Headline
CVE-2023-6795: CVE-2023-6795 PAN-OS: OS Command Injection Vulnerability in the Web Interface
An OS command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
Palo Alto Networks Security Advisories / CVE-2023-6795
Urgency REDUCED
Response Effort LOW
Recovery AUTOMATIC
Value Density DIFFUSE
Attack Vector NETWORK
Attack Complexity LOW
Attack Requirements PRESENT
Automatable YES
User Interaction NONE
Product Confidentiality HIGH
Product Integrity LOW
Product Availability NONE
Privileges Required HIGH
Subsequent Confidentiality NONE
Subsequent Integrity NONE
Subsequent Availability NONE
NVD JSON
Published 2023-12-13
Updated 2023-12-13
Reference PAN-166315
Discovered externally
Description
An OS command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
Product Status
Versions
Affected
Unaffected
Cloud NGFW
None
All
PAN-OS 11.1
None
All
PAN-OS 11.0
None
All
PAN-OS 10.2
None
All
PAN-OS 10.1
< 10.1.3
>= 10.1.3
PAN-OS 10.0
< 10.0.9
>= 10.0.9
PAN-OS 9.1
< 9.1.12
>= 9.1.12
PAN-OS 9.0
< 9.0.17
>= 9.0.17
PAN-OS 8.1
< 8.1.24-h1
>= 8.1.24-h1
Prisma Access
None
All
Severity: MEDIUM
CVSSv4.0 Base Score: 5.9 (CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/AU:Y/R:A/V:D/RE:L/U:Green)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type
CWE-78 OS Command Injection
Solution
This issue is fixed in PAN-OS 8.1.24-h1, PAN-OS 9.0.17, PAN-OS 9.1.12, PAN-OS 10.0.9, PAN-OS 10.1.3, and all later PAN-OS versions.
Workarounds and Mitigations
This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.
Acknowledgments
Palo Alto Networks thanks an external reporter for discovering and reporting this issue.
Timeline
2023-12-13 Initial publication