A vulnerability exists in the PAN-OS web interface in the configuration file import for applications, spyware and vulnerability objects. Exploitation of this vulnerability allows for the parsing of external entities and could lead a PAN-OS device to connect to and disclose limited information to the attacker's server. (Ref # PAN-80452 / CVE-2017-15943)
PAN-OS contains a vulnerability that may allow for an attacker to perform Server-Side Request Forgery. Successful exploitation of this issue may allow an attacker to disclose limited information to an attacker's server.
This issue affects PAN-OS 6.1.18 and earlier, PAN-OS 7.0.18 and earlier, PAN-OS 7.1.13 and earlier
|PAN-OS 7.1||<= 7.1.13||>= 7.1.14|
|PAN-OS 7.0||<= 7.0.18||>= 7.0.19|
|PAN-OS 6.1||<= 6.1.18||>= 6.1.19|
CVSSv3.1 Base Score: 5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
PAN-OS 6.1.19 and later, PAN-OS 7.0.19 and later, PAN-OS 7.1.14 and later
This issue affects the management interface of the device and is strongly mitigated by following best practices for the isolation of management interfaces for security appliances. We recommend that the management interface be isolated and strictly limited only to security administration personnel through either network segmentation or using the IP access control list restriction feature within PAN-OS.