Metrics
Affected Vendors & Products
Link | Providers |
---|---|
https://security.paloaltonetworks.com/CVE-2024-5917 |
![]() ![]() |
Fri, 24 Jan 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
Wed, 15 Jan 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Paloaltonetworks
Paloaltonetworks cloud Ngfw Paloaltonetworks pan-os |
|
CPEs | cpe:2.3:a:paloaltonetworks:cloud_ngfw:*:*:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Paloaltonetworks
Paloaltonetworks cloud Ngfw Paloaltonetworks pan-os |
|
Metrics |
ssvc
|
Wed, 15 Jan 2025 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A server-side request forgery in PAN-OS software enables an unauthenticated attacker to use the administrative web interface as a proxy, which enables the attacker to view internal network resources not otherwise accessible. | A server-side request forgery in PAN-OS software enables an authenticated attacker with administrative privileges to use the administrative web interface as a proxy, which enables the attacker to view internal network resources not otherwise accessible. |
Metrics |
cvssV4_0
|
cvssV4_0
|
Thu, 14 Nov 2024 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A server-side request forgery in PAN-OS software enables an unauthenticated attacker to use the administrative web interface as a proxy, which enables the attacker to view internal network resources not otherwise accessible. | |
Title | PAN-OS: Server-Side Request Forgery in WildFire | |
Weaknesses | CWE-918 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2025-01-15T22:24:12.795Z
Reserved: 2024-06-12T15:27:57.001Z
Link: CVE-2024-5917

Updated: 2024-11-14T19:14:51.942Z

Status : Analyzed
Published: 2024-11-14T10:15:08.607
Modified: 2025-01-24T16:04:54.887
Link: CVE-2024-5917

No data.