U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-0012

Change History

Modified Analysis by NIST 11/04/2025 11:49:23 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h2:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h4:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h11:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h12:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h2:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h4:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h9:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h10:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h4:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h2:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h2:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h2:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h3:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h2:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h5:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h13:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h16:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h6:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h3:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h2:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h2:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h3:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h2:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h3:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h4:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h3:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h4:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h10:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h3:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h5:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.6:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h3:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h3:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h4:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h12:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h2:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h5:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h14:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h2:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h4:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h6:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h10:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:-:*:*:*:*:*:*
Removed CPE Configuration
OR
          *cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* versions from (including) 11.2.0 up to (excluding) 11.2.4
          *cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* versions from (including) 11.1.0 up to (excluding) 11.1.5
          *cpe:2.3:o:paloaltonetworks:pan-os:11.0.6:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (excluding) 11.0.6
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h1:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:-:*:*:*:*:*:*
          *cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* versions from (including) 10.2.0 up to (excluding) 10.2.12
          *cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:-:*:*:*:*:*:*

								
						
Added Reference Type

								
							
							
						
CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-0012 Types: US Government Resource