{"uuid": "43dbbf0c-455d-412a-8bd5-e462a4b43bba", "vulnerability": {"vulnId": "CVE-2024-9474", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "43dbbf0c-455d-412a-8bd5-e462a4b43bba"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2024-11-18T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2024-11-18T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2024-11-18T00:00:00Z"}, "scope": {"notes": "KEV entry: Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability | Affected: Palo Alto Networks / PAN-OS | Description: Palo Alto Networks PAN-OS contains an OS command injection vulnerability that allows for privilege escalation through the web-based management interface for several PAN products, including firewalls and VPN concentrators. | Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, the management interfaces for affected devices should not be exposed to untrusted networks, including the internet. | Due date: 2024-12-09 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://security.paloaltonetworks.com/CVE-2024-9474 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9474"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-77"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "PAN-OS", "due_date": "2024-12-09", "date_added": "2024-11-18", "vendorProject": "Palo Alto Networks", "vulnerabilityName": "Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability", "knownRansomwareCampaignUse": "Known"}}], "references": [{"id": "CVE-2024-9474", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-9474"}]}
