<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2024-9474 PAN-OS: Privilege Escalation (PE) Vulnerability in the Web Management Interface in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/cve-2024-9474-pan-os-privilege-escalation-pe-vulnerability-in/m-p/623440#M5022</link>
    <description>&lt;P&gt;Hello V. Benfanti,&lt;/P&gt;
&lt;P&gt;On the one hand, you have to stay in the 10.2 tree with the PA-220, as this is the last version that supports the hardware platform.&lt;BR /&gt;Furthermore, the bug in 10.2.10-h7 is not yet fixed and you would have to switch to a fixed version at this point, in this case 10.2.12-h2.&lt;BR /&gt;Alternatively, please check whether you have followed the best practice regarding the protection of MGMT interfaces.&lt;BR /&gt;See here: &lt;A href="https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431" target="_blank"&gt;https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431&lt;/A&gt;&lt;BR /&gt;As you can reduce the CVE to a 5.9.&lt;/P&gt;
&lt;P&gt;Furthermore, please check if you have installed the Conntent version 8915-9075, so that the attacks can be recognized by the firewall (Threat IDs 95746, 95747, 95752, 95753, 95759, and 95763).&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
    <pubDate>Mon, 18 Nov 2024 16:23:57 GMT</pubDate>
    <dc:creator>SeSchulte</dc:creator>
    <dc:date>2024-11-18T16:23:57Z</dc:date>
    <item>
      <title>CVE-2024-9474 PAN-OS: Privilege Escalation (PE) Vulnerability in the Web Management Interface</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/cve-2024-9474-pan-os-privilege-escalation-pe-vulnerability-in/m-p/623299#M5021</link>
      <description>&lt;P&gt;Hello!&lt;BR /&gt;I just received and was reading this email&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-9474" target="_blank"&gt;CVE-2024-9474 PAN-OS: Privilege Escalation (PE) Vulnerability in the Web Management Interface&lt;/A&gt;&amp;nbsp;and if I'm reading it right, the guidance is to upgrade to&amp;nbsp;&lt;SPAN&gt;10.2.12-h2 or greater (I'm on a PA-220, 11 is not supported). I've been trying to stick with the&amp;nbsp;&lt;STRONG&gt;Preferred&lt;/STRONG&gt; versions here&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304" target="_blank"&gt;Support PAN-OS Software Release Guidance&lt;/A&gt;&amp;nbsp;and the latest Preferred version is&amp;nbsp;10.2.10-h7 which I believe is vulnerable. Do I have that right???&amp;nbsp; Thanks!&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VBenfanti_0-1731943900461.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/64052iEEEF77AED2611894/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="VBenfanti_0-1731943900461.png" alt="VBenfanti_0-1731943900461.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Nov 2024 15:37:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/cve-2024-9474-pan-os-privilege-escalation-pe-vulnerability-in/m-p/623299#M5021</guid>
      <dc:creator>V.Benfanti</dc:creator>
      <dc:date>2024-11-18T15:37:17Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-9474 PAN-OS: Privilege Escalation (PE) Vulnerability in the Web Management Interface</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/cve-2024-9474-pan-os-privilege-escalation-pe-vulnerability-in/m-p/623440#M5022</link>
      <description>&lt;P&gt;Hello V. Benfanti,&lt;/P&gt;
&lt;P&gt;On the one hand, you have to stay in the 10.2 tree with the PA-220, as this is the last version that supports the hardware platform.&lt;BR /&gt;Furthermore, the bug in 10.2.10-h7 is not yet fixed and you would have to switch to a fixed version at this point, in this case 10.2.12-h2.&lt;BR /&gt;Alternatively, please check whether you have followed the best practice regarding the protection of MGMT interfaces.&lt;BR /&gt;See here: &lt;A href="https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431" target="_blank"&gt;https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431&lt;/A&gt;&lt;BR /&gt;As you can reduce the CVE to a 5.9.&lt;/P&gt;
&lt;P&gt;Furthermore, please check if you have installed the Conntent version 8915-9075, so that the attacks can be recognized by the firewall (Threat IDs 95746, 95747, 95752, 95753, 95759, and 95763).&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Mon, 18 Nov 2024 16:23:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/cve-2024-9474-pan-os-privilege-escalation-pe-vulnerability-in/m-p/623440#M5022</guid>
      <dc:creator>SeSchulte</dc:creator>
      <dc:date>2024-11-18T16:23:57Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-9474 PAN-OS: Privilege Escalation (PE) Vulnerability in the Web Management Interface</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/cve-2024-9474-pan-os-privilege-escalation-pe-vulnerability-in/m-p/627804#M5032</link>
      <description>&lt;P&gt;IS Pan OS 9.1 vulnerable?&amp;nbsp; The advisory does not state.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2024 18:06:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/cve-2024-9474-pan-os-privilege-escalation-pe-vulnerability-in/m-p/627804#M5032</guid>
      <dc:creator>Ecaballero</dc:creator>
      <dc:date>2024-11-19T18:06:04Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-9474 PAN-OS: Privilege Escalation (PE) Vulnerability in the Web Management Interface</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/cve-2024-9474-pan-os-privilege-escalation-pe-vulnerability-in/m-p/627820#M5034</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/115758"&gt;@Ecaballero&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;It seems likely that it is since this covers all presently supported versions of PAN-OS. Since 9.1 is EoL and the PA-3000 series also went EoL here a couple of weeks ago there's zero support for that build anymore. I'd highly recommend that you secure the management port and&amp;nbsp; getting that equipment replaced.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2024 18:15:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/cve-2024-9474-pan-os-privilege-escalation-pe-vulnerability-in/m-p/627820#M5034</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2024-11-19T18:15:23Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-9474 PAN-OS: Privilege Escalation (PE) Vulnerability in the Web Management Interface</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/cve-2024-9474-pan-os-privilege-escalation-pe-vulnerability-in/m-p/628315#M5035</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/115758"&gt;@Ecaballero&lt;/a&gt;&amp;nbsp;- PanOS 9.1 is not vulnerable to this issue. However it is strongly advised to move off 9.1 as this is no longer a supported release.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2024 22:58:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/cve-2024-9474-pan-os-privilege-escalation-pe-vulnerability-in/m-p/628315#M5035</guid>
      <dc:creator>iarobertson</dc:creator>
      <dc:date>2024-11-19T22:58:00Z</dc:date>
    </item>
  </channel>
</rss>

