An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to execute arbitrary OS commands to escalate privileges.
This issue impacts:
PAN-OS 9.0 version 9.0.10 through PAN-OS 9.0.14;
PAN-OS 9.1 version 9.1.4 through PAN-OS 9.1.10;
PAN-OS 10.0 version 10.0.7 and earlier PAN-OS 10.0 versions;
PAN-OS 10.1 version 10.1.0 through PAN-OS 10.1.1.
Prisma Access firewalls and firewalls running PAN-OS 8.1 versions are not impacted by this issue.
|PAN-OS 10.1||>= 10.1.0||>= 10.1.2|
|PAN-OS 10.0||>= 10.0.0||>= 10.0.8|
|PAN-OS 9.1||>= 9.1.4||>= 9.1.11|
|PAN-OS 9.0||>= 9.0.10||>= 9.0.15|
CVSSv3.1 Base Score: 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Palo Alto Networks is not aware of any malicious exploitation of this issue. However, exploits for this issue are publicly available.
We intend to fix this issue in PAN-OS 9.0.15 (ETA November 2021), PAN-OS 9.1.11 (ETA September 2021), PAN-OS 10.0.8 (ETA September 2021), PAN-OS 10.1.2 (ETA September 2021) and all later PAN-OS versions.
Enable signatures for Unique Threat ID 91439 on traffic destined for the web interface to block attacks against CVE-2021-3050.
This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.