### [CVE-2022-0030](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0030) ![](https://img.shields.io/static/v1?label=Product&message=Cloud%20NGFW&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=PAN-OS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Prisma%20Access&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=!%20All%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.1%3C%208.1.24%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-290%20Authentication%20Bypass%20by%20Spoofing&color=brighgreen) ### Description An authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface allows a network-based attacker with specific knowledge of the target firewall or Panorama appliance to impersonate an existing PAN-OS administrator and perform privileged actions. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/karimhabush/cyberowl