances and only until each of their respective hardware EoL dates:  https://www.paloaltonetworks.com/services/support/end-of-life-announcements/hardware-end-of-life-dates.html."}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T23:18:41.402Z"},"title":"CVE Program Container","references":[{"url":"https://security.paloaltonetworks.com/CVE-2022-0030","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-15T13:59:44.889716Z","id":"CVE-2022-0030","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-15T14:00:04.162Z"}}]}}