CVE detail
CVE-2024-0012: Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability
Source: CISA Known Exploited Vulnerabilities catalog · back to feed
Vendor / product
Palo Alto Networks · PAN-OS
- Date added (KEV)
- Nov 18, 2024
- CISA due date
- Dec 09, 2024
- Ransomware campaign use
- Known
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, management interface for affected devices should not be exposed to untrusted networks, including the internet.
Vendor fix: Vendor advisory
Scorifya interpretation
AI-generatedA short, structured read of the record above — generated when this page first loads, then cached for a week.
Plain English
Technical detail
From CISA
Palo Alto Networks PAN-OS contains an authentication bypass vulnerability in the web-based management interface for several PAN-OS products, including firewalls and VPN concentrators.
https://security.paloaltonetworks.com/CVE-2024-0012 ; https://nvd.nist.gov/vuln/detail/CVE-2024-0012
References
- https://security.paloaltonetworks.com/CVE-2024-0012Vendor Advisory
- https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/Vendor Advisory
- https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/ExploitThird Party Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-0012US Government Resource
Other recent CVEs from Palo Alto Networks
- CVE-2026-0300PAN-OS — Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability
- CVE-2025-0111PAN-OS — Palo Alto Networks PAN-OS File Read Vulnerability
- CVE-2025-0108PAN-OS — Palo Alto Networks PAN-OS Authentication Bypass Vulnerability
- CVE-2024-3393PAN-OS — Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability
- CVE-2024-9474PAN-OS — Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability
Check your domain's public posture
Scorifya doesn't test for specific CVEs, but if patching Palo Alto Networks changed your headers or TLS, a fresh hardening scan helps confirm nothing regressed externally.