{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-2552","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","state":"PUBLISHED","assignerShortName":"palo_alto","dateReserved":"2024-03-15T22:43:28.837Z","datePublished":"2024-11-14T09:39:06.523Z","dateUpdated":"2024-11-14T19:08:21.217Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Cloud NGFW","vendor":"Palo Alto Networks","versions":[{"status":"unaffected","version":"All"}]},{"cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2:-:*:*:*:*:*:*"],"defaultStatus":"unaffected","product":"PAN-OS","vendor":"Palo Alto Networks","versions":[{"changes":[{"at":"11.2.4","status":"unaffected"}],"lessThan":"11.2.4","status":"affected","version":"11.2.0","versionType":"custom"},{"changes":[{"at":"11.1.5","status":"unaffected"}],"lessThan":"11.1.5","status":"affected","version":"11.1.0","versionType":"custom"},{"changes":[{"at":"11.0.6","status":"unaffected"}],"lessThan":"11.0.6","status":"affected","version":"11.0.0","versionType":"custom"},{"changes":[{"at":"10.2.12","status":"unaffected"}],"lessThan":"10.2.12","status":"affected","version":"10.2.0","versionType":"custom"},{"status":"unaffected","version":"10.1.0"}]},{"defaultStatus":"unaffected","product":"Prisma Access","vendor":"Palo Alto Networks","versions":[{"status":"unaffected","version":"All"}]}],"credits":[{"lang":"en","type":"finder","value":"Bobby Storey"}],"datePublic":"2024-11-13T18:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions in the management plane and delete files on the firewall."}],"value":"A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions in the management plane and delete files on the firewall."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}],"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}],"impacts":[{"capecId":"CAPEC-126","descriptions":[{"lang":"en","value":"CAPEC-126 Path Traversal"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NO","Recovery":"USER","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":6.8,"baseSeverity":"MEDIUM","privilegesRequired":"HIGH","providerUrgency":"AMBER","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"CONCENTRATED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Amber","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"MODERATE"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-22","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2024-11-14T09:39:06.523Z"},"references":[{"tags":["vendor-advisory"],"url":"https://security.paloaltonetworks.com/CVE-2024-2552"}],"solutions":[{"lang":"eng","supportingMedia":[{"base64":false,"type":"text/html","value":"This issue is fixed in PAN-OS 10.2.12, PAN-OS 11.0.6, PAN-OS 11.1.5, PAN-OS 11.2.4, and all later PAN-OS versions."}],"value":"This issue is fixed in PAN-OS 10.2.12, PAN-OS 11.0.6, PAN-OS 11.1.5, PAN-OS 11.2.4, and all later PAN-OS versions."}],"source":{"defect":["PAN-261332"],"discovery":"EXTERNAL"},"timeline":[{"lang":"en","time":"2024-11-13T17:00:00.000Z","value":"Initial publication"}],"title":"PAN-OS: Arbitrary File Delete Vulnerability in the Command Line Interface (CLI)","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>We strongly recommend customers to ensure access to your management interface is configured correctly in accordance with our recommended best practice deployment guidelines. In particular, we recommend that you ensure that access to the management interface is possible only from trusted internal IPs and not from the Internet. The vast majority of firewalls already follow this Palo Alto Networks and industry best practice.</p>Please see the following link for additional information regarding how to secure the management access of your palo alto networks device: <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431</a>"}],"value":"We strongly recommend customers to ensure access to your management interface is configured correctly in accordance with our recommended best practice deployment guidelines. In particular, we recommend that you ensure that access to the management interface is possible only from trusted internal IPs and not from the Internet. The vast majority of firewalls already follow this Palo Alto Networks and industry best practice.\n\nPlease see the following link for additional information regarding how to secure the management access of your palo alto networks device:  https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-14T18:58:28.794154Z","id":"CVE-2024-2552","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-14T19:08:21.217Z"}}]}}