{"success":true,"data":[{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2026-0300","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID™ Authentication Portal","datePublic":"2026-05-05T23:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-787","description":"CWE-787: Out-of-bounds Write","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-100","descriptions":[{"lang":"en","value":"CAPEC-100 Overflow Buffers"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:palo_alto_networks:pan-os:12.1.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h29:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.17:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.15:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h31:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h30:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h26:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h24:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"12.1.0","lessThan":"12.1.7","changes":[{"at":"12.1.7","status":"unaffected"},{"at":"12.1.4-h5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.12","changes":[{"at":"11.2.12","status":"unaffected"},{"at":"11.2.10-h6","status":"unaffected"},{"at":"11.2.7-h13","status":"unaffected"},{"at":"11.2.4-h17","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.15","changes":[{"at":"11.1.15","status":"unaffected"},{"at":"11.1.13-h5","status":"unaffected"},{"at":"11.1.10-h25","status":"unaffected"},{"at":"11.1.7-h6","status":"unaffected"},{"at":"11.1.6-h32","status":"unaffected"},{"at":"11.1.4-h33","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.18-h6","changes":[{"at":"10.2.18-h6","status":"unaffected"},{"at":"10.2.16-h7","status":"unaffected"},{"at":"10.2.13-h21","status":"unaffected"},{"at":"10.2.10-h36","status":"unaffected"},{"at":"10.2.7-h34","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.4","versionEndExcluding":"12.1.4-h5"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.4","versionEndExcluding":"11.2.4-h17"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.7","versionEndExcluding":"11.2.7-h13"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.10","versionEndExcluding":"11.2.10-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.0","versionEndExcluding":"11.2.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.4","versionEndExcluding":"11.1.4-h33"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.6","versionEndExcluding":"11.1.6-h32"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.7","versionEndExcluding":"11.1.7-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.10","versionEndExcluding":"11.1.10-h25"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.13","versionEndExcluding":"11.1.13-h5"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.0","versionEndExcluding":"11.1.15"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.7","versionEndExcluding":"10.2.7-h34"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h36"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.13","versionEndExcluding":"10.2.13-h21"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.16","versionEndExcluding":"10.2.16-h7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.18","versionEndExcluding":"10.2.18-h6"}]}]}],"descriptions":[{"lang":"en","value":"A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets.\n\nThe risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal per the best practice guidelines (https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CqbiCAC) by restricting access to only trusted internal IP addresses.\n\nPrisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. <br><br>The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal per the <a target=\"_blank\" rel=\"nofollow\" href=\"https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CqbiCAC\">best practice guidelines</a> by restricting access to only trusted internal IP addresses.<br><br>Prisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability. </p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2026-0300","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"The risk is highest when you configure the User-ID™ Authentication Portal to enable access from the Internet or any untrusted network."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"LOW","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"RED","exploitMaturity":"ATTACKED","baseSeverity":"CRITICAL","baseScore":9.3,"threatSeverity":"CRITICAL","threatScore":9.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:A/AU:Y/R:U/V:C/RE:M/U:Red"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"You can greatly reduce the risk of exploitation by restricting User-ID™ Authentication Portal access to only trusted internal IP addresses and preventing its exposure to the internet."}],"cvssV4_0":{"version":"4.0","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"LOW","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"RED","exploitMaturity":"ATTACKED","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"HIGH","threatScore":8.7,"vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:A/AU:Y/R:U/V:C/RE:M/U:Red"}}],"configurations":[{"lang":"eng","value":"This issue is applicable only to PA-Series and VM-Series firewalls that are configured to use User-ID™ Authentication Portal.\n\nCustomers are impacted if both of the following conditions are true:\n\n\n * User-ID™ Authentication Portal configured in the User-ID™ Authentication Portal Settings page. You can verify the configuration by going to Device > User Identification > Authentication Portal Settings -> Enable Authentication Portal (applies to both transparent and redirect modes) and\n * An interface management profile with response page enabled and attached to any L3 interface in any zone where untrusted/internet traffic can ingress. You can verify the configuration by going to Network > Interface > Select the interface > Advanced Tab > Create Management Interface Profile.\n   \n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>This issue is applicable only to PA-Series and VM-Series firewalls that are configured to use User-ID™ Authentication Portal.<br><br>Customers are impacted if both of the following conditions are true:<br></p><ul><li>User-ID™ Authentication Portal configured in the User-ID™ Authentication Portal Settings page.  You can verify the configuration by going to Device &gt; User Identification &gt; Authentication Portal Settings -&gt; Enable Authentication Portal (applies to both transparent and redirect modes) <b>and</b></li><li>An interface management profile with response page enabled and attached to any L3 interface in any zone where untrusted/internet traffic can ingress.  You can verify the configuration by going to Network &gt; Interface &gt; Select the interface &gt; Advanced Tab &gt; Create Management Interface Profile.<br></li></ul><p></p>"}]}],"workarounds":[{"lang":"eng","value":"Customers can mitigate the risk of this issue by taking either of the following actions:\n\n * Restrict User-ID™ Authentication Portal access to only trusted zones and in addition, disable Response Pages in the Interface Management Profile attached to every L3 interface in any zone where untrusted/internet traffic can ingress. Keep Response Pages enabled only on interfaces in trust/internal zones where legitimate users' browsers ingress. Refer to Step 6 of the following Live Community article (https://live.paloaltonetworks.com/t5/general-articles/why-it-s-essential-to-secure-your-management-interface/ta-p/1001286) and Knowledgebase article (https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CqbiCAC) for steps to restrict access.\n   \n * Disable User-ID™ Authentication Portal if not required.\n   \n\nCustomers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510019 from Applications and Threats content version 9097-10022. Decoder capabilities necessitate PAN-OS 11.1 or a later version for Threat ID support.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"Customers can mitigate the risk of this issue by taking either of the following actions:<br><ul><li>Restrict User-ID™ Authentication Portal access to only trusted zones and in addition, disable Response Pages in the Interface Management Profile attached to every L3 interface in any zone where untrusted/internet traffic can ingress. Keep Response Pages enabled only on interfaces in trust/internal zones where legitimate users' browsers ingress. Refer to Step 6 of the following <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/general-articles/why-it-s-essential-to-secure-your-management-interface/ta-p/1001286\">Live Community article</a> and <a target=\"_blank\" rel=\"nofollow\" href=\"https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CqbiCAC\">Knowledgebase article</a> for steps to restrict access.<br></li><li>Disable User-ID™ Authentication Portal if not required.<br></li></ul>Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID&nbsp;510019 from Applications and Threats content version 9097-10022. Decoder capabilities necessitate PAN-OS 11.1 or a later version for Threat ID support."}]}],"solutions":[{"lang":"eng","value":"VERSION           MINOR VERSION                SUGGESTED SOLUTION\nCloud NGFW                                     No action needed.\nPAN-OS 12.1       12.1.5 through 12.1.6        Upgrade to 12.1.7 or later.\n                  12.1.2 through 12.1.4-h*     Upgrade to 12.1.4-h5 or 12.1.7 or later.\nPAN-OS 11.2       11.2.11 or later             Upgrade to 11.2.12 or later.\n                  11.2.8 through 11.2.10-h*    Upgrade to 11.2.10-h6 or 11.2.12 or later.\n                  11.2.5 through 11.2.7-h*     Upgrade to 11.2.7-h13 or 11.2.12 or later.\n                  11.2.0 through 11.2.4-h*     Upgrade to 11.2.4-h17 or 11.2.12 or later.\nPAN-OS 11.1       11.1.14 or later             Upgrade to 11.1.15 or later.\n                  11.1.11 through 11.1.13-h*   Upgrade to 11.1.13-h5 or 11.1.15 or later.\n                  11.1.8 through 11.1.10-h*    Upgrade to 11.1.10-h25 or 11.1.15 or later.\n                  11.1.7 through 11.1.7-h*     Upgrade to 11.1.7-h6 or 11.1.15 or later.\n                  11.1.5 through 11.1.6-h*     Upgrade to 11.1.6-h32 or 11.1.15 or later.\n                  11.1.0 through 11.1.4-h*     Upgrade to 11.1.4-h33 or 11.1.15 or later.\nPAN-OS 10.2       10.2.17 through 10.2.18-h*   Upgrade to 10.2.18-h6 or later.\n                  10.2.14 through 10.2.16-h*   Upgrade to 10.2.16-h7 or 10.2.18-h6 or later.\n                  10.2.11 through 10.2.13-h*   Upgrade to 10.2.13-h21 or 10.2.18-h6 or later.\n                  10.2.8 through 10.2.10-h*    Upgrade to 10.2.10-h36 or 10.2.18-h6 or later.\n                  10.2.0 through 10.2.7-h*     Upgrade to 10.2.7-h34 or 10.2.18-h6 or later.\nAll older                                      Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\nPrisma Access                                  No action needed.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version</th><th>Minor Version</th><th>Suggested Solution</th></tr></thead><tbody><tr><td>Cloud NGFW</td><td><br></td><td>No action needed.</td></tr><tr><td>PAN-OS 12.1</td><td>12.1.5 through 12.1.6</td><td>Upgrade to 12.1.7 or later.</td></tr><tr><td><br></td><td>12.1.2 through 12.1.4-h*</td><td>Upgrade to 12.1.4-h5 or 12.1.7 or later.</td></tr><tr><td>PAN-OS 11.2</td><td>11.2.11 or later</td><td>Upgrade to 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.8 through 11.2.10-h*</td><td>Upgrade to 11.2.10-h6 or 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.5 through 11.2.7-h*</td><td>Upgrade to 11.2.7-h13 or 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.0 through 11.2.4-h*</td><td>Upgrade to 11.2.4-h17 or 11.2.12 or later.</td></tr><tr><td>PAN-OS 11.1</td><td>11.1.14 or later</td><td>Upgrade to 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.11 through 11.1.13-h*</td><td>Upgrade to 11.1.13-h5 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.8 through 11.1.10-h*</td><td>Upgrade to 11.1.10-h25 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.7 through 11.1.7-h*</td><td>Upgrade to 11.1.7-h6 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.5 through 11.1.6-h*</td><td>Upgrade to 11.1.6-h32 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.0 through 11.1.4-h*</td><td>Upgrade to 11.1.4-h33 or 11.1.15 or later.</td></tr><tr><td>PAN-OS 10.2</td><td>10.2.17 through 10.2.18-h*</td><td>Upgrade to 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.14 through 10.2.16-h*</td><td>Upgrade to 10.2.16-h7 or 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.11 through 10.2.13-h*</td><td>Upgrade to 10.2.13-h21 or 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.8 through 10.2.10-h*</td><td>Upgrade to 10.2.10-h36 or 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.0 through 10.2.7-h*</td><td>Upgrade to 10.2.7-h34 or 10.2.18-h6 or later.</td></tr><tr><td>All older <br>unsupported <br>PAN-OS versions</td><td><br></td><td>Upgrade to a supported fixed version.</td></tr><tr><td>Prisma Access</td><td><br></td><td>No action needed.</td></tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Limited exploitation has been observed targeting Palo Alto Networks User-ID™ Authentication Portals that are exposed to untrusted IP addresses and/or the public internet. Customers following standard security best practices, such as restricting sensitive portals to trusted internal networks are at a greatly reduced risk.","supportingMedia":[{"type":"text/html","base64":false,"value":"Limited exploitation has been observed targeting Palo Alto Networks User-ID™ Authentication Portals that are exposed to untrusted IP addresses and/or the public internet. Customers following standard security best practices, such as restricting sensitive portals to trusted internal networks are at a greatly reduced risk."}]}],"timeline":[{"time":"2026-05-13T16:00:00.000Z","lang":"en","value":"Updated the release timeline and Solution table."},{"time":"2026-05-07T02:10:00.000Z","lang":"en","value":"Updated Acknowledgments."},{"time":"2026-05-06T17:27:00.000Z","lang":"en","value":"Updated with Threat Prevention ID and clarified the Required Configuration section."},{"time":"2026-05-05T23:00:00.000Z","lang":"en","value":"Initial publication."},{"time":"2026-05-14T19:15:00.000Z","lang":"en","value":"Updated the Fix release timeline for 10.2.16-h7."}],"credits":[{"lang":"en","value":"Palo Alto Networks is grateful to our Deep Product Security Research Team for discovering the issue, and we also appreciate the threat research and intelligence support provided by Unit 42 and Xpanse ILI.","type":"other"}],"source":{"discovery":"USER"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 12.1.6","PAN-OS 12.1.5","PAN-OS 12.1.4-h3","PAN-OS 12.1.4-h2","PAN-OS 12.1.4","PAN-OS 12.1.3-h3","PAN-OS 12.1.3-h1","PAN-OS 12.1.3","PAN-OS 12.1.2","PAN-OS 11.2.11","PAN-OS 11.2.10-h5","PAN-OS 11.2.10-h4","PAN-OS 11.2.10-h3","PAN-OS 11.2.10-h2","PAN-OS 11.2.10-h1","PAN-OS 11.2.10","PAN-OS 11.2.9","PAN-OS 11.2.8","PAN-OS 11.2.7-h12","PAN-OS 11.2.7-h11","PAN-OS 11.2.7-h10","PAN-OS 11.2.7-h8","PAN-OS 11.2.7-h7","PAN-OS 11.2.7-h4","PAN-OS 11.2.7-h3","PAN-OS 11.2.7-h2","PAN-OS 11.2.7-h1","PAN-OS 11.2.7","PAN-OS 11.2.6","PAN-OS 11.2.5","PAN-OS 11.2.4-h15","PAN-OS 11.2.4-h14","PAN-OS 11.2.4-h12","PAN-OS 11.2.4-h11","PAN-OS 11.2.4-h10","PAN-OS 11.2.4-h9","PAN-OS 11.2.4-h8","PAN-OS 11.2.4-h7","PAN-OS 11.2.4-h6","PAN-OS 11.2.4-h5","PAN-OS 11.2.4-h4","PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.14","PAN-OS 11.1.13-h3","PAN-OS 11.1.13-h2","PAN-OS 11.1.13-h1","PAN-OS 11.1.13","PAN-OS 11.1.12","PAN-OS 11.1.11","PAN-OS 11.1.10-h21","PAN-OS 11.1.10-h12","PAN-OS 11.1.10-h10","PAN-OS 11.1.10-h9","PAN-OS 11.1.10-h7","PAN-OS 11.1.10-h5","PAN-OS 11.1.10-h4","PAN-OS 11.1.10-h1","PAN-OS 11.1.10","PAN-OS 11.1.9","PAN-OS 11.1.8","PAN-OS 11.1.6-h29","PAN-OS 11.1.6-h25","PAN-OS 11.1.6-h23","PAN-OS 11.1.6-h22","PAN-OS 11.1.6-h21","PAN-OS 11.1.6-h20","PAN-OS 11.1.6-h19","PAN-OS 11.1.6-h18","PAN-OS 11.1.6-h17","PAN-OS 11.1.6-h14","PAN-OS 11.1.6-h10","PAN-OS 11.1.6-h7","PAN-OS 11.1.6-h6","PAN-OS 11.1.6-h4","PAN-OS 11.1.6-h3","PAN-OS 11.1.6-h2","PAN-OS 11.1.6-h1","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h32","PAN-OS 11.1.4-h27","PAN-OS 11.1.4-h25","PAN-OS 11.1.4-h18","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.18-h5","PAN-OS 10.2.18-h1","PAN-OS 10.2.18","PAN-OS 10.2.17","PAN-OS 10.2.16-h6","PAN-OS 10.2.16-h4","PAN-OS 10.2.16-h1","PAN-OS 10.2.16","PAN-OS 10.2.15","PAN-OS 10.2.14-h1","PAN-OS 10.2.14","PAN-OS 10.2.13-h18","PAN-OS 10.2.13-h16","PAN-OS 10.2.13-h15","PAN-OS 10.2.13-h10","PAN-OS 10.2.13-h7","PAN-OS 10.2.13-h5","PAN-OS 10.2.13-h4","PAN-OS 10.2.13-h3","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h6","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h13","PAN-OS 10.2.11-h12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h31","PAN-OS 10.2.10-h30","PAN-OS 10.2.10-h27","PAN-OS 10.2.10-h26","PAN-OS 10.2.10-h23","PAN-OS 10.2.10-h21","PAN-OS 10.2.10-h18","PAN-OS 10.2.10-h17","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h21","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h32","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-4619","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets","datePublic":"2025-11-12T17:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-754","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-129","descriptions":[{"lang":"en","value":"CAPEC-129: Pointer Manipulation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:-:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:-:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*"],"versions":[{"status":"unaffected","version":"12.1.0","versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.5","changes":[{"at":"11.2.5","status":"unaffected"},{"at":"11.2.4-h4","status":"unaffected"},{"at":"11.2.3-h6","status":"unaffected"},{"at":"11.2.2-h2","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.7","changes":[{"at":"11.1.7","status":"unaffected"},{"at":"11.1.6-h1","status":"unaffected"},{"at":"11.1.4-h13","status":"unaffected"},{"at":"11.1.4-h4","status":"affected"},{"at":"11.1.3-h2","status":"affected"},{"at":"11.1.2-h18","status":"unaffected"},{"at":"11.1.2-h9","status":"affected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.14","changes":[{"at":"10.2.14","status":"unaffected"},{"at":"10.2.13-h3","status":"unaffected"},{"at":"10.2.12-h6","status":"unaffected"},{"at":"10.2.11-h12","status":"unaffected"},{"at":"10.2.10-h14","status":"unaffected"},{"at":"10.2.10-h2","status":"affected"},{"at":"10.2.9-h21","status":"unaffected"},{"at":"10.2.9-h6","status":"affected"},{"at":"10.2.8-h21","status":"unaffected"},{"at":"10.2.8-h10","status":"affected"},{"at":"10.2.7-h24","status":"unaffected"},{"at":"10.2.7-h11","status":"affected"},{"at":"10.2.4-h25","status":"affected"}],"versionType":"custom"},{"status":"unaffected","version":"10.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","platforms":["PAN-OS"],"versions":[{"status":"affected","version":"10.2.0","lessThan":"10.2.10-h14","changes":[{"at":"11.2.4-h4","status":"unaffected"},{"at":"10.2.10-h14","status":"unaffected"},{"at":"10.2.4-h25","status":"affected"}],"versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.0","versionEndExcluding":"11.2.5"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.4","versionEndExcluding":"11.2.4-h4"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.3","versionEndExcluding":"11.2.3-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.2","versionEndExcluding":"11.2.2-h2"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.0","versionEndExcluding":"11.1.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.6","versionEndExcluding":"11.1.6-h1"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.4","versionEndExcluding":"11.1.4-h13"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.4","versionEndExcluding":"11.1.4-h4"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.3","versionEndExcluding":"11.1.3-h2"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.2","versionEndExcluding":"11.1.2-h18"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.2","versionEndExcluding":"11.1.2-h9"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.0","versionEndExcluding":"10.2.14"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.13","versionEndExcluding":"10.2.13-h3"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.12","versionEndExcluding":"10.2.12-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.11","versionEndExcluding":"10.2.11-h12"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h14"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h2"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.9","versionEndExcluding":"10.2.9-h21"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.9","versionEndExcluding":"10.2.9-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.8","versionEndExcluding":"10.2.8-h21"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.8","versionEndExcluding":"10.2.8-h10"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.7","versionEndExcluding":"10.2.7-h24"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.7","versionEndExcluding":"10.2.7-h11"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:prisma_access:*:*:*:*:*:PAN-OS:*:*","versionStartIncluding":"11.2.4","versionEndExcluding":"11.2.4-h4"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:prisma_access:*:*:*:*:*:PAN-OS:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h14"}]}]}],"descriptions":[{"lang":"en","value":"A denial-of-service (DoS) vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to reboot a firewall by sending a specially crafted packet through the dataplane. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode.\n\nThis issue is applicable to the PAN-OS software versions listed below on PA-Series firewalls, VM-Series firewalls, and Prisma® Access software. This issue does not affect Cloud NGFW.\n\nWe have successfully completed the Prisma Access upgrade for all customers, with the exception of those facing issues such as conflicting maintenance windows. Remaining customers will be promptly scheduled for an upgrade through our standard upgrade process.","supportingMedia":[{"type":"text/html","base64":false,"value":"A denial-of-service (DoS) vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to reboot a firewall by sending a specially crafted packet through the dataplane. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode.<br><br>This issue is applicable to the PAN-OS software versions listed below on PA-Series firewalls, VM-Series firewalls, and Prisma® Access software. This issue does not affect Cloud NGFW.<br><br>​​We have successfully completed the Prisma Access upgrade for all customers, with the exception of those facing issues such as conflicting maintenance windows.  Remaining customers will be promptly scheduled for an upgrade through our standard upgrade process."}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-4619","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"MEDIUM","threatScore":6.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:Y/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"eng","value":"This issue is only applicable to firewalls where URL proxy or any decrypt-policy is configured.\n\nWhen any decrypt policy is configured, this issue may be encountered regardless of whether traffic matches explicit decrypt, explicit no-decrypt, or none of the decryption policies.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is only applicable to firewalls where URL&nbsp;proxy or any decrypt-policy is configured.<br><br>When any decrypt policy is configured, this issue may be encountered regardless of whether traffic matches explicit decrypt, explicit no-decrypt, or none of the decryption policies."}]}],"workarounds":[{"lang":"eng","value":"No known workarounds exist for this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"No known workarounds exist for this issue."}]}],"solutions":[{"lang":"eng","value":"VERSION                     MINOR VERSION            SUGGESTED SOLUTION\nCloud NGFW                                           No action needed.\nPAN-OS 12.1                                          No action needed.\nPAN-OS 11.2                 11.2.0 through 11.2.4    Upgrade to 11.2.4-h4 or 11.2.5 or later.\n                            11.2.0 through 11.2.3    Upgrade to 11.2.3-h6 or 11.2.5 or later.\n                            11.2.0 through 11.2.2    Upgrade to 11.2.2-h2 or 11.2.5 or later.\nPAN-OS 11.1                 11.1.0 through 11.1.6    Upgrade to 11.1.6-h1 or 11.1.7 or later.\n                            11.1.0 through 11.1.4    Upgrade to 11.1.4-h13 or 11.1.7 or later.\n                            11.1.0 through 11.1.3    Remain on a version older than 11.1.3-h2 or upgrade to\n                                                     11.1.4-h13 or 11.1.7 or later.\n                            11.1.0 through 11.1.2    Upgrade to 11.1.2-h18 or 11.1.7 or later.