From af5c04151f7221e4196fded0df497eccfcd70862 Mon Sep 17 00:00:00 2001 From: johnk3r <6247648+johnk3r@users.noreply.github.com> Date: Tue, 19 Nov 2024 15:07:12 -0300 Subject: [PATCH] Update CVE-2024-0012.yaml --- http/cves/2024/CVE-2024-0012.yaml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/http/cves/2024/CVE-2024-0012.yaml b/http/cves/2024/CVE-2024-0012.yaml index 91ae03a137..3584c1243d 100644 --- a/http/cves/2024/CVE-2024-0012.yaml +++ b/http/cves/2024/CVE-2024-0012.yaml @@ -4,6 +4,11 @@ info: name: Authentication Bypass in the Management Web Interface author: johnk3r severity: critical + description: | + An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities + reference: + - https://security.paloaltonetworks.com/CVE-2024-0012 + - https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/ tags: cve2024,cve,paloalto,globalprotect requests: