/

CVE-2024-0011 Report - Details, Severity, & Advisories

CVE-2024-0011 Report - Details, Severity, & Advisories

Twingate Team

May 9, 2024

CVE-2024-0011 is a medium-severity vulnerability affecting the Captive Portal feature of Palo Alto Networks PAN-OS software. This reflected cross-site scripting (XSS) issue allows the execution of malicious JavaScript in an authenticated user's browser if they click on a malicious link, potentially leading to phishing attacks and credential theft. Systems running Palo Alto Networks PAN-OS software with the Captive Portal feature are at risk.

How do I know if I'm affected?

To determine if you're affected by the CVE-2024-0011 vulnerability, you need to check if your firewall is configured to use Captive Portal authentication. This can be verified in the Captive Portal Settings page (Device > User Identification > Captive Portal Settings). The vulnerability affects systems running Palo Alto Networks PAN-OS software with the Captive Portal feature enabled. Unfortunately, information about affected Apple product versions is not available.

What should I do if I'm affected?

If you're affected by the CVE-2024-0011 vulnerability, update your PAN-OS to a secure version, such as 8.1.24, 9.0.17, 9.1.13, 10.0.11, or 10.1.3. Additionally, if you have a Threat Prevention subscription, enable Threat ID 93070 to block attacks related to this vulnerability. This will help protect your system from potential phishing attacks and credential theft.

Is CVE-2024-0011 in CISA’s Known Exploited Vulnerabilities Catalog?

The CVE-2024-0011 vulnerability is indeed listed in CISA's Known Exploited Vulnerabilities Catalog. This security issue involves a reflected cross-site scripting (XSS) vulnerability in the Captive Portal feature of Palo Alto Networks PAN-OS software. It was added to the catalog on February 14, 2024. However, the due date and required action for addressing this vulnerability are not provided.

Weakness enumeration

The weakness enumeration for this vulnerability is categorized as CWE-79 involves a cross-site scripting issue in Palo Alto Networks PAN-OS software's Captive Portal feature, classified as CWE-79. Updating to a secure PAN-OS version can help fix this issue.

For more details

CVE-2024-0011 is a medium-severity vulnerability that affects the Captive Portal feature of Palo Alto Networks PAN-OS software. For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, refer to the NVD or the links below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

/

CVE-2024-0011 Report - Details, Severity, & Advisories

CVE-2024-0011 Report - Details, Severity, & Advisories

Twingate Team

May 9, 2024

CVE-2024-0011 is a medium-severity vulnerability affecting the Captive Portal feature of Palo Alto Networks PAN-OS software. This reflected cross-site scripting (XSS) issue allows the execution of malicious JavaScript in an authenticated user's browser if they click on a malicious link, potentially leading to phishing attacks and credential theft. Systems running Palo Alto Networks PAN-OS software with the Captive Portal feature are at risk.

How do I know if I'm affected?

To determine if you're affected by the CVE-2024-0011 vulnerability, you need to check if your firewall is configured to use Captive Portal authentication. This can be verified in the Captive Portal Settings page (Device > User Identification > Captive Portal Settings). The vulnerability affects systems running Palo Alto Networks PAN-OS software with the Captive Portal feature enabled. Unfortunately, information about affected Apple product versions is not available.

What should I do if I'm affected?

If you're affected by the CVE-2024-0011 vulnerability, update your PAN-OS to a secure version, such as 8.1.24, 9.0.17, 9.1.13, 10.0.11, or 10.1.3. Additionally, if you have a Threat Prevention subscription, enable Threat ID 93070 to block attacks related to this vulnerability. This will help protect your system from potential phishing attacks and credential theft.

Is CVE-2024-0011 in CISA’s Known Exploited Vulnerabilities Catalog?

The CVE-2024-0011 vulnerability is indeed listed in CISA's Known Exploited Vulnerabilities Catalog. This security issue involves a reflected cross-site scripting (XSS) vulnerability in the Captive Portal feature of Palo Alto Networks PAN-OS software. It was added to the catalog on February 14, 2024. However, the due date and required action for addressing this vulnerability are not provided.

Weakness enumeration

The weakness enumeration for this vulnerability is categorized as CWE-79 involves a cross-site scripting issue in Palo Alto Networks PAN-OS software's Captive Portal feature, classified as CWE-79. Updating to a secure PAN-OS version can help fix this issue.

For more details

CVE-2024-0011 is a medium-severity vulnerability that affects the Captive Portal feature of Palo Alto Networks PAN-OS software. For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, refer to the NVD or the links below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

CVE-2024-0011 Report - Details, Severity, & Advisories

Twingate Team

May 9, 2024

CVE-2024-0011 is a medium-severity vulnerability affecting the Captive Portal feature of Palo Alto Networks PAN-OS software. This reflected cross-site scripting (XSS) issue allows the execution of malicious JavaScript in an authenticated user's browser if they click on a malicious link, potentially leading to phishing attacks and credential theft. Systems running Palo Alto Networks PAN-OS software with the Captive Portal feature are at risk.

How do I know if I'm affected?

To determine if you're affected by the CVE-2024-0011 vulnerability, you need to check if your firewall is configured to use Captive Portal authentication. This can be verified in the Captive Portal Settings page (Device > User Identification > Captive Portal Settings). The vulnerability affects systems running Palo Alto Networks PAN-OS software with the Captive Portal feature enabled. Unfortunately, information about affected Apple product versions is not available.

What should I do if I'm affected?

If you're affected by the CVE-2024-0011 vulnerability, update your PAN-OS to a secure version, such as 8.1.24, 9.0.17, 9.1.13, 10.0.11, or 10.1.3. Additionally, if you have a Threat Prevention subscription, enable Threat ID 93070 to block attacks related to this vulnerability. This will help protect your system from potential phishing attacks and credential theft.

Is CVE-2024-0011 in CISA’s Known Exploited Vulnerabilities Catalog?

The CVE-2024-0011 vulnerability is indeed listed in CISA's Known Exploited Vulnerabilities Catalog. This security issue involves a reflected cross-site scripting (XSS) vulnerability in the Captive Portal feature of Palo Alto Networks PAN-OS software. It was added to the catalog on February 14, 2024. However, the due date and required action for addressing this vulnerability are not provided.

Weakness enumeration

The weakness enumeration for this vulnerability is categorized as CWE-79 involves a cross-site scripting issue in Palo Alto Networks PAN-OS software's Captive Portal feature, classified as CWE-79. Updating to a secure PAN-OS version can help fix this issue.

For more details

CVE-2024-0011 is a medium-severity vulnerability that affects the Captive Portal feature of Palo Alto Networks PAN-OS software. For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, refer to the NVD or the links below.