\nPAN-OS 10.2                 10.2.0 through 10.2.13   Upgrade to 10.2.13-h3 or 10.2.14 or later.\n                            10.2.0 through 10.2.12   Upgrade to 10.2.12-h6 or 10.2.14 or later.\n                            10.2.0 through 10.2.11   Upgrade to 10.2.11-h12 or 10.2.14 or later.\n                            10.2.0 through 10.2.10   Upgrade to 10.2.10-h14 or 10.2.14 or later.\n                            10.2.0 through 10.2.9    Upgrade to 10.2.9-h21 or 10.2.14 or later.\n                            10.2.0 through 10.2.8    Upgrade to 10.2.8-h21 or 10.2.14 or later.\n                            10.2.0 through 10.2.7    Upgrade to 10.2.7-h24 or 10.2.14 or later.\n                            10.2.0 through 10.2.4    Remain on a version older than 10.2.4-h25\nPAN-OS 10.1                                          No action needed.\nAll older                                            Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\n Prisma Access  on PAN-OS   11.2.0 through 11.2.4    Upgrade to 11.2.4-h4 or later\n                            10.2.0 through 10.2.10   Upgrade to 10.2.10-h14 or 11.2.4-h4 or later.\n                            10.2.0 through 10.2.4    Remain on a version older than 10.2.4-h25.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>Cloud NGFW<br></td><td></td><td>No action needed.</td></tr><tr><td>PAN-OS 12.1<br></td><td></td><td>No action needed.</td></tr><tr>\n                                <td>PAN-OS 11.2<br></td>\n                                <td>11.2.0 through 11.2.4</td>\n                                <td>Upgrade to 11.2.4-h4 or 11.2.5 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.2.0 through 11.2.3</td>\n                                <td>Upgrade to 11.2.3-h6 or 11.2.5 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.2.0 through 11.2.2</td>\n                                <td>Upgrade to 11.2.2-h2 or 11.2.5 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 11.1<br></td>\n                                <td>11.1.0 through 11.1.6</td>\n                                <td>Upgrade to 11.1.6-h1 or 11.1.7 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.0 through 11.1.4</td>\n                                <td>Upgrade to 11.1.4-h13 or 11.1.7 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.0 through 11.1.3</td>\n                                <td>Remain on a version older than 11.1.3-h2 or upgrade to 11.1.4-h13 or 11.1.7 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.0 through 11.1.2</td>\n                                <td>Upgrade to 11.1.2-h18 or 11.1.7 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 10.2<br></td>\n                                <td>10.2.0 through 10.2.13</td>\n                                <td>Upgrade to 10.2.13-h3 or 10.2.14 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.0 through 10.2.12</td>\n                                <td>Upgrade to 10.2.12-h6 or 10.2.14 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.0 through 10.2.11</td>\n                                <td>Upgrade to 10.2.11-h12 or 10.2.14 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.0 through 10.2.10</td>\n                                <td>Upgrade to 10.2.10-h14 or 10.2.14 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.0 through 10.2.9</td>\n                                <td>Upgrade to 10.2.9-h21 or 10.2.14 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.0 through 10.2.8</td>\n                                <td>Upgrade to 10.2.8-h21 or 10.2.14 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.0 through 10.2.7</td>\n                                <td>Upgrade to 10.2.7-h24 or 10.2.14 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.0 through 10.2.4</td>\n                                <td>Remain on a version older than 10.2.4-h25<br></td>\n                            </tr><tr><td>PAN-OS 10.1<br></td><td></td><td>No action needed.</td></tr><tr><td>All older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr><tr><td>&nbsp;Prisma Access&nbsp; on PAN-OS</td><td>11.2.0 through 11.2.4</td><td>Upgrade to 11.2.4-h4&nbsp;or later</td></tr><tr>\n                                    <td><br></td>\n                                    <td>10.2.0 through 10.2.10</td>\n                                    <td>Upgrade to 10.2.10-h14 or 11.2.4-h4 or later.</td>\n                                </tr><tr>\n                                    <td></td>\n                                    <td>10.2.0 through 10.2.4</td>\n                                    <td>Remain on a version older than 10.2.4-h25.</td>\n                                </tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-11-12T17:00:00.000Z","lang":"en","value":"Initial publication"}],"source":{"defect":["PAN-247099"],"discovery":"USER"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h1","PAN-OS 11.2.2","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-4615","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Improper Neutralization of Input in the Management Web Interface","datePublic":"2025-10-08T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-83","description":"CWE-83 Improper Neutralization of Script in Attributes in a Web Page","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-165","descriptions":[{"lang":"en","value":"CAPEC-165 File Manipulation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"status":"unaffected","version":"12.1.0","versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.8","changes":[{"at":"11.2.8","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","changes":[{"at":"11.1.10-h7","status":"unaffected"},{"at":"11.1.6-h21","status":"unaffected"},{"at":"11.1.4-h27","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.17","changes":[{"at":"10.2.17","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.0","versionEndExcluding":"11.2.8"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.10","versionEndExcluding":"11.1.10-h7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.6","versionEndExcluding":"11.1.6-h21"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.4","versionEndExcluding":"11.1.4-h27"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.0","versionEndExcluding":"10.2.17"}]}]}],"descriptions":[{"lang":"en","value":"An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and execute arbitrary commands.\n\nThe security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators.\n\nCloud NGFW and Prisma® Access are not affected by this vulnerability.\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and execute arbitrary commands.</span></p><p><span>The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators.</span></p><p><span>Cloud NGFW and Prisma® Access are not affected by this vulnerability.</span></p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVEN-2025-4615","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"You can greatly reduce the risk of exploitation by restricting access to a jump box that is the only system allowed to access the management interface. This will ensure that attacks can succeed only if they obtain privileged access through those specified IP addresses. We recommend remediating this vulnerability in your next scheduled maintenance cycle."}],"cvssV4_0":{"version":"4.0","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"POC","baseSeverity":"MEDIUM","baseScore":6.9,"threatSeverity":"MEDIUM","threatScore":5.4,"vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/AU:N/R:U/V:D/RE:M/U:Amber"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"The risk is highest when you allow access to the management interface from external IP addresses on the internet. Our recommendation is to remediate as soon as possible."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"POC","baseSeverity":"HIGH","baseScore":7,"threatSeverity":"MEDIUM","threatScore":5.5,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/AU:N/R:U/V:D/RE:M/U:Amber"}}],"workarounds":[{"lang":"eng","value":"No known workarounds exist for this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"No known workarounds exist for this issue."}]}],"solutions":[{"lang":"eng","value":"VERSION             MINOR VERSION            SUGGESTED SOLUTION\nCloud NGFW All                               No action needed.\nPAN-OS 12.1                                  No action needed.\nPAN-OS 11.2         11.2.0 through 11.2.7    Upgrade to 11.2.8 or later.\nPAN-OS 11.1         11.1.0 through 11.1.4    Upgrade to 11.1.4-h27 or 11.1.6-h21 or 11.1.10-h7 or later.\n                    11.1.4 through 11.1.6    Upgrade to 11.1.6-h21 or 11.1.10-h7 or later.\n                    11.1.8 through 11.1.10   Upgrade to 11.1.10-h7 or later.\nPAN-OS 10.2         10.2.0 through 10.2.16   Upgrade to 10.2.17 or later.\nAll older                                    Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\nPrisma Access All                            No action needed.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>Cloud NGFW All<br></td><td></td><td>No action needed.</td></tr><tr><td>PAN-OS 12.1<br></td><td></td><td>No action needed.</td></tr><tr>\n                                <td>PAN-OS 11.2<br></td>\n                                <td>11.2.0 through 11.2.7</td>\n                                <td>Upgrade to 11.2.8 or later.</td>\n                            </tr><tr><td>PAN-OS 11.1</td><td>11.1.0 through 11.1.4</td><td>Upgrade to&nbsp;<span>11.1.4-h27 or 11.1.6-h21 or 11.1.10-h7 or later.</span></td></tr><tr>\n                                <td><br></td>\n                                <td>11.1.4 through 11.1.6</td>\n                                <td>Upgrade to 11.1.6-h21 or 11.1.10-h7 or later.<br></td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.8 through 11.1.10</td>\n                                <td>Upgrade to 11.1.10-h7 or later.<br></td>\n                            </tr><tr>\n                                <td>PAN-OS 10.2<br></td>\n                                <td>10.2.0 through 10.2.16</td>\n                                <td>Upgrade to 10.2.17 or later.</td>\n                            </tr><tr><td>All older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr><tr><td>Prisma Access All<br></td><td></td><td>No action needed.</td></tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-12-19T21:55:00.000Z","lang":"en","value":"Updated fix version for 11.1.0."},{"time":"2025-11-11T19:15:00.000Z","lang":"en","value":"Updated Fixed Software Versions"},{"time":"2025-10-08T16:00:00.000Z","lang":"en","value":"Initial Publication"},{"time":"2026-04-01T00:15:00.000Z","lang":"en","value":"Updated exploit maturity"}],"credits":[{"lang":"en","value":"Visa Inc.","type":"finder"}],"source":{"defect":["PAN-292159","PAN-271221"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.7-h10","PAN-OS 11.2.7-h8","PAN-OS 11.2.7-h7","PAN-OS 11.2.7-h4","PAN-OS 11.2.7-h3","PAN-OS 11.2.7-h2","PAN-OS 11.2.7-h1","PAN-OS 11.2.7","PAN-OS 11.2.6","PAN-OS 11.2.5","PAN-OS 11.2.4-h15","PAN-OS 11.2.4-h14","PAN-OS 11.2.4-h12","PAN-OS 11.2.4-h11","PAN-OS 11.2.4-h10","PAN-OS 11.2.4-h9","PAN-OS 11.2.4-h8","PAN-OS 11.2.4-h7","PAN-OS 11.2.4-h6","PAN-OS 11.2.4-h5","PAN-OS 11.2.4-h4","PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.10-h5","PAN-OS 11.1.10-h4","PAN-OS 11.1.10-h1","PAN-OS 11.1.10","PAN-OS 11.1.9","PAN-OS 11.1.8","PAN-OS 11.1.6-h20","PAN-OS 11.1.6-h19","PAN-OS 11.1.6-h18","PAN-OS 11.1.6-h17","PAN-OS 11.1.6-h14","PAN-OS 11.1.6-h10","PAN-OS 11.1.6-h7","PAN-OS 11.1.6-h6","PAN-OS 11.1.6-h4","PAN-OS 11.1.6-h3","PAN-OS 11.1.6-h2","PAN-OS 11.1.6-h1","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h25","PAN-OS 11.1.4-h18","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.16-h6","PAN-OS 10.2.16-h4","PAN-OS 10.2.16-h1","PAN-OS 10.2.16","PAN-OS 10.2.15","PAN-OS 10.2.14-h1","PAN-OS 10.2.14","PAN-OS 10.2.13-h18","PAN-OS 10.2.13-h16","PAN-OS 10.2.13-h15","PAN-OS 10.2.13-h10","PAN-OS 10.2.13-h7","PAN-OS 10.2.13-h5","PAN-OS 10.2.13-h4","PAN-OS 10.2.13-h3","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h6","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h13","PAN-OS 10.2.11-h12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h31","PAN-OS 10.2.10-h30","PAN-OS 10.2.10-h27","PAN-OS 10.2.10-h26","PAN-OS 10.2.10-h23","PAN-OS 10.2.10-h21","PAN-OS 10.2.10-h18","PAN-OS 10.2.10-h17","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h21","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h32","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-4231","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Authenticated Admin Command Injection Vulnerability in the Management Web Interface","datePublic":"2025-06-11T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-77","description":"CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-233","descriptions":[{"lang":"en","value":"CAPEC-233 Privilege Escalation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected","cpes":[]},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:palo_alto_networks:pan-os:11.0.