CVE-2023-6792
PAN-OS vulnerability analysis and mitigation

Overview

An OS command injection vulnerability was discovered in the XML API of Palo Alto Networks PAN-OS software, identified as CVE-2023-6792. The vulnerability was disclosed on December 13, 2023, affecting multiple versions of PAN-OS including versions 8.1.x, 9.0.x, 9.1.x, 10.0.x, and 10.1.x. This security flaw specifically impacts PAN-OS configurations with XML API access enabled (Palo Advisory).

Technical details

The vulnerability is classified as an OS Command Injection (CWE-88) that allows argument delimiter injection in commands. It received a CVSS v3.1 base score of 5.9 (Medium severity) with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N. The attack vector is network-based with low attack complexity, requiring high privileges but no user interaction (Palo Advisory, NVD).

Impact

If successfully exploited, this vulnerability enables an authenticated API user to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall. The impact assessment indicates high confidentiality impact, low integrity impact, and no availability impact (Palo Advisory).

Mitigation and workarounds

The vulnerability has been patched in PAN-OS versions 8.1.24, 9.0.17, 9.1.15, 10.0.12, 10.1.6, and all later versions. For customers with a Threat Prevention subscription, enabling Threat ID 91715 (introduced in Applications and Threats content update 8473) can block attacks. Additional mitigation involves following best practices for securing administrative access as documented in the PAN-OS technical documentation (Palo Advisory).

Community reactions

The vulnerability was discovered and reported by Ethan Shackelford of IOActive, demonstrating active security research engagement with Palo Alto Networks' products (Palo Advisory).

Additional resources


SourceThis report was generated using AI

Related PAN-OS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-4231HIGH8.6
  • PAN-OSPAN-OS
  • cpe:2.3:o:paloaltonetworks:pan-os
NoYesJun 13, 2025
CVE-2025-4230HIGH8.4
  • PAN-OSPAN-OS
  • cpe:2.3:o:paloaltonetworks:pan-os
NoYesJun 13, 2025
CVE-2025-4615HIGH7
  • PAN-OSPAN-OS
  • cpe:2.3:o:paloaltonetworks:pan-os
NoYesOct 09, 2025
CVE-2026-0227MEDIUM6.6
  • PAN-OSPAN-OS
  • cpe:2.3:o:paloaltonetworks:pan-os
NoYesJan 15, 2026
CVE-2025-4614MEDIUM4.8
  • PAN-OSPAN-OS
  • cpe:2.3:o:paloaltonetworks:pan-os
NoYesOct 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management