Security Bulletin: PAN-OS Authentication Bypass and Privilege Escalation Vulnerabilities
November 22, 2024
By Lauren Farrell
On November 19, 2024, Palo Alto Networks disclosed two critical vulnerabilities in its PAN-OS software, CVE-2024-0012 an Authentication Bypas, and CVE-2024-9474 a Privilege Escalation. These vulnerabilities enable attackers to gain unauthorized administrative access and escalate privileges to root level. Exploitation of these vulnerabilities, observed in the wild, has been attributed to a targeted campaign dubbed Operation Lunar Peek.
Affected Products
CVE-2024-0012 (Authentication Bypass)- PAN-OS 10.2: Versions prior to 10.2.12-h2
- PAN-OS 11.0: Versions prior to 11.0.6-h1
- PAN-OS 11.1: Versions prior to 11.1.5-h1
- PAN-OS 11.2: Versions prior to 11.2.4-h1
- PAN-OS 10.1: Versions prior to 10.1.14-h6
- PAN-OS 10.2, 11.0, 11.1, 11.2: Same affected versions as CVE-2024-0012
Technical Details
CVE-2024-0012 – Authentication Bypass- Severity: Critical (CVSS 9.3)
- Description: Exploitation allows unauthenticated attackers to bypass authentication by supplying a crafted HTTP header (x-pan-authcheck: off) to the PAN-OS management web interface. This grants administrative privileges, enabling configuration tampering and potential exploitation of CVE-2024-9474.
- Severity: Medium (CVSS 6.9)
- Description: This flaw enables authenticated administrators to escalate privileges to root, allowing actions such as disabling security features and compromising system integrity.
Exploitation
Operation Lunar Peek- Exploitation has been observed on devices with exposed management interfaces, particularly in regions with high usage (e.g., United States, India, Mexico). Shadowserver estimates over 11,000 exposed systems globally.
- CVE-2024-0012 facilitates initial access, while CVE-2024-9474 is used for post-exploitation privilege escalation. Attackers deploy PHP webshells (SHA256 hash: 3C5F9034C86CB1952AA5BB07B4F77CE7D8BB5CC9FE5C029A32C72ADC7E814668) for further malicious actions.
Available Patches
- PAN-OS 10.1: Update to 10.1.14-h6 or later
- PAN-OS 10.2: Update to 10.2.12-h2 or later
- PAN-OS 11.0: Update to 11.0.6-h1 or later
- PAN-OS 11.1: Update to 11.1.5-h1 or later
- PAN-OS 11.2: Update to 11.2.4-h1 or later
Workarounds and Recommendations
Mitigations- Restrict Management Interface Access
- Block internet-facing access. Allow access only from trusted internal IPs or secure jump boxes.
- Enable Threat Prevention
- Apply Threat IDs (e.g., 95746 and 95747) to block exploits.
- Deploy administrative access best practices. Log administrative actions and monitor for anomalous configuration changes.
Conclusion
CVE-2024-0012 and CVE-2024-9474 highlight the criticality of securing internet-facing interfaces. Organizations should prioritize patching affected systems, adopt mitigations, and remain vigilant for evolving threats. Additionally, Centripetal’s CleanINTERNET® service can further protect networks by detecting and shielding malicious exploit attempts associated with CVE-2024-0012, CVE-2024-9474 through advanced threat intelligence and real-time traffic filtering. If you are a current client of Palo Alto and use PAN-OS please contact support@centripetal.ai. Centripetal is pleased to offer Penetration Testing and Vulnerability Assessment services to help organizations identify vulnerabilities and reduce risk. If interested, please contact our Professional Services team at profservs@centripetal.ai or reach out to your Centripetal Account Representative.Resources
- Palo Alto Networks Advisory: PAN-OS Vulnerabilities CVE-2024-0012 and CVE-2024-9474. Available at: Palo Alto Networks Security Advisory
- Unit42 Report: Operation Lunar Peek and Exploitation of PAN-OS Vulnerabilities. Available at: Unit42 Blog
- HelpNet Security: Analysis of CVE-2024-0012 Exploits and Mitigations. Available at: HelpNet Security
- The Register: PAN-OS Vulnerabilities Targeting Global Interfaces. Available at: The Register
- Censys Analysis: Global Exposure of PAN-OS Interfaces. Available at: Censys
Know what’s coming. Stop what’s next.
Sign up for our free threat alert bulletin service here.
The Cybercrime Barrier Your Organization Deserves
Sign up for a custom demonstration from our security team of how we bring together the best minds and most complete collection of threat intelligence to provide you with a shocking level of relief.