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.0.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.0.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"unaffected","version":"11.2.0","versionType":"custom"},{"status":"unaffected","version":"11.1.0","versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.3","changes":[{"at":"11.0.3","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.8","changes":[{"at":"10.2.8","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected","cpes":[]}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"11.0.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*","versionStartIncluding":"10.2.0","versionEndExcluding":"10.2.8"}]}]}],"descriptions":[{"lang":"en","value":"A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user.\n\nThe attacker must have network access to the management web interface and successfully authenticate to exploit this issue.\n\nCloud NGFW and Prisma Access are not impacted by this vulnerability.","supportingMedia":[{"type":"text/html","base64":false,"value":"A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user.<br><br>The attacker must have network access to the management web interface and successfully authenticate to exploit this issue.<br><br>Cloud NGFW and Prisma Access are not impacted by this vulnerability."}]}],"references":[{"url":"https://","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"The risk is highest when you allow access to the management interface from external IP addresses on the internet."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.6,"threatSeverity":"MEDIUM","threatScore":6.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"You can greatly reduce the risk of exploitation by restricting access to a jump box that is the only system allowed to access the management interface. This will ensure that attacks can succeed only if they obtain privileged access through those specified IP addresses."}],"cvssV4_0":{"version":"4.0","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":7.1,"threatSeverity":"MEDIUM","threatScore":4,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"The risk is greatest if you allow access to the management web interface from the internet or from any untrusted network either:\n\n 1. Directly; or\n\n 2. Through a dataplane interface that includes a management interface profile.\n\nYou greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management web interface.\n\nUse the following steps to identify your recently detected devices in our internet scans.\n\n 1. To find any assets that require remediation, visit the Assets section of the Customer Support Portal:https://support.paloaltonetworks.com (https://support.paloaltonetworks.com/) and then select Products → Assets → All Assets → Remediation Required).\n\n 2. Review the list of your assets that we discovered in our scans to have an internet-facing management interface. We tagged these assets with ‘PAN-SA-2024-0015’ and a last seen timestamp (in UTC). If you do not see any such assets listed, then our scan did not find any devices associated with your account in the past three days that have an internet-facing management interface.\n    \n\nGlobalProtect™ portals and gateways are not vulnerable to this issue. However, if you configure a management profile on interfaces with GlobalProtect portals or gateways, then you are exposing the firewall to attacks through the management web interface (typically accessible on port 4443).\n\n\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>The risk is greatest if you allow access to the management web interface from the internet or from any untrusted network either:</p><ol><li><p>Directly; or</p></li><li><p>Through a dataplane interface that includes a management interface profile.</p></li></ol><p>You greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management web interface.</p><p>Use the following steps to identify your recently detected devices in our internet scans.</p><ol><li><p>To find any assets that require remediation, visit the Assets section of the Customer Support Portal:<a target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/\">https://support.paloaltonetworks.com</a>&nbsp;and then select Products → Assets → All Assets → Remediation Required).</p></li><li><p>Review the list of your assets that we discovered in our scans to have an internet-facing management interface. We tagged these assets with ‘PAN-SA-2024-0015’ and a last seen timestamp (in UTC). If you do not see any such assets listed, then our scan did not find any devices associated with your account in the past three days that have an internet-facing management interface.<br></p></li></ol><div><p>GlobalProtect™ portals and gateways are not vulnerable to this issue. However, if you configure a management profile on interfaces with GlobalProtect portals or gateways, then you are exposing the firewall to attacks through the management web interface (typically accessible on port 4443).</p></div><b><p></p></b><p></p>"}]}],"workarounds":[{"lang":"en","value":"Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our critical deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431). Specifically, you should restrict management interface access to only trusted internal IP addresses.\n\nReview more information about how to secure management access to your Palo Alto Networks firewalls in these documents:\n\n * Palo Alto Networks LIVEcommunity article: https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\n\n * Palo Alto Networks official and detailed technical documentation: https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><b>Recommended mitigation</b>—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">critical deployment guidelines</a>. Specifically, you should restrict management interface access to only trusted internal IP addresses.</p><p>Review more information about how to secure management access to your Palo Alto Networks firewalls in these documents:</p><ul><li><p>Palo Alto Networks LIVEcommunity article: <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431</a></p></li></ul><ul><li><p>Palo Alto Networks official and detailed technical documentation: <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\">https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices</a></p></li></ul>"}]}],"solutions":[{"lang":"en","value":"VERSION           MINOR VERSION           SUGGESTED SOLUTION\nPAN-OS 11.2                               No action needed.\nPAN-OS 11.1                               No action needed.\nPAN-OS 11.0*      11.0.0 through 11.0.2   Upgrade to 11.0.3 or later.\nPAN-OS 10.2       10.2.0 through 10.2.7   Upgrade to 10.2.8 or later.\nPAN-OS 10.1                               Upgrade to 10.2.8 or 11.0.3 or later.\nAll older                                 Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\n\n\n*PAN-OS 11.0 has reached EoL. We listed it here for completeness because a patch for PAN-OS 11.0 was released before it reached EoL. If you are still using any vulnerable EoL versions, we strongly recommend that you upgrade to a supported fixed PAN-OS version.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>PAN-OS 11.2<br></td><td></td><td>No action needed.</td></tr><tr><td>PAN-OS 11.1<br></td><td></td><td>No action needed.</td></tr><tr>\n                                <td>PAN-OS 11.0*<br></td>\n                                <td>11.0.0 through 11.0.2</td>\n                                <td>Upgrade to 11.0.3 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 10.2<br></td>\n                                <td>10.2.0 through 10.2.7</td>\n                                <td>Upgrade to 10.2.8 or later.</td>\n                            </tr><tr><td>PAN-OS 10.1</td><td></td><td>Upgrade to 10.2.8 or 11.0.3 or later.</td></tr><tr><td>All older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr></tbody></table><br><p>*PAN-OS 11.0 has reached EoL. We listed it here for completeness because a patch for PAN-OS 11.0 was released before it reached EoL. If you are still using any vulnerable EoL versions, we strongly recommend that you upgrade to a supported fixed PAN-OS version.</p>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-06-11T16:00:00.000Z","lang":"en","value":"Initial Publication"}],"credits":[{"lang":"en","value":"spcnvdr","type":"finder"}],"source":{"defect":["PAN-215223"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.0.2-h5","PAN-OS 11.0.2-h4","PAN-OS 11.0.2-h3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h5","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h4","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h14","PAN-OS 10.1.14-h13","PAN-OS 10.1.14-h11","PAN-OS 10.1.14-h10","PAN-OS 10.1.14-h9","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-4230","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Authenticated Admin Command Injection Vulnerability Through CLI","datePublic":"2025-06-11T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-248","descriptions":[{"lang":"en","value":"CAPEC-248 Command Injection"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h26:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"11.2.0","lessThan":"11.2.6","changes":[{"at":"11.2.6","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.6-h14","changes":[{"at":"11.1.10","status":"unaffected"},{"at":"11.1.6-h14","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.10-h27","changes":[{"at":"10.2.10-h27","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.1.0","lessThan":"10.1.14-h15","changes":[{"at":"10.1.14-h15","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.0","versionEndExcluding":"11.2.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.6","versionEndExcluding":"11.1.6-h14"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.0","versionEndExcluding":"11.1.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h27"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.1.14","versionEndExcluding":"10.1.14-h15"}]}]}],"descriptions":[{"lang":"en","value":"A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI.\n\nThe security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators.\n\nCloud NGFW and Prisma® Access are not affected by this vulnerability.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI.</span></p><span>The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators. </span><b><span><br></span><span><br></span></b><span>Cloud NGFW and Prisma® Access are not affected by this vulnerability.</span>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-4230","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.4,"threatSeverity":"MEDIUM","threatScore":5.7,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/R:U/V:D/U:Amber"}}],"configurations":[{"lang":"en","value":"No special configuration is required to be affected by this issue.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<span>No special configuration is required to be affected by this issue.</span>"}]}],"workarounds":[{"lang":"en","value":"No workaround or mitigation is available.","supportingMedia":[{"type":"text/html","base64":false,"value":"No workaround or mitigation is available."}]}],"solutions":[{"lang":"eng","value":"VERSION             MINOR VERSION            SUGGESTED SOLUTION\nCloud NGFW All                               No action needed.\nPAN-OS 11.2         11.2.0 through 11.2.5    Upgrade to 11.2.6 or later.\nPAN-OS 11.1         11.1.0 through 11.1.6    Upgrade to 11.1.6-h14 or 11.1.10 or later.\nPAN-OS 10.2         10.2.0 through 10.2.10   Upgrade to 10.2.10-h27 or later.\nPAN-OS 10.1         10.1.0 through 10.1.14   Upgrade to 10.1.14-h15 or later.\nAll older                                    Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\nPrisma Access All                            No action needed.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>Cloud NGFW All<br></td><td></td><td>No action needed.</td></tr><tr>\n                                <td>PAN-OS 11.2<br></td>\n                                <td>11.2.0 through 11.2.5</td>\n                                <td>Upgrade to 11.2.6 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 11.1<br></td>\n                                <td>11.1.0 through 11.1.6</td>\n                                <td>Upgrade to 11.1.6-h14 or 11.1.10 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 10.2<br></td>\n                                <td>10.2.0 through 10.2.10</td>\n                                <td>Upgrade to 10.2.10-h27 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 10.1<br></td>\n                                <td>10.1.0 through 10.1.14</td>\n                                <td>Upgrade to 10.1.14-h15 or later.</td>\n                            </tr><tr><td>All older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr><tr><td>Prisma Access All<br></td><td></td><td>No action needed.</td></tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-06-30T20:30:00.000Z","lang":"en","value":"Updated fix version for 11.1.0."},{"time":"2025-06-24T17:30:00.000Z","lang":"en","value":"Updated fix version."},{"time":"2025-06-11T16:00:00.000Z","lang":"en","value":"Initial Publication"}],"credits":[{"lang":"en","value":"Visa Inc.","type":"finder"}],"source":{"defect":["PAN-271215"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.5","PAN-OS 11.2.4-h12","PAN-OS 11.2.4-h11","PAN-OS 11.2.4-h10","PAN-OS 11.2.4-h9","PAN-OS 11.2.4-h8","PAN-OS 11.2.4-h7","PAN-OS 11.2.4-h6","PAN-OS 11.2.4-h5","PAN-OS 11.2.4-h4","PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.9","PAN-OS 11.1.8","PAN-OS 11.1.6-h10","PAN-OS 11.1.6-h7","PAN-OS 11.1.6-h6","PAN-OS 11.1.6-h4","PAN-OS 11.1.6-h3","PAN-OS 11.1.6-h2","PAN-OS 11.1.6-h1","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h25","PAN-OS 11.1.4-h18","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.10-h26","PAN-OS 10.2.10-h23","PAN-OS 10.2.10-h21","PAN-OS 10.2.10-h18","PAN-OS 10.2.10-h17","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h21","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h14","PAN-OS 10.1.14-h13","PAN-OS 10.1.14-h11","PAN-OS 10.1.14-h10","PAN-OS 10.1.14-h9","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-0130","assignerOrgId":"00000000-0000-4000-9000-000000000000","assignerShortName":"palo_alto","dateUpdated":"2024-10-14T00:00:00.000Z","serial":1,"dateReserved":"2024-10-09T07:00:00.000Z","datePublished":"2024-10-09T07:00:00.000Z","state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000","shortName":"palo_alto","dateUpdated":"2024-10-09T17:05:00.000Z"},"title":"PAN-OS: Firewall Denial-of-Service (DoS) in the Web-Proxy Feature via a Burst of Maliciously Crafted Packets","datePublic":"2025-05-14T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-754","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-583","descriptions":[{"lang":"en","value":"CAPEC-583 Disabling Network Hardware"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"11.2.0","lessThan":"11.2.5","changes":[{"at":"11.2.5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.6-h1","changes":[{"at":"11.1.6-h1","status":"unaffected"},{"at":"11.1.7-h2","status":"unaffected"},{"at":"11.1.8","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"10.2.0","versionType":"custom"},{"status":"unaffected","version":"10.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled allows an unauthenticated attacker to send a burst of maliciously crafted packets that causes the firewall to become unresponsive and eventually reboot. Repeated successful attempts to trigger this condition will cause the firewall to enter maintenance mode.\n\nThis issue does not affect Cloud NGFW or Prisma Access.","supportingMedia":[{"type":"text/html","base64":true,"value":"<p>A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled allows an unauthenticated attacker to send a burst of maliciously crafted packets that causes the firewall to become unresponsive and eventually reboot. Repeated successful attempts to trigger this condition will cause the firewall to enter maintenance mode.</p><p>This issue does not affect Cloud NGFW or Prisma Access.</p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-0130","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"LOW","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.2,"threatSeverity":"MEDIUM","threatScore":4.6,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:Y/R:U/V:C/RE:L/U:Amber"}}],"configurations":[{"lang":"en","value":"This issue only affects PAN-OS firewalls that have the web proxy feature enabled. This feature is only available on PAN-OS 11.0 and above. Additionally a license is required to use the web proxy feature.\nTo verify if you have configured web proxy on your PAN-OS device, see our documentation regarding the web proxy feature (https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-new-features/networking-features/web-proxy).","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue only affects PAN-OS firewalls that have the web proxy feature enabled. This feature is only available on PAN-OS 11.0 and above. Additionally a license is required to use the web proxy feature.<br>To verify if you have configured web proxy on your PAN-OS device, see our <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-new-features/networking-features/web-proxy\">documentation regarding the web proxy feature</a>."}]}],"workarounds":[{"lang":"en","value":"If you are not using the web proxy feature, you can disable it to mitigate this issue. For more information regarding the web proxy feature, see our documentation regarding the web proxy feature (https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-new-features/networking-features/web-proxy).","supportingMedia":[{"type":"text/html","base64":false,"value":"If you are not using the web proxy feature, you can disable it to mitigate this issue. For more information regarding the web proxy feature, see our <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-new-features/networking-features/web-proxy\">documentation regarding the web proxy feature</a>."}]}],"solutions":[{"lang":"eng","value":"VERSION             MINOR VERSION           SUGGESTED SOLUTION\nPAN-OS 11.2         11.2.0 through 11.2.4   Upgrade to 11.2.5 or later.\nPAN-OS 11.1         11.1.0 through 11.1.7   Upgrade to 11.1.7-h2 or 11.1.8 or later.\n                    11.1.0 through 11.1.6   Upgrade to 11.1.6-h1 or 11.1.8 or later.\nPAN-OS 11.0 (EoL)                           Upgrade to a supported fixed version.\nPAN-OS 10.2                                 No action needed.\nPAN-OS 10.1                                 No action needed.\nAll other                                   Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>PAN-OS 11.2<br></td><td>11.2.0 through 11.2.4</td><td>Upgrade to 11.2.5 or later.<br></td></tr><tr><td>PAN-OS 11.1</td><td>11.1.0 through 11.1.7<br></td><td>Upgrade to 11.1.7-h2 or 11.1.8 or later.</td></tr><tr><td>&nbsp;</td><td>11.1.0 through 11.1.6</td><td>Upgrade to 11.1.6-h1 or 11.1.8 or later.</td></tr><tr><td>PAN-OS 11.0 (EoL)<br></td><td><br></td><td>Upgrade to a supported fixed version.<br></td></tr><tr><td>PAN-OS 10.2<br></td><td></td><td>No action needed.</td></tr><tr><td>PAN-OS 10.1<br></td><td></td><td>No action needed.</td></tr><tr><td>All other<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-05-14T16:00:00.000Z","lang":"eng","value":"Initial publication"}],"credits":[{"lang":"en","value":"Jari Pietila of Palo Alto Networks","type":"finder"}],"source":{"defect":["PAN-273308"],"discovery":"INTERNAL"},"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"x_affectedList":["PAN-OS 11.2.4-h12","PAN-OS 11.2.4-h11","PAN-OS 11.2.4-h10","PAN-OS 11.2.4-h9","PAN-OS 11.2.4-h8","PAN-OS 11.2.4-h7","PAN-OS 11.2.4-h6","PAN-OS 11.2.4-h5","PAN-OS 11.2.4-h4","PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h18","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-0127","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Authenticated Admin Command Injection Vulnerability in PAN-OS VM-Series","datePublic":"2025-04-09T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-248","descriptions":[{"lang":"en","value":"CAPEC-248 Command Injection"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","platforms":["VM-Series"],"cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"unaffected","version":"11.2.0","versionType":"custom"},{"status":"unaffected","version":"11.1.0","versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.4","changes":[{"at":"11.0.4","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.9","changes":[{"at":"10.2.9","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.1.0","lessThan":"10.1.14-h13","changes":[{"at":"10.1.14-h13","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. This issue is only applicable to PAN-OS VM-Series. This issue does not affect firewalls that are already deployed.\n\nCloud NGFW and Prisma® Access are not affected by this vulnerability.","supportingMedia":[{"type":"text/html","base64":false,"value":"A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. This issue is only applicable to PAN-OS VM-Series. This issue does not affect firewalls that are already deployed.<b><br><br></b>Cloud NGFW and Prisma® Access are not affected by this vulnerability."}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-0127","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":7.1,"threatSeverity":"MEDIUM","threatScore":4,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"No special configuration is required to be affected by this issue.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"No special configuration is required to be affected by this issue."}]}],"workarounds":[{"lang":"en","value":"No workaround or mitigation is available.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"No workaround or mitigation is available."}]}],"solutions":[{"lang":"eng","value":"\n\n\nVERSION                                       MINOR VERSION            SUGGESTED SOLUTION\nPAN-OS 11.2 on VM-Series                                               No action needed\nPAN-OS 11.1 on VM-Series                                               No action needed\nPAN-OS 11.0 on VM-Series                      11.0.0 through 11.0.3    Upgrade to 11.0.4 or later\nPAN-OS 10.2 on VM-Series                      10.2.0 through 10.2.8    Upgrade to 10.2.9 or later\nPAN-OS 10.1 on VM-Series                      10.1.0 through 10.1.14   Upgrade to 10.1.14-h13 or later\nPAN-OS on non VM-Series platforms                                      No action needed\nAll other older unsupported PAN-OS versions                            Upgrade to a supported fixed version\n\n\nPAN-OS 11.0 is EoL. We listed it in this section for completeness because we added a patch for PAN-OS 11.0 before it reached EoL. If you are running PAN-OS 11.0 in any of your firewalls, we strongly recommend that you upgrade from this EoL vulnerable version to a fixed version.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<div><br></div><table class=\"tbl\"><thead><tr><th>Version</th><th>Minor Version</th><th>Suggested Solution</th></tr></thead><tbody><tr><td>PAN-OS 11.2 on VM-Series<br></td><td><br></td><td>No action needed<br></td></tr><tr><td>PAN-OS 11.1&nbsp;on VM-Series<br></td><td><br></td><td>No action needed<br></td></tr><tr><td>PAN-OS 11.0&nbsp;on VM-Series<br></td><td>11.0.0 through 11.0.3<br></td><td>Upgrade to 11.0.4 or later<br></td></tr><tr><td>PAN-OS 10.2&nbsp;on VM-Series<br></td><td>10.2.0 through 10.2.8<br></td><td>Upgrade to 10.2.9 or later<br></td></tr><tr><td>PAN-OS 10.1&nbsp;on VM-Series<br></td><td>10.1.0 through 10.1.14<br></td><td>Upgrade to 10.1.14-h13 or later<br></td></tr><tr><td>PAN-OS on non VM-Series platforms</td><td><br></td><td>No action needed</td></tr><tr><td>All other older unsupported PAN-OS versions<br></td><td><br></td><td>Upgrade to a supported fixed version<br></td></tr></tbody></table><b><br></b>PAN-OS 11.0 is EoL. We listed it in this section for completeness because we added a patch for PAN-OS 11.0 before it reached EoL. If you are running PAN-OS 11.0 in any of your firewalls, we strongly recommend that you upgrade from this EoL vulnerable version to a fixed version."