FKIE_CVE-2024-9468

Vulnerability from fkie_nvd - Published: 2024-10-09 17:15 - Updated: 2025-12-01 17:19
Summary
A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.
Impacted products
Vendor Product Version
paloaltonetworks pan-os *
paloaltonetworks pan-os *
paloaltonetworks pan-os *
paloaltonetworks pan-os *
paloaltonetworks pan-os *
paloaltonetworks pan-os 10.2.4
paloaltonetworks pan-os 10.2.4
paloaltonetworks pan-os 10.2.4
paloaltonetworks pan-os 10.2.4
paloaltonetworks pan-os 10.2.4
paloaltonetworks pan-os 10.2.4
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.7
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 11.0.4
paloaltonetworks pan-os 11.0.4
paloaltonetworks pan-os 11.0.4

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D61F01F8-1598-4078-9D98-BFF5B62F3BA5",
              "versionEndExcluding": "10.2.4",
              "versionStartIncluding": "10.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACD23807-89D8-4907-832B-97A4B2F05C44",
              "versionEndExcluding": "10.2.7",
              "versionStartIncluding": "10.2.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60048B56-C9E4-4492-9F4F-485AC3690FA6",
              "versionEndExcluding": "11.0.4",
              "versionStartIncluding": "11.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A745BC6-C1CE-416D-AA06-158B0C7FBD14",
              "versionEndExcluding": "11.0.6",
              "versionStartIncluding": "11.0.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8B68256-3639-4A68-A977-8AA7964FF876",
              "versionEndExcluding": "11.1.3",
              "versionStartIncluding": "11.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "135588B5-6771-46A3-98B0-39B4873FD6FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h10:*:*:*:*:*:*",
              "matchCriteriaId": "6ADF2A5B-DC55-44B1-A033-4A29C32AB5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h16:*:*:*:*:*:*",
              "matchCriteriaId": "A17FE6D6-E0C3-4E82-A721-75C4E8001984",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*",
              "matchCriteriaId": "20673F1E-733D-41C4-A644-C482431C26EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*",
              "matchCriteriaId": "156DA55E-4152-47BF-A067-136EEC9ADE22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*",
              "matchCriteriaId": "C2D2F5C4-7ACC-4514-ADBD-3948158B93CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*",
              "matchCriteriaId": "A8C42D98-CF8F-456B-9D57-80BBDC2C8E74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*",
              "matchCriteriaId": "B3AAD4BA-22DD-43D3-91F1-8A6F5FBBF029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:*",
              "matchCriteriaId": "EFB63AFC-C3EC-4D1A-BC4A-810662AD16BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:*",
              "matchCriteriaId": "E67DEF1D-8674-41E8-AA07-0499DCCFD67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*",
              "matchCriteriaId": "AA4994CB-6591-4B44-A5D7-3CDF540B97DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:*",
              "matchCriteriaId": "71EB32DA-D82F-49DD-B06F-7F10F08F740E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:*",
              "matchCriteriaId": "BF05E61D-0EC2-4755-8FCF-12E102A4D8FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:*",
              "matchCriteriaId": "22ED8EDB-5549-4D29-90D2-FFE33D030912",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*",
              "matchCriteriaId": "A6AB7874-FE24-42AC-8E3A-822A70722126",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h17:*:*:*:*:*:*",
              "matchCriteriaId": "61B69220-4155-4462-A133-CE7A54747B83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h18:*:*:*:*:*:*",
              "matchCriteriaId": "34B083B9-CC1B-43CD-9A16-C018F7FA2DDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h19:*:*:*:*:*:*",
              "matchCriteriaId": "0D88CC33-7E32-4E82-8A94-70759E910510",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:*",
              "matchCriteriaId": "FA109AEA-0015-4EAA-BD86-F070FEEA2DF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h20:*:*:*:*:*:*",
              "matchCriteriaId": "F90EF82F-1CC6-44B4-AFF9-02DF4EE84F81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h21:*:*:*:*:*:*",
              "matchCriteriaId": "FA91A4E9-CE1E-4CB8-B717-4B0E314C0171",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h22:*:*:*:*:*:*",
              "matchCriteriaId": "6B4D43CC-1B4E-4380-B4A2-487870EFC5B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h23:*:*:*:*:*:*",
              "matchCriteriaId": "DF7382E1-0678-40BC-8964-9D00F6C4C6F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*",
              "matchCriteriaId": "5D64390F-F870-4DBF-B0FE-BCDFE58C8685",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1:*:*:*:*:*:*",
              "matchCriteriaId": "B3958C91-1860-4A07-A098-7292F9DC96EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*",
              "matchCriteriaId": "F70FC9DF-10C9-4AE5-B64B-3153E2E4E9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11:*:*:*:*:*:*",
              "matchCriteriaId": "DB5A8E21-7651-47B7-B40B-8DDC4EBC5795",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12:*:*:*:*:*:*",
              "matchCriteriaId": "59E2A308-1AFF-4E62-9485-20EB02A43357",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*",
              "matchCriteriaId": "C3D6D552-6F33-496A-A505-5F59DF3B487B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h14:*:*:*:*:*:*",
