Vulnerability Details CVE-2018-9334
The PAN-OS management web interface page in PAN-OS 6.1.20 and earlier, PAN-OS 7.1.16 and earlier, PAN-OS 8.0.8 and earlier, and PAN-OS 8.1.0 may allow an attacker to access the GlobalProtect password hashes of local users via manipulation of the HTML markup.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 17.9%
CVSS Severity
CVSS v3 Score 5.5
CVSS v2 Score 2.1
Products affected by CVE-2018-9334
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.1
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.10
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.11
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.12
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.13
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.14
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.15
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.2
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.3
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.4
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.5
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.6
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.7
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.8
-
cpe:2.3:o:paloaltonetworks:pan-os:6.0.9
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.0
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.1
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.10
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.11
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.12
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.13
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.14
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.15
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.16
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.17
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.18
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.19
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.2
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.20
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.3
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.4
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.5
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.6
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.7
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.8
-
cpe:2.3:o:paloaltonetworks:pan-os:6.1.9
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.0
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.1
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.10
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.11
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.12
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.13
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.14
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.15
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.16
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.2
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.3
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.4
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.4-h2
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.5
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.6
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.7
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.8
-
cpe:2.3:o:paloaltonetworks:pan-os:7.1.9
-
cpe:2.3:o:paloaltonetworks:pan-os:8.0.1
-
cpe:2.3:o:paloaltonetworks:pan-os:8.0.2
-
cpe:2.3:o:paloaltonetworks:pan-os:8.0.3
-
cpe:2.3:o:paloaltonetworks:pan-os:8.0.4
-
cpe:2.3:o:paloaltonetworks:pan-os:8.0.5
-
cpe:2.3:o:paloaltonetworks:pan-os:8.0.6
-
cpe:2.3:o:paloaltonetworks:pan-os:8.0.7
-
cpe:2.3:o:paloaltonetworks:pan-os:8.0.8
-
cpe:2.3:o:paloaltonetworks:pan-os:8.1.0