CVE-2023-0010 PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in Captive Portal Authentication
|PAN-OS 10.2||< 10.2.2||>= 10.2.2|
|PAN-OS 10.1||< 10.1.6||>= 10.1.6|
|PAN-OS 10.0||< 10.0.11||>= 10.0.11|
|PAN-OS 9.1||< 9.1.16||>= 9.1.16|
|PAN-OS 9.0||< 9.0.17||>= 9.0.17|
|PAN-OS 8.1||< 8.1.24||>= 8.1.24|
Required Configuration for Exposure
This issue is applicable only to firewalls that are configured to use Captive Portal authentication.
On PAN-OS 10.0 and later software versions, this issue applies only to firewalls that have also disabled the default token generation for Captive Portal authentication. You can verify that the token is not disabled by running the following command: ‘show deviceconfig setting captive-portal’.
CVSSv3.1 Base Score: 5.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)
Palo Alto Networks is not aware of any malicious exploitation of this issue.
This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.11, PAN-OS 10.1.6, PAN-OS 10.2.2, and all later PAN-OS versions.
Workarounds and Mitigations
Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 92065 (Applications and Threats content update 8722).