PAN-SA-2020-0003 Informational: Third-party or open source vulnerabilities that do not affect Palo Alto Networks Products
Informational
Description
Palo Alto Networks Product Security Assurance team has evaluated and determined that these third-party or open source vulnerabilities do not have a security impact on Palo Alto Networks Products, or the scenarios required for successful exploitation do not exist on Palo Alto Networks Products.
CVE | Summary |
---|---|
CVE-2019-16905 | The OpenSSH package in PAN-OS is not compiled with XMSS support. |
CVE-2019-11168 | Palo Alto Networks does not use any affected Intel server boards or compute modules. |
CVE-2020-0561 | Palo Alto Networks does not use SGX SDK from Intel in any product. |
CVE-2020-0562 | Palo Alto Networks does not use RAID WebConsole 2 in any product. |
CVE-2020-0563 | Palo Alto Networks does not use MPSS installer in any product. |
CVE-2020-0564 | Palo Alto Networks does not use RWC 3 console in any product. |
CVE-2019-11175 | Palo Alto Networks does not use any affected Intel server boards or compute modules. |
CVE-2019-0139 | Palo Alto Networks does not use Intel Ethernet 700 series controllers in any released next generation firewall. |
CVE-2019-0140 | Palo Alto Networks does not use Intel Ethernet 700 series controllers in any released next generation firewall. |
CVE-2019-0142 | Palo Alto Networks does not use Intel Ethernet 700 series controllers in any released next generation firewall. |
CVE-2019-0143 | Palo Alto Networks does not use Intel Ethernet 700 series controllers in any released next generation firewall. |
CVE-2019-0144 | Palo Alto Networks does not use Intel Ethernet 700 series controllers in any released next generation firewall. |
CVE-2019-0145 | Palo Alto Networks does not use Intel Ethernet 700 series controllers in any released next generation firewall. |
CVE-2019-0146 | Palo Alto Networks does not use Intel Ethernet 700 series controllers in any released next generation firewall. |
CVE-2019-0147 | Palo Alto Networks does not use Intel Ethernet 700 series controllers in any released next generation firewall. |
CVE-2019-0148 | Palo Alto Networks does not use Intel Ethernet 700 series controllers in any released next generation firewall. |
CVE-2019-0149 | Palo Alto Networks does not use Intel Ethernet 700 series controllers in any released next generation firewall. |
CVE-2019-0150 | Palo Alto Networks does not use Intel Ethernet 700 series controllers in any released next generation firewall. |
CVE-2019-11177 | Palo Alto Networks does not use any affected Intel server boards or compute modules. |
CVE-2019-11178 | Palo Alto Networks does not use any affected Intel server boards or compute modules. |
CVE-2019-11179 | Palo Alto Networks does not use any affected Intel server boards or compute modules. |
CVE-2019-11180 | Palo Alto Networks does not use any affected Intel server boards or compute modules. |
CVE-2019-11170 | Palo Alto Networks does not use any affected Intel server boards or compute modules. |
CVE-2019-11182 | Palo Alto Networks does not use any affected Intel server boards or compute modules. |
CVE-2019-11171 | Palo Alto Networks does not use any affected Intel server boards or compute modules. |
CVE-2019-11172 | Palo Alto Networks does not use any affected Intel server boards or compute modules. |
CVE-2019-11173 | Palo Alto Networks does not use any affected Intel server boards or compute modules. |
CVE-2019-11181 | Palo Alto Networks does not use any affected Intel server boards or compute modules. |
CVE-2019-11174 | Palo Alto Networks does not use any affected Intel server boards or compute modules. |
CVE-2019-12735 | The Vim package on PAN-OS do not have 'modline' enabled required for exploiting this issue. Further the command itself is not accessible to privileged or unprivileged users. |
Product Status
Versions | Affected | Unaffected |
---|---|---|
PAN-OS | None | All |
Solution
No product updates are required for these issues.
Workarounds and Mitigations
None