{"api_version":"1","generated_at":"2026-04-22T22:58:11+00:00","cve":"CVE-2022-0030","urls":{"html":"https://cve.report/CVE-2022-0030","api":"https://cve.report/api/cve/CVE-2022-0030.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-0030","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-0030"},"summary":{"title":"CVE-2022-0030","description":"An authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface allows a network-based attacker with specific knowledge of the target firewall or Panorama appliance to impersonate an existing PAN-OS administrator and perform privileged actions.","state":"PUBLIC","assigner":"psirt@paloaltonetworks.com","published_at":"2022-10-12 17:15:00","updated_at":"2022-10-14 15:33:00"},"problem_types":["CWE-290"],"metrics":[],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2022-0030","name":"https://security.paloaltonetworks.com/CVE-2022-0030","refsource":"MISC","tags":[],"title":"CVE-2022-0030 PAN-OS: Authentication Bypass in Web Interface","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-0030","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0030","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Palo Alto Networks thanks the security researcher that discovered and reported this issue.","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"30","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"paloaltonetworks","cpe5":"pan-os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-0030","qid":"730624","title":"Palo Alto Networks (PAN-OS) Authentication Bypass Vulnerability in Web Interface (PAN-195571)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"psirt@paloaltonetworks.com","DATE_PUBLIC":"2022-10-12T16:00:00.000Z","ID":"CVE-2022-0030","STATE":"PUBLIC","TITLE":"PAN-OS: Authentication Bypass in Web Interface"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"PAN-OS","version":{"version_data":[{"version_affected":"<","version_name":"8.1","version_value":"8.1.24"},{"version_affected":"!>=","version_name":"8.1","version_value":"8.1.24"},{"version_affected":"!","version_name":"9.0","version_value":"All"},{"version_affected":"!","version_name":"9.1","version_value":"All"},{"version_affected":"!","version_name":"10.1","version_value":"All"},{"version_affected":"!","version_name":"10.2","version_value":"All"},{"version_affected":"!","version_name":"10.0","version_value":"All"}]}},{"product_name":"Cloud NGFW","version":{"version_data":[{"version_affected":"!","version_value":"All"}]}},{"product_name":"Prisma Access","version":{"version_data":[{"version_affected":"!","version_value":"All"}]}}]},"vendor_name":"Palo Alto Networks"}]}},"credit":[{"lang":"eng","value":"Palo Alto Networks thanks the security researcher that discovered and reported this issue."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface allows a network-based attacker with specific knowledge of the target firewall or Panorama appliance to impersonate an existing PAN-OS administrator and perform privileged actions."}]},"exploit":[{"lang":"eng","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}],"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-290 Authentication Bypass by Spoofing"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://security.paloaltonetworks.com/CVE-2022-0030","name":"https://security.paloaltonetworks.com/CVE-2022-0030"}]},"solution":[{"lang":"eng","value":"This issue is fixed in PAN-OS 8.1.24 and all later PAN-OS versions.\n\nPlease note that PAN-OS 8.1 has reached its software end-of-life (EoL) and is supported only on PA-200, PA-500, and PA-5000 Series firewalls and on M-100 appliances and only until each of their respective hardware EoL dates:  https://www.paloaltonetworks.com/services/support/end-of-life-announcements/hardware-end-of-life-dates.html."}],"source":{"defect":["PAN-195571"],"discovery":"EXTERNAL"},"timeline":[{"lang":"eng","time":"2022-10-12T16:00:00.000Z","value":"Initial publication"}],"work_around":[{"lang":"eng","value":"Customers with a Threat Prevention subscription can block known attacks for this vulnerability by enabling Threat ID 92720 (Applications and Threats content update 8630-7638).\n\nTo exploit this issue, the attacker must have network access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices."}],"x_advisoryEoL":false,"x_affectedList":["PAN-OS 8.1.23-h1","PAN-OS 8.1.23","PAN-OS 8.1.22","PAN-OS 8.1.21-h1","PAN-OS 8.1.21","PAN-OS 8.1.20-h1","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"]},"nvd":{"publishedDate":"2022-10-12 17:15:00","lastModifiedDate":"2022-10-14 15:33:00","problem_types":["CWE-290"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"8.1.0","versionEndExcluding":"8.1.24","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"30","Ordinal":"224336","Title":"CVE-2022-0030","CVE":"CVE-2022-0030","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"30","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}