<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2024-0012-pan-os-authentication-bypass-in-the-management-web/m-p/999673#M2393</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70303"&gt;@StratogentNetworkTeam&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Based on your statement, it is recommended to upgrade the device to the preferred version as it is considered the most stable version. However, it is important to note that the decision to upgrade depends on the specific environment and any issues that may arise.&lt;/P&gt;
&lt;P&gt;If you encounter any issues with the preferred release and the issue has been addressed in the latest version, it may be advisable to upgrade to the latest version.&lt;/P&gt;
&lt;P&gt;Furthermore, if you have a test environment, it is recommended to validate the PAN-OS before performing the upgrade in the production environment. This will help ensure that the upgrade will not cause any unexpected issues or disruptions.&lt;/P&gt;</description>
    <pubDate>Fri, 27 Dec 2024 01:33:27 GMT</pubDate>
    <dc:creator>mshekh</dc:creator>
    <dc:date>2024-12-27T01:33:27Z</dc:date>
    <item>
      <title>CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015)</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2024-0012-pan-os-authentication-bypass-in-the-management-web/m-p/644716#M2364</link>
      <description>&lt;P&gt;It is suggested to upgrade to version 10.2.12-h2 to remediate the vulnerability. However, the firmware version 10.2.12-h2 is currently in monitoring status. It is also mentioned that the same fix is available in version 10.2.10-h9, which is the preferred version.&lt;/P&gt;
&lt;P&gt;My question is: if the fix is available in the preferred version, why recommend upgrading to a version that is still in monitoring status?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="StratogentNetworkTeam_0-1732216517067.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/64217i8140CE694533C480/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="StratogentNetworkTeam_0-1732216517067.png" alt="StratogentNetworkTeam_0-1732216517067.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 19:16:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2024-0012-pan-os-authentication-bypass-in-the-management-web/m-p/644716#M2364</guid>
      <dc:creator>StratogentNetworkTeam</dc:creator>
      <dc:date>2024-11-21T19:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015)</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2024-0012-pan-os-authentication-bypass-in-the-management-web/m-p/999673#M2393</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70303"&gt;@StratogentNetworkTeam&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Based on your statement, it is recommended to upgrade the device to the preferred version as it is considered the most stable version. However, it is important to note that the decision to upgrade depends on the specific environment and any issues that may arise.&lt;/P&gt;
&lt;P&gt;If you encounter any issues with the preferred release and the issue has been addressed in the latest version, it may be advisable to upgrade to the latest version.&lt;/P&gt;
&lt;P&gt;Furthermore, if you have a test environment, it is recommended to validate the PAN-OS before performing the upgrade in the production environment. This will help ensure that the upgrade will not cause any unexpected issues or disruptions.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Dec 2024 01:33:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/cve-2024-0012-pan-os-authentication-bypass-in-the-management-web/m-p/999673#M2393</guid>
      <dc:creator>mshekh</dc:creator>
      <dc:date>2024-12-27T01:33:27Z</dc:date>
    </item>
  </channel>
</rss>

