Vulnerabilities > Paloaltonetworks

DATE CVE VULNERABILITY TITLE RISK
2022-05-11 CVE-2022-0024 Unspecified vulnerability in Paloaltonetworks Pan-Os
A vulnerability exists in Palo Alto Networks PAN-OS software that enables an authenticated network-based PAN-OS administrator to upload a specifically created configuration that disrupts system processes and potentially execute arbitrary code with root privileges when the configuration is committed on both hardware and virtual firewalls.
network
low complexity
paloaltonetworks
critical
9.0
2022-05-11 CVE-2022-0025 Uncontrolled Search Path Element vulnerability in Paloaltonetworks Cortex XDR Agent
A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\) to execute a program with elevated privileges.
local
low complexity
paloaltonetworks CWE-427
7.2
2022-05-11 CVE-2022-0026 Unspecified vulnerability in Paloaltonetworks Cortex XDR Agent
A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\) to execute a program with elevated privileges.
local
low complexity
paloaltonetworks
7.2
2022-05-11 CVE-2022-0027 Incorrect Authorization vulnerability in Paloaltonetworks Cortex Xsoar 6.1.0/6.2.0/6.5.0
An improper authorization vulnerability in Palo Alto Network Cortex XSOAR software enables authenticated users in non-Read-Only groups to generate an email report that contains summary information about all incidents in the Cortex XSOAR instance, including incidents to which the user does not have access.
network
low complexity
paloaltonetworks CWE-863
4.0
2022-04-13 CVE-2022-0023 Improper Handling of Exceptional Conditions vulnerability in Paloaltonetworks Pan-Os
An improper handling of exceptional conditions vulnerability exists in the DNS proxy feature of Palo Alto Networks PAN-OS software that enables a meddler-in-the-middle (MITM) to send specifically crafted traffic to the firewall that causes the service to restart unexpectedly.
4.3
2022-03-09 CVE-2022-0022 Use of Password Hash With Insufficient Computational Effort vulnerability in Paloaltonetworks Pan-Os
Usage of a weak cryptographic algorithm in Palo Alto Networks PAN-OS software where the password hashes of administrator and local user accounts are not created with a sufficient level of computational effort, which allows for password cracking attacks on accounts in normal (non-FIPS-CC) operational mode.
local
low complexity
paloaltonetworks CWE-916
4.6
2022-02-10 CVE-2022-0011 Interpretation Conflict vulnerability in Paloaltonetworks Pan-Os
PAN-OS software provides options to exclude specific websites from URL category enforcement and those websites are blocked or allowed (depending on your rules) regardless of their associated URL category.
network
low complexity
paloaltonetworks CWE-436
4.0
2022-02-10 CVE-2022-0016 Improper Handling of Exceptional Conditions vulnerability in Paloaltonetworks Globalprotect
An improper handling of exceptional conditions vulnerability exists within the Connect Before Logon feature of the Palo Alto Networks GlobalProtect app that enables a local attacker to escalate to SYSTEM or root privileges when authenticating with Connect Before Logon under certain circumstances.
6.9
2022-02-10 CVE-2022-0017 Link Following vulnerability in Paloaltonetworks Globalprotect
An improper link resolution before file access ('link following') vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that enables a local attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges under certain circumstances.
6.9
2022-02-10 CVE-2022-0018 Information Exposure vulnerability in Paloaltonetworks Globalprotect
An information exposure vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows and MacOS where the credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration.
network
high complexity
paloaltonetworks CWE-200
2.6