An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software enables an unauthenticated attacker with network access to bypass authentication controls when Cloud Authentication Service (CAS) is enabled.
The risk is higher if CAS is enabled on the management interface and lower when any other login interfaces are used.
The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .
This issue is applicable to PAN-OS software on PA-Series and VM-Series firewalls and on Panorama (virtual and M-Series).
Cloud NGFW and Prisma Access® are not impacted by this vulnerability.
CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber
CVSS Score: 4.8
If you configure restricted access to a jump box that is the only system allowed to access the management interface, you greatly reduce the risk of exploitation because attacks would require privileged access using only those IP addresses.
| Exploitability Metrics |
Vulnerable System Impact Metrics |
Subsequent System Impact Metrics |
| Attack Vector |
Local |
Confidentiality |
High |
Confidentiality |
None |
| Attack Complexity |
Low |
Integrity |
High |
Integrity |
None |
| Attack Requirements |
Present |
Availability |
High |
Availability |
None |
| Privileges Required |
None |
| User Interaction |
None |
If you configure restricted access to a jump box that is the only system allowed to access the management interface, you greatly reduce the risk of exploitation because attacks would require privileged access using only those IP addresses.
CVSS 4.0
CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber
CVSS Score: 2.7
If authentication profile with CAS is enabled on any other login based interface, the risk is lower.
| Exploitability Metrics |
Vulnerable System Impact Metrics |
Subsequent System Impact Metrics |
| Attack Vector |
Network |
Confidentiality |
None |
Confidentiality |
High |
| Attack Complexity |
Low |
Integrity |
None |
Integrity |
High |
| Attack Requirements |
Present |
Availability |
None |
Availability |
None |
| Privileges Required |
None |
| User Interaction |
None |
If authentication profile with CAS is enabled on any other login based interface, the risk is lower.
CVSS 4.0
Palo Alto Networks is not aware of any malicious exploitation of this issue.