Palo Alto Networks Security Advisories / PAN-SA-2014-0001

PAN-SA-2014-0001 Management API Key Bypass

Severity 5.3 · MEDIUM
Attack Vector NETWORK
Attack Complexity HIGH
Privileges Required NONE
User Interaction REQUIRED
Confidentiality Impact NONE
Integrity Impact HIGH
Availability Impact NONE


An XML API key can be bypassed if a session has been authorized. This can be used in a CSRF or XSS attack. (Ref # 58976)

This issue requires an authenticated administrator session to be successful.

This issue affects PAN-OS version 4.1.15 and earlier; 5.0.9 and earlier; 5.1.4 and earlier.

Product Status

PAN-OS 5.1<= 5.1.4>= 5.1.5
PAN-OS 5.0<= 5.0.9>= 5.0.10
PAN-OS 4.1<= 4.1.15>= 4.1.16

Severity: MEDIUM

CVSSv3.1 Base Score: 5.3 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N)

Weakness Type


PAN-OS 4.1.16; 5.0.10 and 5.1.5 address this issue.

Workarounds and Mitigations

This issue affects the management interface of the device. Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.


Anton Ziukin, Check Point Vulnerability Research Team
© 2020 Palo Alto Networks, Inc. All rights reserved.