}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-04-09T16:00:00.000Z","lang":"en","value":"Initial Publication"}],"credits":[{"lang":"en","value":"Pavel Raunou","type":"finder"}],"source":{"defect":["PAN-225690"],"discovery":"INTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.0.3-h13","PAN-OS 11.0.3-h12","PAN-OS 11.0.3-h11","PAN-OS 11.0.3-h10","PAN-OS 11.0.3-h9","PAN-OS 11.0.3-h8","PAN-OS 11.0.3-h7","PAN-OS 11.0.3-h6","PAN-OS 11.0.3-h5","PAN-OS 11.0.3-h4","PAN-OS 11.0.3-h3","PAN-OS 11.0.3-h2","PAN-OS 11.0.3-h1","PAN-OS 11.0.3","PAN-OS 11.0.2-h5","PAN-OS 11.0.2-h4","PAN-OS 11.0.2-h3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h5","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h4","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h11","PAN-OS 10.1.14-h10","PAN-OS 10.1.14-h9","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-0128","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Firewall Denial of Service (DoS) Using a Specially Crafted Packet","datePublic":"2025-04-09T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-754","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-153","descriptions":[{"lang":"en","value":"CAPEC-153 Input Data Manipulation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","platforms":["PAN-OS"],"versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h32:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h31:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h30:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h29:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h28:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h27:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h26:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h25:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h24:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h23:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h22:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h21:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"11.2.0","lessThan":"11.2.3","changes":[{"at":"11.2.3","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.5","changes":[{"at":"11.1.5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.6","changes":[{"at":"11.0.6","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.10-h17","changes":[{"at":"10.2.10-h17","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.1.0","lessThan":"10.1.14-h11","changes":[{"at":"10.1.14-h11","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","platforms":["PAN-OS"],"versions":[{"status":"affected","version":"10.2.0","lessThan":"10.2.4-h36","changes":[{"at":"10.2.10-h16","status":"unaffected"},{"at":"10.2.4-h36","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.4-h5","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A denial-of-service (DoS) vulnerability in the Simple Certificate Enrollment Protocol (SCEP) authentication feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode.\n\nCloud NGFW is not affected by this vulnerability. Prisma® Access software is proactively patched and protected from this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>A denial-of-service (DoS) vulnerability in the Simple Certificate Enrollment Protocol (SCEP) authentication feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode.<br><br>Cloud NGFW is not affected by this vulnerability. Prisma® Access software is proactively patched and protected from this issue.</p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-0128","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"A user sends a malicious crafted packet through the firewall, which processes a malicious packet that causes this issue."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"MEDIUM","threatScore":6.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:Y/R:U/V:C/RE:M/U:Amber"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"For Prisma Access, this issue can only be initiated by authenticated end users that use a maliciously crafted packet."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"LOW","subAvailabilityImpact":"LOW","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"MEDIUM","baseScore":5.3,"threatSeverity":"LOW","threatScore":1.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:U/AU:Y/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"NOTE: You do not need to have explicitly configured SCEP on your firewall to be at risk. Firewalls for which you do not apply the explicit mitigation for this issue are affected.","supportingMedia":[{"type":"text/html","base64":false,"value":"NOTE: You do not need to have explicitly configured SCEP on your firewall to be at risk. Firewalls for which you do not apply the explicit mitigation for this issue are affected."}]}],"workarounds":[{"lang":"en","value":"If you are not using SCEP, you can disable it to mitigate this risk by running the following command in your PAN-OS command-line interface (CLI):\n\n\n> debug sslmgr set disable-scep-auth-cookie yes\n\nCAUTION: This workaround is effective only until the next reboot, after which you must rerun this command to stay protected.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"If you are not using SCEP, you can disable it to mitigate this risk by running the following command in your PAN-OS command-line interface (CLI):<br><tt></tt><p><tt><tt>&gt; debug sslmgr set disable-scep-auth-cookie yes</tt></tt></p>CAUTION: This workaround is effective only until the next reboot, after which you must rerun this command to stay protected."}]}],"solutions":[{"lang":"eng","value":"VERSION           MINOR VERSION            SUGGESTED SOLUTION\nPAN-OS 11.2       11.2.0 through 11.2.2    Upgrade to 11.2.3 or later\nPAN-OS 11.1       11.1.0 through 11.1.4    Upgrade to 11.1.5 or later\nPAN-OS 11.0       11.0.0 through 11.0.5    Upgrade to 11.0.6 or later\nPAN-OS 10.2       10.2.0 through 10.2.10   Upgrade to 10.2.11 or later\nPAN-OS 10.1       10.1.0 through 10.1.14   Upgrade to 10.1.14-h11 or later\nAll other older                            Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\n\n\nPAN-OS 11.0 is EoL. We listed it in this section for completeness because we added a patch for PAN-OS 11.0 before it reached EoL. If you are running PAN-OS 11.0 in any of your firewalls, we strongly recommend that you upgrade to a fixed supported version.\n\nWe proactively initiated the upgrade through Prisma Access March 21, 2025, to cover all tenants.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>PAN-OS 11.2<br></td><td>11.2.0 through 11.2.2</td><td>Upgrade to 11.2.3 or later<br></td></tr><tr><td>PAN-OS 11.1</td><td>11.1.0 through 11.1.4<br></td><td>Upgrade to 11.1.5 or later</td></tr><tr><td>PAN-OS 11.0<br></td><td>11.0.0 through 11.0.5<br></td><td>Upgrade to 11.0.6 or later<br></td></tr><tr><td>PAN-OS 10.2<br></td><td>10.2.0 through 10.2.10</td><td>Upgrade to 10.2.11 or later</td></tr><tr><td>PAN-OS 10.1<br></td><td>10.1.0 through 10.1.14<br></td><td>Upgrade to 10.1.14-h11 or later<br></td></tr><tr><td>All other older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr></tbody></table><br>PAN-OS 11.0 is EoL. We listed it in this section for completeness because we added a patch for PAN-OS 11.0 before it reached EoL. If you are running PAN-OS 11.0 in any of your firewalls, we strongly recommend that you upgrade to a fixed supported version.<br><br>We proactively initiated the upgrade through Prisma Access March 21, 2025, to cover all tenants."}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-04-09T16:00:00.000Z","lang":"en","value":"Initial Publication"}],"credits":[{"lang":"en","value":"independent security researcher","type":"finder"}],"source":{"defect":["PAN-255859"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 11.0.5-h2","PAN-OS 11.0.5-h1","PAN-OS 11.0.5","PAN-OS 11.0.4-h6","PAN-OS 11.0.4-h5","PAN-OS 11.0.4-h4","PAN-OS 11.0.4-h3","PAN-OS 11.0.4-h2","PAN-OS 11.0.4-h1","PAN-OS 11.0.4","PAN-OS 11.0.3-h13","PAN-OS 11.0.3-h12","PAN-OS 11.0.3-h11","PAN-OS 11.0.3-h10","PAN-OS 11.0.3-h9","PAN-OS 11.0.3-h8","PAN-OS 11.0.3-h7","PAN-OS 11.0.3-h6","PAN-OS 11.0.3-h5","PAN-OS 11.0.3-h4","PAN-OS 11.0.3-h3","PAN-OS 11.0.3-h2","PAN-OS 11.0.3-h1","PAN-OS 11.0.3","PAN-OS 11.0.2-h5","PAN-OS 11.0.2-h4","PAN-OS 11.0.2-h3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h5","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h4","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h21","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h10","PAN-OS 10.1.14-h9","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-0126","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Session Fixation Vulnerability in GlobalProtect SAML Login","datePublic":"2025-04-09T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-384","description":"CWE-384 Session Fixation","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-195","descriptions":[{"lang":"en","value":"CAPEC-195 Principal Spoof"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h32:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h31:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h30:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h29:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h28:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h27:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h26:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h25:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h24:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h23:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h22:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h21:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"11.2.0","lessThan":"11.2.3","changes":[{"at":"11.2.3","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.5","changes":[{"at":"11.1.5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.6","changes":[{"at":"11.0.6","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.10-h6","changes":[{"at":"10.2.10-h6","status":"unaffected"},{"at":"10.2.11","status":"unaffected"},{"at":"10.2.4-h25","status":"unaffected"},{"at":"10.2.9-h13","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.1.0","lessThan":"10.1.14-h11","changes":[{"at":"10.1.14-h11","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","platforms":["PAN-OS"],"versions":[{"status":"affected","version":"10.2.0","lessThan":"10.2.4-h36","changes":[{"at":"10.2.10-h16","status":"unaffected"},{"at":"10.2.4-h36","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.4-h5","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker.\n\nThe SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched.","supportingMedia":[{"type":"text/html","base64":false,"value":"When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker.<br><br>The SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched."}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-0126","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"ACTIVE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"HIGH","vulnIntegrityImpact":"LOW","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.3,"threatSeverity":"MEDIUM","threatScore":5.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:H/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"This issue impacts only firewalls on which you configured a GlobalProtect portal to use SAML Authentication.\n\nYou can verify whether you configured GlobalProtect portal by checking for entries in your firewall web interface (Network → GlobalProtect → Portals).\n\nIf you do have GlobalProtect portals or gateways in your configuration, then you can verify whether you configured SAML Authentication on these portals by checking your firewall web interface (Network → GlobalProtect → Portals → (portal-config) → Authentication).\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>This issue impacts only firewalls on which you configured a GlobalProtect portal to use SAML Authentication.</p><p>You can verify whether you configured GlobalProtect portal by checking for entries in your firewall web interface (Network → GlobalProtect → Portals).</p><p>If you do have GlobalProtect portals or gateways in your configuration, then you can verify whether you configured SAML Authentication on these portals by checking your firewall web interface (Network → GlobalProtect → Portals → (portal-config) → Authentication).</p>"}]}],"workarounds":[{"lang":"en","value":"This issue can be mitigated using a different form of authentication for the GlobalProtect portal (such as Client Certificate Authentication, RADIUS, TACACS+, LDAP, or Kerberos). For more information about configuring authentication for the GlobalProtect portal see this technical documentation (https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-web-interface-help/globalprotect/network-globalprotect-portals/globalprotect-portals-authentication-configuration-tab).","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>This issue can be mitigated using a different form of authentication for the GlobalProtect portal (such as Client Certificate Authentication, RADIUS, TACACS+, LDAP, or Kerberos). For more information about configuring authentication for the GlobalProtect portal see this technical </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-web-interface-help/globalprotect/network-globalprotect-portals/globalprotect-portals-authentication-configuration-tab\"><span>documentation</span></a><span>.</span></p>"}]}],"solutions":[{"lang":"eng","value":"VERSION           MINOR VERSION            SUGGESTED SOLUTION\nPAN-OS 11.2       11.2.0 through 11.2.2    Upgrade to 11.2.3 or later\nPAN-OS 11.1       11.1.0 through 11.1.4    Upgrade to 11.1.5 or later\nPAN-OS 11.0       11.0.0 through 11.0.5    Upgrade to 11.0.6 or later\nPAN-OS 10.2       10.2.10                  Upgrade to 10.2.10-h6 or 10.2.11 or later\n                  10.2.5 through 10.2.9    Upgrade to 10.2.9-h13 or 10.2.11 or later\n                  10.2.0 through 10.2.4    Upgrade to 10.2.4-h25 or 10.2.11 or later\nPAN-OS 10.1       10.1.0 through 10.1.14   Upgrade to 10.1.14-h11 or later\nAll other older                            Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\n\n\nPAN-OS 11.0 is EoL. We listed it in this section for completeness because we added a patch for PAN-OS 11.0 before it reached EoL. If you are running PAN-OS 11.0 in any of your firewalls, we strongly recommend that you upgrade from this EoL vulnerable version to a fixed version.\n\nWe proactively initiated an upgrade of Prisma Access on March 21, 2025, to cover all tenants.\n\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>PAN-OS 11.2<br></td><td>11.2.0 through 11.2.2<br></td><td>Upgrade to 11.2.3 or later</td></tr><tr><td>PAN-OS 11.1<br></td><td>11.1.0 through 11.1.4<br></td><td>Upgrade to 11.1.5 or later<br></td></tr><tr><td>PAN-OS 11.0</td><td>11.0.0 through 11.0.5</td><td>Upgrade to 11.0.6 or later</td></tr><tr><td>PAN-OS 10.2<br></td><td>10.2.10<br></td><td>Upgrade to 10.2.10-h6 or 10.2.11 or later<br></td></tr><tr><td>&nbsp;</td><td>10.2.5 through 10.2.9</td><td>Upgrade to 10.2.9-h13 or 10.2.11 or later</td></tr><tr><td>&nbsp;</td><td>10.2.0 through 10.2.4</td><td>Upgrade to 10.2.4-h25 or 10.2.11 or later</td></tr><tr><td>PAN-OS 10.1<br></td><td>10.1.0 through 10.1.14<br></td><td>Upgrade to 10.1.14-h11 or later<br></td></tr><tr><td>All other older <br>unsupported <br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr></tbody></table><br>PAN-OS 11.0 is EoL. We listed it in this section for completeness because we added a patch for PAN-OS 11.0 before it reached EoL. If you are running PAN-OS 11.0 in any of your firewalls, we strongly recommend that you upgrade from this EoL vulnerable version to a fixed version.<br><br>We proactively initiated an upgrade of Prisma Access on March 21, 2025, to cover all tenants.<br><p></p>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-04-09T16:00:00.000Z","lang":"en","value":"Initial Publication"}],"credits":[{"lang":"en","value":"D'Angelo Gonzalez of CrowdStrike","type":"finder"}],"source":{"defect":["PAN-253328"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 11.0.5-h2","PAN-OS 11.0.5-h1","PAN-OS 11.0.5","PAN-OS 11.0.4-h6","PAN-OS 11.0.4-h5","PAN-OS 11.0.4-h4","PAN-OS 11.0.4-h3","PAN-OS 11.0.4-h2","PAN-OS 11.0.4-h1","PAN-OS 11.0.4","PAN-OS 11.0.3-h13","PAN-OS 11.0.3-h12","PAN-OS 11.0.3-h11","PAN-OS 11.0.3-h10","PAN-OS 11.0.3-h9","PAN-OS 11.0.3-h8","PAN-OS 11.0.3-h7","PAN-OS 11.0.3-h6","PAN-OS 11.0.3-h5","PAN-OS 11.0.3-h4","PAN-OS 11.0.3-h3","PAN-OS 11.0.3-h2","PAN-OS 11.0.3-h1","PAN-OS 11.0.3","PAN-OS 11.0.2-h5","PAN-OS 11.0.2-h4","PAN-OS 11.0.2-h3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h5","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h4","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h10","PAN-OS 10.1.14-h9","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-0114","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Denial of Service (DoS) in GlobalProtect","datePublic":"2025-03-12T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-400","description":"CWE-400 Uncontrolled Resource Consumption","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-125","descriptions":[{"lang":"en","value":"CAPEC-125 Flooding"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"unaffected","version":"11.2.0","versionType":"custom"},{"status":"unaffected","version":"11.1.0","versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.2","changes":[{"at":"11.0.2","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.5","changes":[{"at":"10.2.5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.1.0","lessThan":"10.1.14-h11","changes":[{"at":"10.1.14-h11","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A Denial of Service (DoS) vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software enables an unauthenticated attacker to render the service unavailable by sending a large number of specially crafted packets over a period of time. This issue affects both the GlobalProtect portal and the GlobalProtect gateway.\n\nThis issue does not apply to Cloud NGFWs or Prisma Access software.","supportingMedia":[{"type":"text/html","base64":false,"value":"A Denial of Service (DoS) vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software enables an unauthenticated attacker to render the service unavailable by sending a large number of specially crafted packets over a period of time. This issue affects both the GlobalProtect portal and the GlobalProtect gateway.<br><br>This issue does not apply to Cloud NGFWs or Prisma Access software."}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-0114","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.2,"threatSeverity":"MEDIUM","threatScore":4.6,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"This issue is applicable only to PAN-OS firewall configurations with an enabled GlobalProtect portal or gateway. You can verify whether you have a GlobalProtect portal or gateway configured on your firewall by checking entries in the firewall web interface (Network > GlobalProtect > Portals and Network > GlobalProtect > Gateways).","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is applicable only to PAN-OS firewall configurations with an enabled GlobalProtect portal or gateway. You can verify whether you have a GlobalProtect portal or gateway configured on your firewall by checking entries in the firewall web interface (<b>Network</b> &gt; <b>GlobalProtect</b> &gt; <b>Portals</b> and <b>Network</b> &gt; <b>GlobalProtect</b> &gt; <b>Gateways</b>)."}]}],"workarounds":[{"lang":"en","value":"No workaround or mitigation is available.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"No workaround or mitigation is available."}]}],"solutions":[{"lang":"eng","value":"VERSION           MINOR VERSION            SUGGESTED SOLUTION\nPAN-OS 11.0       11.0.0 through 11.0.1    Upgrade to 11.0.2 or later\nPAN-OS 10.2       10.2.0 through 10.2.4    Upgrade to 10.2.5 or later\nPAN-OS 10.1       10.1.0 through 10.1.14   Upgrade to 10.1.14-h11 or later\nAll other older                            Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>PAN-OS 11.0</td><td>11.0.0 through 11.0.1</td><td>Upgrade to 11.0.2 or later</td></tr><tr><td>PAN-OS 10.2</td><td>10.2.0 through 10.2.4<br></td><td>Upgrade to 10.2.5 or later</td></tr><tr><td>PAN-OS 10.1<br></td><td>10.1.0 through 10.1.14<br></td><td>Upgrade to 10.1.14-h11 or later<br></td></tr><tr><td>All other older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-03-12T16:00:00.000Z","lang":"en","value":"Initial Publication"}],"credits":[{"lang":"en","value":"an external reporter","type":"finder"}],"source":{"defect":["PAN-209208"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.0.1-h5","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h4","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h10","PAN-OS 10.1.14-h9","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-0108","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Authentication Bypass in the Management Web Interface","datePublic":"2025-02-12T17:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-306","description":"CWE-306 Missing Authentication for Critical Function","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-115","descriptions":[{"lang":"en","value":"CAPEC-115 Authentication Bypass"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"10.1.0","lessThan":"10.1.14-h9","changes":[{"at":"10.1.14-h9","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.7-h24","changes":[{"at":"10.2.7-h24","status":"unaffected"},{"at":"10.2.8-h21","status":"unaffected"},{"at":"10.2.9-h21","status":"unaffected"},{"at":"10.2.12-h6","status":"unaffected"},{"at":"10.2.13-h3","status":"unaffected"},{"at":"10.2.10-h14","status":"unaffected"},{"at":"10.2.11-h12","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.6-h1","changes":[{"at":"11.1.6-h1","status":"unaffected"},{"at":"11.1.2-h18","status":"unaffected"},{"at":"11.1.4-h13","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.4-h4","changes":[{"at":"11.2.4-h4","status":"unaffected"},{"at":"11.2.5","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"An authentication bypass in the in the management web interface of Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS.\n\nThe attacker must have network access to the management web interface to exploit this issue. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended critical deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431).\n\nThis issue does not affect Cloud NGFW or Prisma Access software.","supportingMedia":[{"type":"text/html","base64":false,"value":"An authentication bypass in the <span>in the management web interface of</span><b><span>&nbsp;</span></b>Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS.<b><br><br></b><span>The attacker must have network access to the management web interface to exploit this issue.&nbsp;</span>You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">critical deployment guidelines</a>.<b><br><br></b>This issue does not affect Cloud NGFW or Prisma Access software."}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-0108","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"The risk is highest when you allow access to the management interface from external IP addresses on the internet. Our recommendation is to remediate as soon as possible."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"RED","exploitMaturity":"ATTACKED","baseSeverity":"HIGH","baseScore":8.8,"threatSeverity":"HIGH","threatScore":8.8,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:A/AU:N/R:U/V:C/RE:M/U:Red"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"You can greatly reduce the risk of exploitation by restricting access to a jump box that is the only system allowed to access the management interface. This will ensure that attacks can succeed only if they obtain privileged access through those specified IP addresses. We recommend remediating this vulnerability in your next scheduled maintenance cycle."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"POC","baseSeverity":"MEDIUM","baseScore":5.9,"threatSeverity":"MEDIUM","threatScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"The risk is greatest if you enabled access to the management interface from the internet or any untrusted network either:\n\n 1. Directly; or\n 2. Through a dataplane interface that includes a management interface profile.\n\nYou greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management interface.\n\nUse the following steps to identify your recently detected devices in our internet scans.\n\n 1. To find any assets that require remediation action, visit the Assets section of the Customer Support Portal at https://support.paloaltonetworks.com (https://support.paloaltonetworks.com/) (Products → Assets → All Assets → Remediation Required).\n 2. Review the list of your devices that we discovered in our scans to have an internet-facing management interface and that we tagged with ‘PAN-SA-2024-0015’ and a last seen timestamp (in UTC). If you do not see any such devices listed, then our scan did not find any devices on your account to have an internet-facing management interface within the past three days.