Palo Alto Networks Security Advisories / CVE-2017-7217

CVE-2017-7217 Tampering of temporary export files in the Management Web Interface

Severity 4.3 · MEDIUM
Attack Vector NETWORK
Attack Complexity LOW
Confidentiality Impact NONE
Privileges Required LOW
Integrity Impact LOW
User Interaction NONE
Availability Impact NONE


A vulnerability exists in the Management Web Interface that could allow an attacker to tamper with export files. The Management Web Interface does not properly validate specific request parameters which can potentially allow arbitrary data to be written to export files. (Ref # PAN- 70436 / CVE-2017-7217)

Successfully exploiting this issue would require an attacker to be authenticated. Tampering of files is limited to temporary files used for exporting

This issue affects PAN-OS 7.0.13 and earlier, PAN-OS 7.1.8 and earlier

Product Status

PAN-OS 7.1<= 7.1.8>= 7.1.9
PAN-OS 7.0<= 7.0.13>= 7.0.14


CVSSv3.1 Base Score:4.3 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)

Weakness Type

CWE-20 Improper Input Validation


PAN-OS 7.0.14 and later, PAN-OS 7.1.9 and later

Workarounds and Mitigations

Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network


Palo Alto Networks would like to thank Christophe Schleypen from NATO Communications and Information Agency for reporting this issue to us.
© 2023 Palo Alto Networks, Inc. All rights reserved.