Palo Alto Networks Security Advisories / CVE-2017-7217

CVE-2017-7217 Tampering of temporary export files in the Management Web Interface

047910
Severity 4.3 · MEDIUM
Attack Vector NETWORK
Attack Complexity LOW
Privileges Required LOW
User Interaction NONE
Scope UNCHANGED
Confidentiality Impact NONE
Integrity Impact LOW
Availability Impact NONE

Description

A vulnerability exists in the Management Web Interface that could allow an attacker to tamper with export files. The Management Web Interface does not properly validate specific request parameters which can potentially allow arbitrary data to be written to export files. (Ref # PAN- 70436 / CVE-2017-7217)

Successfully exploiting this issue would require an attacker to be authenticated. Tampering of files is limited to temporary files used for exporting

This issue affects PAN-OS 7.0.13 and earlier, PAN-OS 7.1.8 and earlier

Product Status

VersionsAffectedUnaffected
PAN-OS 7.1<= 7.1.8>= 7.1.9
PAN-OS 7.0<= 7.0.13>= 7.0.14

Severity: MEDIUM

CVSSv3.1 Base Score: 4.3 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)

Weakness Type

CWE-20 Improper Input Validation

Solution

PAN-OS 7.0.14 and later, PAN-OS 7.1.9 and later

Workarounds and Mitigations

Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network

Acknowledgments

Palo Alto Networks would like to thank Christophe Schleypen from NATO Communications and Information Agency for reporting this issue to us.
© 2020 Palo Alto Networks, Inc. All rights reserved.