CVE-2024-5917

Server-Side Request Forgery (SSRF) (CWE-918)

Published: Nov 14, 2024 / Updated: 5d ago

010
CVSS 6.3EPSS 0.04%Medium
CVE info copied to clipboard

Summary

A server-side request forgery in PAN-OS software enables an unauthenticated attacker to use the administrative web interface as a proxy, which enables the attacker to view internal network resources not otherwise accessible.

Impact

This vulnerability allows an unauthenticated attacker to potentially access and view internal network resources that should not be accessible from outside the network. This could lead to unauthorized information disclosure and potentially provide a foothold for further attacks. The CVSS v4 base score is 6.3 (Medium severity), with low impact on vulnerable system integrity and subsequent system confidentiality.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

The vulnerability data does not provide specific information about available patches. The security team should check with Palo Alto Networks for the latest security updates for PAN-OS software.

Mitigation

While waiting for a patch, consider the following mitigations: 1. Restrict access to the PAN-OS administrative web interface, allowing connections only from trusted IP addresses or networks. 2. Implement strong network segmentation to limit the potential impact if the vulnerability is exploited. 3. Monitor logs for unusual access attempts to the administrative interface. 4. Keep PAN-OS software updated with the latest security patches when they become available. 5. Consider implementing additional layers of authentication for accessing the administrative interface, such as multi-factor authentication.

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:A/V:D/RE:M/U:Amber

Timeline

CVE Assignment

NVD published the first details for CVE-2024-5917

Nov 14, 2024 at 10:15 AM
CVSS

A CVSS base score of 6.3 has been assigned.

Nov 14, 2024 at 10:20 AM / nvd
First Article

Feedly found the first article mentioning CVE-2024-5917. See article

Nov 14, 2024 at 10:24 AM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Nov 14, 2024 at 10:24 AM
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Nov 14, 2024 at 10:34 AM
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Nov 14, 2024 at 10:51 AM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (731903)

Nov 15, 2024 at 7:53 AM
EPSS

EPSS Score was set to: 0.04% (Percentile: 10.2%)

Nov 15, 2024 at 10:16 AM
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Nov 19, 2024 at 11:33 AM
Static CVE Timeline Graph

Affected Systems

Paloaltonetworks/pan-os
+null more

Attack Patterns

CAPEC-664: Server Side Request Forgery
+null more

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI