A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
https://thehackernews.com/2025/07/hackers-exploit-apache-http-server-flaw.html
https://www.securityweek.com/second-recently-patched-flaw-exploited-to-hack-palo-alto-firewalls/
https://www.theregister.com/2025/02/19/palo_alto_firewall_attack/
https://thehackernews.com/2025/02/cisa-adds-palo-alto-networks-and.html
https://cyberscoop.com/edge-device-vulnerabilities-fuel-attack-sprees/
https://www.securityweek.com/palo-alto-networks-confirms-exploitation-of-firewall-vulnerability/
https://www.securityweek.com/hackers-exploit-palo-alto-firewall-vulnerability-day-after-disclosure/
https://www.securityweek.com/cisa-warns-of-zyxel-firewall-vulnerability-exploited-in-attacks/
https://www.theregister.com/2024/11/22/palo_alto_firewalls_under_exploit/
https://www.securityweek.com/2000-palo-alto-firewalls-compromised-via-new-vulnerabilities/
https://www.securityweek.com/palo-alto-patches-firewall-zero-day-exploited-in-operation-lunar-peek/
https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/
Published: 2024-11-18
Updated: 2024-12-20
Named Vulnerability: Operation Lunar PeekKnown Exploited Vulnerability (KEV)
Base Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:C
Severity: High
Base Score: 7.2
Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Severity: High
Base Score: 5.9
Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Severity: Medium
EPSS: 0.94174
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest