{"uuid": "b4544fe1-49d9-45af-bea6-c8cbfd4cad85", "vulnerability": {"vulnId": "CVE-2024-0012", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "b4544fe1-49d9-45af-bea6-c8cbfd4cad85"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2024-11-18T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2024-11-18T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2024-11-18T00:00:00Z"}, "scope": {"notes": "KEV entry: Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability | Affected: Palo Alto Networks / PAN-OS | Description: Palo Alto Networks PAN-OS contains an authentication bypass vulnerability in the web-based management interface for several PAN-OS products, including firewalls and VPN concentrators. | Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Additionally, management interface for affected devices should not be exposed to untrusted networks, including the internet. | Due date: 2024-12-09 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://security.paloaltonetworks.com/CVE-2024-0012 ; https://nvd.nist.gov/vuln/detail/CVE-2024-0012"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-306"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "PAN-OS", "due_date": "2024-12-09", "date_added": "2024-11-18", "vendorProject": "Palo Alto Networks", "vulnerabilityName": "Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability", "knownRansomwareCampaignUse": "Known"}}], "references": [{"id": "CVE-2024-0012", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-0012"}]}
