PAN-SA-2014-0001 Management API Key Bypass
Attack Vector NETWORK
Attack Complexity HIGH
Confidentiality Impact NONE
Privileges Required NONE
Integrity Impact HIGH
User Interaction REQUIRED
Availability Impact NONE
Reference 58976 PAN-SA-2014-0001
An XML API key can be bypassed if a session has been authorized. This can be used in a CSRF or XSS attack. (Ref # 58976)
This issue requires an authenticated administrator session to be successful.
This issue affects PAN-OS version 4.1.15 and earlier; 5.0.9 and earlier; 5.1.4 and earlier.
|PAN-OS 5.1||<= 5.1.4||>= 5.1.5|
|PAN-OS 5.0||<= 5.0.9||>= 5.0.10|
|PAN-OS 4.1||<= 4.1.15||>= 4.1.16|
CVSSv3.1 Base Score:5.3 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N)
PAN-OS 4.1.16; 5.0.10 and 5.1.5 address this issue.
Workarounds and Mitigations
This issue affects the management interface of the device. Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.
Anton Ziukin, Check Point Vulnerability Research Team