CVE-2021-3050 PAN-OS: OS Command Injection Vulnerability in Web Interface
Description
An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to execute arbitrary OS commands to escalate privileges.
This issue impacts:
PAN-OS 9.0 version 9.0.10 through PAN-OS 9.0.14;
PAN-OS 9.1 version 9.1.4 through PAN-OS 9.1.10;
PAN-OS 10.0 version 10.0.7 and earlier PAN-OS 10.0 versions;
PAN-OS 10.1 version 10.1.0 through PAN-OS 10.1.1.
Prisma Access firewalls and firewalls running PAN-OS 8.1 versions are not impacted by this issue.
Product Status
Versions | Affected | Unaffected |
---|---|---|
PAN-OS 10.1 | >= 10.1.0 | >= 10.1.2 |
PAN-OS 10.0 | >= 10.0.0 | >= 10.0.8 |
PAN-OS 9.1 | >= 9.1.4 | >= 9.1.11 |
PAN-OS 9.0 | >= 9.0.10 | >= 9.0.15 |
PAN-OS 8.1 | None | 8.1.* |
Severity: HIGH
CVSSv3.1 Base Score: 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue. However, exploits for this issue are publicly available.
Weakness Type
Solution
We intend to fix this issue in PAN-OS 9.0.15 (ETA November 2021), PAN-OS 9.1.11 (ETA September 2021), PAN-OS 10.0.8 (ETA September 2021), PAN-OS 10.1.2 (ETA September 2021) and all later PAN-OS versions.
Workarounds and Mitigations
Enable signatures for Unique Threat ID 91439 on traffic destined for the web interface to block attacks against CVE-2021-3050.
This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.