Palo Alto Networks Security Advisories / PAN-SA-2021-0003

PAN-SA-2021-0003 Informational: Impact of the NAME:WRECK DNS vulnerabilities


Informational

Description

The Palo Alto Networks Product Security Assurance team evaluated the NAME:WRECK DNS vulnerabilities impacting multiple TCP/IP software stack implementations.

PAN-OS software and Prisma SD-WAN (CloudGenix) devices do not utilize the IPNet, Nucleus NET, FreeBSD, or NetX TCP/IP software stacks related to these vulnerabilities. As a result, there is no known security impact for these vulnerabilities in PAN-OS software or Prisma SD-WAN (CloudGenix) devices.

CVESummary
CVE-2016-20009This vulnerability in the IPNet TCP/IP stack does not impact PAN-OS software or Prisma SD-WAN (CloudGenix) devices.
CVE-2020-15795This vulnerability in the Nucleus NET TCP/IP stack does not impact PAN-OS software or Prisma SD-WAN (CloudGenix) devices.
CVE-2020-27009This vulnerability in the Nucleus NET TCP/IP stack does not impact PAN-OS software or Prisma SD-WAN (CloudGenix) devices.
CVE-2020-7461This vulnerability in the FreeBSD TCP/IP stack does not impact PAN-OS software or Prisma SD-WAN (CloudGenix) devices.
CVE-2020-27736This vulnerability in the Nucleus NET TCP/IP stack does not impact PAN-OS software or Prisma SD-WAN (CloudGenix) devices.
CVE-2020-27737This vulnerability in the Nucleus NET TCP/IP stack does not impact PAN-OS software or Prisma SD-WAN (CloudGenix) devices.
CVE-2020-27738This vulnerability in the Nucleus NET TCP/IP stack does not impact PAN-OS software or Prisma SD-WAN (CloudGenix) devices.
CVE-2021-25677This vulnerability in the Nucleus NET TCP/IP stack does not impact PAN-OS software or Prisma SD-WAN (CloudGenix) devices.

Product Status

VersionsAffectedUnaffected
PAN-OS Noneall
Prisma SD-WAN (CloudGenix) Noneall

Solution

No product updates are required for these issues.

Timeline

Updated description for clarity
Initial publication
© 2024 Palo Alto Networks, Inc. All rights reserved.