Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0012: CWE-306 Missing Authentication for Critical Function in Palo Alto Networks Cloud NGFW

0
Critical
VulnerabilityCVE-2024-0012cvecve-2024-0012cwe-306
Published: Mon Nov 18 2024 (11/18/2024, 15:47:41 UTC)
Source: CVE Database V5
Vendor/Project: Palo Alto Networks
Product: Cloud NGFW

Description

An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https://security.paloaltonetworks.com/CVE-2024-9474 . The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended  best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software. Cloud NGFW and Prisma Access are not impacted by this vulnerability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 10:57:56 UTC

Technical Analysis

CVE-2024-0012 is a critical vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Palo Alto Networks PAN-OS software versions 10.2, 11.0, 11.1, and 11.2. The flaw resides in the management web interface of Cloud NGFW devices, where an attacker with network access can bypass authentication controls entirely. This allows the attacker to gain full administrator privileges without any credentials, enabling them to perform sensitive administrative operations such as altering firewall configurations, disabling security controls, or deploying malicious configurations. Furthermore, this vulnerability can be chained with other privilege escalation vulnerabilities like CVE-2024-9474 to deepen system compromise. The vulnerability is not present in Cloud NGFW or Prisma Access managed services, limiting its scope to on-premises or self-managed PAN-OS deployments. Palo Alto Networks recommends restricting access to the management interface strictly to trusted internal IP addresses as a primary mitigation. The vulnerability has a CVSS 4.0 score of 9.3, reflecting its critical nature due to ease of exploitation (no authentication or user interaction required), network attack vector, and severe impact on confidentiality, integrity, and availability of affected systems. No public exploits or active exploitation have been reported as of the publication date. This vulnerability underscores the importance of network segmentation and strict access controls for management interfaces in critical security infrastructure.

Potential Impact

The impact of CVE-2024-0012 is severe for organizations using affected PAN-OS versions on Cloud NGFW devices. An attacker exploiting this vulnerability can gain full administrative control over the firewall, allowing them to alter security policies, disable protections, exfiltrate sensitive data, or create persistent backdoors. This compromises the confidentiality, integrity, and availability of the network security infrastructure, potentially leading to widespread network breaches, data loss, or service disruptions. Because the vulnerability requires only network access to the management interface and no authentication, it significantly lowers the attacker's barrier to entry, especially in environments where management interfaces are exposed or insufficiently segmented. Organizations relying on these PAN-OS versions for perimeter or internal segmentation security face heightened risk of compromise. The ability to chain this vulnerability with others like CVE-2024-9474 further escalates the threat, enabling attackers to deepen their foothold and evade detection. The absence of impact on Cloud NGFW and Prisma Access reduces risk for cloud-managed deployments but does not mitigate risk for on-premises or hybrid environments. Overall, this vulnerability could lead to critical security failures and operational disruptions if exploited.

Mitigation Recommendations

1. Immediately restrict access to the PAN-OS management web interface to trusted internal IP addresses only, using firewall rules, VPNs, or network segmentation to isolate management traffic. 2. Apply Palo Alto Networks recommended best practice deployment guidelines for securing management access, including disabling remote management from untrusted networks. 3. Monitor network traffic to the management interface for unauthorized access attempts and anomalous behavior. 4. Upgrade affected PAN-OS versions to patched releases as soon as they become available from Palo Alto Networks. 5. Implement multi-factor authentication and strong password policies for all administrative accounts to reduce risk from chained vulnerabilities. 6. Regularly audit firewall configurations and logs to detect unauthorized changes or suspicious activity. 7. Employ network intrusion detection/prevention systems to alert on attempts to access management interfaces. 8. Consider isolating management interfaces on dedicated management networks inaccessible from general user or internet-facing networks. 9. Maintain an incident response plan specific to firewall compromise scenarios to quickly contain and remediate potential exploitation. 10. Stay informed on Palo Alto Networks security advisories and threat intelligence updates related to PAN-OS vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
palo_alto
Date Reserved
2023-11-09T18:56:17.699Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f7d9af247d717aace2687f

Added to database: 10/21/2025, 7:06:23 PM

Last enriched: 2/28/2026, 10:57:56 AM

Last updated: 3/24/2026, 1:38:33 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses