Palo Alto Networks Security Advisories / CVE-2020-1982

CVE-2020-1982 PAN-OS: TLS 1.0 usage for certain communications with Palo Alto Networks cloud delivered services

Severity 4.8 · MEDIUM
Attack Vector NETWORK
Attack Complexity HIGH
Privileges Required NONE
User Interaction NONE
Confidentiality Impact LOW
Integrity Impact LOW
Availability Impact NONE


Certain communication between PAN-OS and cloud-delivered services inadvertently use TLS 1.0, which is known to be a cryptographically weak protocol.

These cloud services include Cortex Data Lake, the Customer Support Portal, and the Prisma Access infrastructure.

Conditions required for exploitation of known TLS 1.0 weaknesses do not exist for the communication between PAN-OS and cloud-delivered services. We do not believe that any communication is impacted as a result of known attacks against TLS 1.0.

This issue impacts:

All versions of PAN-OS 8.0;

PAN-OS 8.1 versions earlier than PAN-OS 8.1.14;

PAN-OS 9.0 versions earlier than PAN-OS 9.0.9;

PAN-OS 9.1 versions earlier than PAN-OS 9.1.3.

PAN-OS 7.1 is not impacted by this issue.

Product Status


9.1< 9.1.3>= 9.1.3
9.0< 9.0.9>= 9.0.9
8.1< 8.1.15>= 8.1.15

Severity: MEDIUM

CVSSv3.1 Base Score: 4.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)

Weakness Type

CWE-326 Inadequate Encryption Strength


This issue is fixed in PAN-OS 8.1.15, PAN-OS 9.0.9, PAN-OS 9.1.3, and all later PAN-OS versions.

A fixed version of PAN-OS is required to ensure secure usage of cloud-delivered services without interruption.

PAN-OS 7.1 and PAN-OS 8.0 are end-of-life (as of June 30, 2020 and October 31, 2019 respectively) and are no longer covered by our Product Security Assurance policies.

Workarounds and Mitigations

Since TLS 1.0 weaknesses are exploited by the man-in-the-middle type of attackers, ensuring security of the networks reduces risks of exploitation of these issues.


This issue was found by a customer.


Initial publication
© 2020 Palo Alto Networks, Inc. All rights reserved.