{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T14:11:12.680","vulnerabilities":[{"cve":{"id":"CVE-2024-0009","sourceIdentifier":"psirt@paloaltonetworks.com","published":"2024-02-14T18:15:47.503","lastModified":"2024-12-09T15:13:34.713","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An improper verification vulnerability in the GlobalProtect gateway feature of Palo Alto Networks PAN-OS software enables a malicious user with stolen credentials to establish a VPN connection from an unauthorized IP address."},{"lang":"es","value":"Una vulnerabilidad de verificación incorrecta en la función de puerta de enlace GlobalProtect del software PAN-OS de Palo Alto Networks permite a un usuario malintencionado con credenciales robadas establecer una conexión VPN desde una dirección IP no autorizada."}],"metrics":{"cvssMetricV31":[{"source":"psirt@paloaltonetworks.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":3.4}]},"weaknesses":[{"source":"psirt@paloaltonetworks.com","type":"Secondary","description":[{"lang":"en","value":"CWE-940"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-346"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:-:*:*:*:*:*:*","matchCriteriaId":"8BB72E15-486F-491F-A08D-E1AC2C8AB121"},{"vulnerable":true,"criteria":"cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h1:*:*:*:*:*:*","matchCriteriaId":"B5E7EFD5-2179-45BF-BF5B-197B66903D9C"},{"vulnerable":true,"criteria":"cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h2:*:*:*:*:*:*","matchCriteriaId":"3EF4AE4F-36F3-4923-AE1E-DE9E036D4E2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h3:*:*:*:*:*:*","matchCriteriaId":"10587864-8777-40F9-B162-BFBFAB8F5E06"},{"vulnerable":true,"criteria":"cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h4:*:*:*:*:*:*","matchCriteriaId":"BA374C05-F547-481C-98B4-8F03DD7AB4E1"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.0","versionEndExcluding":"10.2.4","matchCriteriaId":"D61F01F8-1598-4078-9D98-BFF5B62F3BA5"}]}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-0009","source":"psirt@paloaltonetworks.com","tags":["Vendor Advisory"]},{"url":"https://security.paloaltonetworks.com/CVE-2024-0009","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}