CVE detail
CVE-2024-9474: Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability
Source: CISA Known Exploited Vulnerabilities catalog · back to feed
Vendor / product
Palo Alto Networks · PAN-OS
- Date added (KEV)
- Nov 18, 2024
- CISA due date
- Dec 09, 2024
- Ransomware campaign use
- Known
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, the management interfaces for affected devices should not be exposed to untrusted networks, including the internet.
Vendor fix: Vendor advisory
Scorifya interpretation
AI-generatedA short, structured read of the record above — generated when this page first loads, then cached for a week.
Plain English
Technical detail
From CISA
Palo Alto Networks PAN-OS contains an OS command injection vulnerability that allows for privilege escalation through the web-based management interface for several PAN products, including firewalls and VPN concentrators.
https://security.paloaltonetworks.com/CVE-2024-9474 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9474
References
- https://security.paloaltonetworks.com/CVE-2024-9474Vendor Advisory
- https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/Press/Media CoverageVendor Advisory
- https://github.com/k4nfr3/CVE-2024-9474Exploit
- https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/ExploitThird Party Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-9474
Other recent CVEs from Palo Alto Networks
- CVE-2026-0300PAN-OS — Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability
- CVE-2025-0111PAN-OS — Palo Alto Networks PAN-OS File Read Vulnerability
- CVE-2025-0108PAN-OS — Palo Alto Networks PAN-OS Authentication Bypass Vulnerability
- CVE-2024-3393PAN-OS — Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability
- CVE-2024-0012PAN-OS — Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability
Check your domain's public posture
Scorifya doesn't test for specific CVEs, but if patching Palo Alto Networks changed your headers or TLS, a fresh hardening scan helps confirm nothing regressed externally.