Nginx web-server included with PAN-OS is vulnerable to an integer overflow vulnerability that can leak potentially a cache file header if a response was returned from cache.
This issue affects:
PAN-OS 7.1 versions earlier than 7.1.26;
PAN-OS 8.1 versions earlier than 8.1.13;
PAN-OS 9.0 versions earlier than 9.0.6;
All versions of PAN-OS 8.0.
|PAN-OS 9.1||None||>= 9.1.0|
|PAN-OS 9.0||< 9.0.6||>= 9.0.6|
|PAN-OS 8.1||< 8.1.13||>= 8.1.13|
|PAN-OS 7.1||< 7.1.26||>= 7.1.26|
CVSSv3.1 Base Score: 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, PAN-OS 9.1.0, and all later PAN-OS versions.
Attacks against CVE-2017-7529 can be blocked with signatures for Unique Threat ID 33070 enabled on a different firewall configured to protect the vulnerable management interfaces.
This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface.
Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com