              "matchCriteriaId": "D483DFD5-D838-48AF-B1D8-7AAED4F58F42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*",
              "matchCriteriaId": "D1ECD1DC-5A05-4E4F-97F5-136CE777FAB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h16:*:*:*:*:*:*",
              "matchCriteriaId": "4C3CF045-0411-4EDF-904E-233E1A315EC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h17:*:*:*:*:*:*",
              "matchCriteriaId": "DDFDC7AD-687D-4CE8-AB1E-01D51BA90054",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h18:*:*:*:*:*:*",
              "matchCriteriaId": "347E5938-24FF-4C2C-B823-988D34706E24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h19:*:*:*:*:*:*",
              "matchCriteriaId": "C889402F-138A-45B9-BBCF-91FD18A0B810",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2:*:*:*:*:*:*",
              "matchCriteriaId": "36344DFC-4DC6-4B0A-945F-54DED38A2804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*",
              "matchCriteriaId": "CBA2B4FA-16C2-41B9-856D-EDC0CAF7A164",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*",
              "matchCriteriaId": "E5E6A893-2994-40A3-AF35-8AF068B0DE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5:*:*:*:*:*:*",
              "matchCriteriaId": "3C8EBBD0-87C1-4C87-835A-4EE42A32F3C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6:*:*:*:*:*:*",
              "matchCriteriaId": "0AB51213-364F-4096-B987-2B7270D1214D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7:*:*:*:*:*:*",
              "matchCriteriaId": "2D695DB8-B799-493A-857F-235C8A847C61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8:*:*:*:*:*:*",
              "matchCriteriaId": "F269105A-20A7-46B3-8658-E4CEF1C046F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9:*:*:*:*:*:*",
              "matchCriteriaId": "A4914841-B9FB-491F-88BB-1654B5E7885B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*",
              "matchCriteriaId": "D814F3A3-5E9D-426D-A654-1346D9ECE9B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*",
              "matchCriteriaId": "8C7E9211-7041-4720-B4B9-3EA95D425263",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*",
              "matchCriteriaId": "2094463F-3FB0-4131-B593-B6CF9450095A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*",
              "matchCriteriaId": "DFA49934-1DAD-49FE-BF25-99FA62A97F06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*",
              "matchCriteriaId": "2A547AE6-1CD7-416C-93B1-44AFD005CA84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*",
              "matchCriteriaId": "784B4169-F917-43BD-8C5F-7D23F3F05F92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*",
              "matchCriteriaId": "1720C072-7776-43A8-AFA5-5900CBDF93C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*",
              "matchCriteriaId": "E942C669-8D3A-47AA-A4D4-823D029932A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*",
              "matchCriteriaId": "8E542ED7-98EB-4F06-87D3-5D708BD69F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*",
              "matchCriteriaId": "4E9EB9C6-78BA-4C66-A4BD-856BF27388CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "03C5ABF2-8C53-4376-8A64-6CB34E18E77C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*",
              "matchCriteriaId": "64F22CCE-6EAF-403B-B522-C11085410C65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*",
              "matchCriteriaId": "872BC747-512A-4872-AC86-E7F1DC589F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*",
              "matchCriteriaId": "67F527D0-F85B-4B83-AEA5-BA636FC89210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "723956E9-11FD-42A0-8A35-C1FDE9E1877C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h1:*:*:*:*:*:*",
              "matchCriteriaId": "5601B7E0-68C9-4226-AA3D-D20012F6394B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h2:*:*:*:*:*:*",
              "matchCriteriaId": "6C953C2D-771C-40FC-AA09-1DFB0272AF47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de corrupci\u00f3n de memoria en el software PAN-OS de Palo Alto Networks permite que un atacante no autenticado bloquee PAN-OS debido a un paquete creado a trav\u00e9s del plano de datos, lo que genera una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Los intentos repetidos de activar esta condici\u00f3n har\u00e1n que PAN-OS entre en modo de mantenimiento."
    }
  ],
  "id": "CVE-2024-9468",
  "lastModified": "2025-12-01T17:19:55.980",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "YES",
          "Recovery": "USER",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "HIGH",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "NONE",
          "providerUrgency": "AMBER",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "CONCENTRATED",
          "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:L/U:Amber",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "LOW"
        },
        "source": "psirt@paloaltonetworks.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-10-09T17:15:20.637",
  "references": [
    {
      "source": "psirt@paloaltonetworks.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security.paloaltonetworks.com/CVE-2024-9468"
    }
  ],
  "sourceIdentifier": "psirt@paloaltonetworks.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "psirt@paloaltonetworks.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…