{"id":"CVE-2024-9474","details":"A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges.\n\nCloud NGFW and Prisma Access are not impacted by this vulnerability.","modified":"2026-05-04T08:47:46.180421Z","published":"2024-11-18T16:15:29.780Z","withdrawn":"2026-05-04T08:47:46.180421Z","references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-9474"},{"type":"ADVISORY","url":"https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/"},{"type":"ADVISORY","url":"https://security.paloaltonetworks.com/CVE-2024-9474"},{"type":"EVIDENCE","url":"https://github.com/k4nfr3/CVE-2024-9474"},{"type":"EVIDENCE","url":"https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"10.1.0"},{"fixed":"10.1.14"}]},{"events":[{"introduced":"10.2.0"},{"fixed":"10.2.12"}]},{"events":[{"introduced":"11.0.0"},{"fixed":"11.0.6"}]},{"events":[{"introduced":"11.1.0"},{"fixed":"11.1.5"}]},{"events":[{"introduced":"11.2.0"},{"fixed":"11.2.4"}]},{"events":[{"introduced":"0"},{"last_affected":"10.1.14-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"10.1.14-h2"}]},{"events":[{"introduced":"0"},{"last_affected":"10.1.14-h4"}]},{"events":[{"introduced":"0"},{"last_affected":"10.2.12-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"10.2.12-h1"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0.6-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"11.1.5-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2.4-NA"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-9474.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}