Palo Alto Networks Security Advisories / CVE-2021-3050

CVE-2021-3050 PAN-OS: OS Command Injection Vulnerability in Web Interface

047910
Severity 8.8 · HIGH
Attack Vector NETWORK
Scope UNCHANGED
Attack Complexity LOW
Confidentiality Impact HIGH
Privileges Required LOW
Integrity Impact HIGH
User Interaction NONE
Availability Impact HIGH

Description

An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to execute arbitrary OS commands to escalate privileges.

This issue impacts:

PAN-OS 9.0 version 9.0.10 through PAN-OS 9.0.14;

PAN-OS 9.1 version 9.1.4 through PAN-OS 9.1.10;

PAN-OS 10.0 version 10.0.7 and earlier PAN-OS 10.0 versions;

PAN-OS 10.1 version 10.1.0 through PAN-OS 10.1.1.

Prisma Access firewalls and firewalls running PAN-OS 8.1 versions are not impacted by this issue.

Product Status

VersionsAffectedUnaffected
PAN-OS 10.1>= 10.1.0>= 10.1.2
PAN-OS 10.0>= 10.0.0>= 10.0.8
PAN-OS 9.1>= 9.1.4>= 9.1.11
PAN-OS 9.0>= 9.0.10>= 9.0.15
PAN-OS 8.1None8.1.*

Severity: HIGH

CVSSv3.1 Base Score: 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue. However, exploits for this issue are publicly available.

Weakness Type

CWE-78 OS Command Injection

Solution

We intend to fix this issue in PAN-OS 9.0.15 (ETA November 2021), PAN-OS 9.1.11 (ETA September 2021), PAN-OS 10.0.8 (ETA September 2021), PAN-OS 10.1.2 (ETA September 2021) and all later PAN-OS versions.

Workarounds and Mitigations

Enable signatures for Unique Threat ID 91439 on traffic destined for the web interface to block attacks against CVE-2021-3050.

This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.

Acknowledgments

This issue was found by an external security researcher.

Timeline

Initial publication
© 2024 Palo Alto Networks, Inc. All rights reserved.