An improper input validation vulnerability in Palo Alto Networks PAN-OS software enables an attacker with the ability to tamper with the physical file system to elevate privileges.
Credits
Independent Security Researcher Pear1y
Joel Land of CISA Vulnerability Response and Coordination