Palo Alto Networks Security Advisories / CVE-2023-38046

CVE-2023-38046 PAN-OS: Read System Files and Resources During Configuration Commit

Severity 5.5 · MEDIUM
Attack Vector NETWORK
Attack Complexity LOW
Confidentiality Impact HIGH
Privileges Required HIGH
Integrity Impact LOW
User Interaction NONE
Availability Impact NONE


A vulnerability exists in Palo Alto Networks PAN-OS software that enables an authenticated administrator with the privilege to commit a specifically created configuration to read local files and resources from the system.

Product Status

Cloud NGFW NoneAll
PAN-OS 11.0< 11.0.1>= 11.0.1
PAN-OS 10.2< 10.2.4>= 10.2.4
PAN-OS 10.1NoneAll
PAN-OS 10.0NoneAll
PAN-OS 9.1NoneAll
PAN-OS 9.0NoneAll
PAN-OS 8.1NoneAll
Prisma Access NoneAll

Severity: MEDIUM

CVSSv3.1 Base Score: 5.5 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type

CWE-610 Externally Controlled Reference to a Resource in Another Sphere


This issue is fixed in PAN-OS 10.2.4, PAN-OS 11.0.1, and all later PAN-OS versions.

Workarounds and Mitigations

This issue requires the attacker to have authenticated access to PAN-OS. You can mitigate the impact of this issue by following best practices for securing PAN-OS. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at


Palo Alto Networks thanks Kajetan Rostojek for discovering and reporting this issue.


Initial publication
© 2024 Palo Alto Networks, Inc. All rights reserved.