Palo Alto Networks Security Advisories / CVE-2018-9334

CVE-2018-9334 Information Disclosure in the PAN-OS Management Web Interface

047910
Severity 5.5 · MEDIUM
Attack Vector LOCAL
Attack Complexity LOW
Privileges Required LOW
User Interaction NONE
Scope UNCHANGED
Confidentiality Impact HIGH
Integrity Impact NONE
Availability Impact NONE

Description

A local privilege escalation vulnerability exists in the PAN-OS management web interface that allows the administrator to access the password hashes of local users by manipulating the HTML markup. (Ref. # PAN-91564; CVE-2018-9334)

Successful exploitation of this issue requires the attacker to be authenticated.

This issue affects PAN-OS 6.1.20 and earlier, PAN-OS 7.1.16 and earlier, PAN-OS 8.0.8 and earlier, and PAN-OS 8.1.0

Product Status

VersionsAffectedUnaffected
PAN-OS 8.1None>= 8.1.1
PAN-OS 8.0<= 8.0.8>= 8.0.9
PAN-OS 7.1<= 7.1.16>= 7.1.17
PAN-OS 6.1<= 6.1.20>= 6.1.21

Severity: MEDIUM

CVSSv3.1 Base Score: 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)

Weakness Type

CWE-269 Improper Privilege Management

Solution

PAN-OS 6.1.21 and later, PAN-OS 7.1.17 and later, PAN-OS 8.0.9 and later, and PAN-OS 8.1.1 and later

Workarounds and Mitigations

This issue affects the web-based management interface of PAN-OS and is strongly mitigated by following best practices for securing the management interface of PAN-OS. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/getting-started/best-practices-for-securing-administrative-access.

Acknowledgments

Palo Alto Networks would like to thank Bill Chaison from GCI Inc. for reporting this issue.
© 2020 Palo Alto Networks, Inc. All rights reserved.