Palo Alto Networks Security Advisories / CVE-2020-1979

CVE-2020-1979 PAN-OS: A format string vulnerability in PAN-OS log daemon (logd) on Panorama allows local privilege escalation


Severity 7.8 · HIGH
Attack Vector LOCAL
Attack Complexity LOW
Privileges Required LOW
User Interaction NONE
Scope UNCHANGED
Confidentiality Impact HIGH
Integrity Impact HIGH
Availability Impact HIGH

Description

A format string vulnerability in the PAN-OS log daemon (logd) on Panorama allows a local authenticated user to execute arbitrary code, bypassing the restricted shell and escalating privileges.

This issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13 on Panorama.

This issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.

Product Status

PAN-OS

VersionsAffectedUnaffected
8.1< 8.1.13>= 8.1.13
9.0>= 9.0.0
7.1>= 7.1.0
9.1>= 9.1.0

Required Configuration

N/A

Severity: HIGH

CVSSv3.1 Base Score: 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

Solution

This issue is fixed in PAN-OS 8.1.13 and all later PAN-OS 8.1 versions.

Workarounds and Mitigations

This issue affects the management interface of Panorama and is mitigated by following best practices for securing the Panorama management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 8.1 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.

Acknowledgements

This issue was found by a customer.

Timeline

Initial publication
© 2020 Palo Alto Networks, Inc. All rights reserved.