{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2024-098.pdf"
    },
    "title": "Command Injection Vulnerability in PaloAlto PAN-OS",
    "serial_number": "2024-098",
    "publish_date": "16-09-2024 12:05:51",
    "description": "On September 11, 2024, a high-severity command injection vulnerability has been addressed in PaloAlto PAN-OS. If exploited, this flaw could allow an authenticated attacker to execute arbitrary commands as root on the firewall.<br>\n",
    "url_title": "2024-098",
    "content_markdown": "---\ntitle: 'Command Injection Vulnerability in\u00a0PaloAlto\u00a0PAN-OS'\nnumber: '2024-098'\nversion: '1.0'\noriginal_date: '2024-09-11'\ndate: '2024-09-16'\n---\n\n_History:_\n\n* _16/09/2024 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn September 11, 2024, a high-severity command injection vulnerability has been addressed in PaloAlto PAN-OS. If exploited, this flaw could allow an authenticated attacker to execute arbitrary commands as root on the firewall.\n\n# Technical Details\n\nThe vulnerability **CVE-2024-8686**, with a CVSS score of 8.6, is a command injection vulnerability in Palo Alto Networks PAN-OS software. It enables an authenticated administrator to bypass system restrictions and run arbitrary commands as root on the firewall.\n\n# Affected Products\n\nThis vulnerability affects PAN-OS version 11.2.2.\n\n# Recommendations\n\nCERT-EU strongly recommends updating affected PAN-OS installations to the latest version [1].\n\n# References\n\n[1] <https://security.paloaltonetworks.com/CVE-2024-8686>\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>16/09/2024 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On September 11, 2024, a high-severity command injection vulnerability has been addressed in PaloAlto PAN-OS. If exploited, this flaw could allow an authenticated attacker to execute arbitrary commands as root on the firewall.</p><h2 id=\"technical-details\">Technical Details</h2><p>The vulnerability <strong>CVE-2024-8686</strong>, with a CVSS score of 8.6, is a command injection vulnerability in Palo Alto Networks PAN-OS software. It enables an authenticated administrator to bypass system restrictions and run arbitrary commands as root on the firewall.</p><h2 id=\"affected-products\">Affected Products</h2><p>This vulnerability affects PAN-OS version 11.2.2.</p><h2 id=\"recommendations\">Recommendations</h2><p>CERT-EU strongly recommends updating affected PAN-OS installations to the latest version [1].</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://security.paloaltonetworks.com/CVE-2024-8686\">https://security.paloaltonetworks.com/CVE-2024-8686</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}