\n\nGlobalProtect portals and gateways are not vulnerable to this issue. However, if you configure a management profile on interfaces with GlobalProtect portals or gateways, then you expose the device to attacks through the management web interface (typically accessible on port 4443).","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>The risk is greatest if you enabled access to the management interface from the internet or any untrusted network either:</span></p><ol><li><span>Directly; or</span></li><li><span>Through a dataplane interface that includes a management interface profile.</span></li></ol><p><span>You greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management interface.</span></p><p><span>Use the following steps to identify your recently detected devices in our internet scans.</span></p><ol><li><span>To find any assets that require remediation action, visit the Assets section of the Customer Support Portal at&nbsp;</span><a target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/\"><span>https://support.paloaltonetworks.com</span></a>&nbsp;(Products → Assets → All Assets → Remediation Required).</li><li><span>Review the list of your devices that we discovered in our scans to have an internet-facing management interface and that we tagged with ‘PAN-SA-2024-0015’ and a last seen timestamp (in UTC). If you do not see any such devices listed, then our scan did not find any devices on your account to have an internet-facing management interface within the past three days.</span></li></ol><p><span>GlobalProtect portals and gateways are not vulnerable to this issue. However, if you configure a management profile on interfaces with GlobalProtect portals or gateways, then you expose the device to attacks through the management web interface (typically accessible on port 4443).</span></p>"}]}],"workarounds":[{"lang":"en","value":"Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our critical deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431). Specifically, you should restrict management interface access to only trusted internal IP addresses.\n\nReview information about how to secure management access to your Palo Alto Networks firewalls:\n\n * Palo Alto Networks LIVEcommunity article:https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\n * Palo Alto Networks official and detailed technical documentation:https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\n\nAdditionally, customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510000 and 510001 (introduced in Applications and Threats content version 8943).","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><b>Recommended mitigation</b>—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">critical deployment guidelines</a>. Specifically, you should restrict management interface access to only trusted internal IP addresses.</p><p>Review information about how to secure management access to your Palo Alto Networks firewalls:</p><ul><li>Palo Alto Networks LIVEcommunity article:<a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431</a></li><li>Palo Alto Networks official and detailed technical documentation:<a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\">https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices</a></li></ul>Additionally, customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510000 and 510001 (introduced in Applications and Threats content version 8943)."}]}],"solutions":[{"lang":"en","value":"VERSION             MINOR VERSION            SUGGESTED SOLUTION\nPAN-OS 10.1         10.1.0 through 10.1.14   Upgrade to 10.1.14-h9 or later\nPAN-OS 10.2         10.2.0 through 10.2.13   Upgrade to 10.2.13-h3 or later\n                    10.2.7                   Upgrade to 10.2.7-h24 or 10.2.13-h3 or later\n                    10.2.8                   Upgrade to 10.2.8-h21 or 10.2.13-h3 or later\n                    10.2.9                   Upgrade to 10.2.9-h21 or 10.2.13-h3 or later\n                    10.2.10                  Upgrade to 10.2.10-h14 or 10.2.13-h3 or later\n                    10.2.11                  Upgrade to 10.2.11-h12 or 10.2.13-h3 or later \n                    10.2.12                  Upgrade to 10.2.12-h6 or 10.2.13-h3 or later\nPAN-OS 11.0 (EoL)                            Upgrade to a supported fixed version\nPAN-OS 11.1         11.1.0 through 11.1.6    Upgrade to 11.1.6-h1 or later\n                    11.1.2                   Upgrade to 11.1.2-h18 or 11.1.6-h1 or later\n                    11.1.4                   Upgrade to 11.1.4-h13 or 11.1.6-h1 or later\nPAN-OS 11.2         11.2.0 through 11.2.4    Upgrade to 11.2.5 or later\n                    11.2.4                   Upgrade to 11.2.4-h4 or 11.2.5 or later\nAll other older                              Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\n\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>PAN-OS 10.1<br></td><td>10.1.0 through 10.1.14<br></td><td>Upgrade to 10.1.14-h9 or later<br></td></tr><tr><td>PAN-OS 10.2<br></td><td>10.2.0 through 10.2.13<br></td><td>Upgrade to 10.2.13-h3 or later<br></td></tr><tr><td>&nbsp;</td><td>10.2.7</td><td>Upgrade to 10.2.7-h24 or 10.2.13-h3 or later</td></tr><tr><td>&nbsp;</td><td>10.2.8</td><td>Upgrade to 10.2.8-h21 or 10.2.13-h3 or later</td></tr><tr><td>&nbsp;</td><td>10.2.9</td><td>Upgrade to 10.2.9-h21 or 10.2.13-h3 or later</td></tr><tr><td>&nbsp;</td><td>10.2.10</td><td>Upgrade to 10.2.10-h14 or 10.2.13-h3 or later</td></tr><tr><td>&nbsp;</td><td>10.2.11</td><td>Upgrade to 10.2.11-h12 or 10.2.13-h3 or later&nbsp;</td></tr><tr><td>&nbsp;</td><td>10.2.12</td><td>Upgrade to 10.2.12-h6 or 10.2.13-h3 or later<br></td></tr><tr><td>PAN-OS 11.0 (EoL)</td><td>&nbsp;</td><td>Upgrade to a supported fixed version</td></tr><tr><td>PAN-OS 11.1<br></td><td>11.1.0 through 11.1.6<br></td><td>Upgrade to 11.1.6-h1 or later<br></td></tr><tr><td>&nbsp;</td><td>11.1.2</td><td>Upgrade to 11.1.2-h18 or 11.1.6-h1 or later<br></td></tr><tr><td>&nbsp;</td><td>11.1.4</td><td>Upgrade to 11.1.4-h13 or 11.1.6-h1 or later<br></td></tr><tr><td>PAN-OS 11.2<br></td><td>11.2.0 through 11.2.4<br></td><td>Upgrade to 11.2.5 or later</td></tr><tr><td>&nbsp;</td><td>11.2.4</td><td>Upgrade to 11.2.4-h4 or 11.2.5 or later<br></td></tr><tr><td>All other older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr></tbody></table><p><br></p>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks has observed exploit attempts chaining CVE-2025-0108 with CVE-2024-9474 and CVE-2025-0111 on unpatched and unsecured PAN-OS web management interfaces.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>Palo Alto Networks has observed exploit attempts chaining CVE-2025-0108 with CVE-2024-9474 and CVE-2025-0111 on unpatched and unsecured PAN-OS web management interfaces.</span></p>"}]}],"timeline":[{"time":"2025-02-18T23:00:00.000Z","lang":"en","value":"Updated the exploit status and solutions table"},{"time":"2025-02-18T19:30:00.000Z","lang":"en","value":"Updated fix availability for PAN-OS 10.2"},{"time":"2025-02-18T07:06:00.000Z","lang":"en","value":"Updated exploit status"},{"time":"2025-02-12T23:45:00.000Z","lang":"en","value":"Added Threat Prevention Threat ID to Workarounds and Mitigations"},{"time":"2025-02-12T17:00:00.000Z","lang":"en","value":"Initial Publication"},{"time":"2025-02-19T23:15:00.000Z","lang":"en","value":"Updated fix availability for PAN-OS 10.2 and 11.1"},{"time":"2025-02-21T17:10:00.000Z","lang":"en","value":"Updated fix availability for PAN-OS 11.1 and 11.2"},{"time":"2025-02-21T23:00:00.000Z","lang":"en","value":"Clarified recommended remediations and added a FAQ"},{"time":"2025-03-06T23:00:00.000Z","lang":"en","value":"Updated to explicitly state that end-of-life (EoL) versions are presumed to be affected"}],"credits":[{"lang":"en","value":"Adam Kues - Assetnote Security Research Team","type":"finder"},{"lang":"en","value":"our Deep Product Security Research Team","type":"finder"}],"source":{"defect":["PAN-273971"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-0111","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Authenticated File Read Vulnerability in the Management Web Interface","datePublic":"2025-02-12T17:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-73","description":"CWE-73: External Control of File Name or Path","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-165","descriptions":[{"lang":"en","value":"CAPEC-165 File Manipulation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"10.1.0","lessThan":"10.1.14-h9","changes":[{"at":"10.1.14-h9","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.7-h24","changes":[{"at":"10.2.7-h24","status":"unaffected"},{"at":"10.2.8-h21","status":"unaffected"},{"at":"10.2.9-h21","status":"unaffected"},{"at":"10.2.12-h6","status":"unaffected"},{"at":"10.2.13-h3","status":"unaffected"},{"at":"10.2.10-h14","status":"unaffected"},{"at":"10.2.11-h12","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.6-h1","changes":[{"at":"11.1.6-h1","status":"unaffected"},{"at":"11.1.2-h18","status":"unaffected"},{"at":"11.1.4-h13","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.4-h4","changes":[{"at":"11.2.4-h4","status":"unaffected"},{"at":"11.2.5","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"An authenticated file read vulnerability in the management web interface of the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user.\n\nThe attacker must have network access to the management web interface to exploit this issue. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended critical deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431).\n\n\n\nThis issue does not affect Cloud NGFW or Prisma Access software.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>An authenticated file read vulnerability in the management web interface of the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user.</p><p>The attacker must have network access to the management web interface to exploit this issue. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">critical deployment guidelines</a>.</p><b><p></p></b><p>This issue does not affect Cloud NGFW or Prisma Access software.</p><b></b>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-0111","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"The risk is highest when you allow access to the management interface from external IP addresses on the internet. Our recommendation is to remediate as soon as possible."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"RED","exploitMaturity":"ATTACKED","baseSeverity":"HIGH","baseScore":7.1,"threatSeverity":"HIGH","threatScore":7.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:A/AU:N/R:U/V:C/RE:M/U:Red"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"You can greatly reduce the risk of exploitation by restricting access to a jump box that is the only system allowed to access the management interface. This will ensure that attacks can succeed only if they obtain privileged access through those specified IP addresses. We recommend remediating this vulnerability in your next scheduled maintenance cycle."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"MEDIUM","baseScore":5.9,"threatSeverity":"LOW","threatScore":2,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"The risk is greatest if you enabled access to the management interface from the internet or any untrusted network either:\n\n 1. Directly; or\n 2. Through a dataplane interface that includes a management interface profile.\n\nYou greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management interface.\n\nUse the following steps to identify your recently detected devices in our internet scans.\n\n 1. To find any assets that require remediation action, visit the Assets section of the Customer Support Portal at https://support.paloaltonetworks.com (https://support.paloaltonetworks.com/) (Products → Assets → All Assets → Remediation Required).\n 2. Review the list of your devices that we discovered in our scans to have an internet-facing management interface and that we tagged with ‘PAN-SA-2024-0015’ and a last seen timestamp (in UTC). If you do not see any such devices listed, then our scan did not find any devices on your account to have an internet-facing management interface within the past three days.\n\nGlobalProtect portals and gateways are not vulnerable to this issue. However, if you configure a management profile on interfaces with GlobalProtect portals or gateways, then you expose the device to attacks through the management web interface (typically accessible on port 4443).","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>The risk is greatest if you enabled access to the management interface from the internet or any untrusted network either:</span></p><ol><li><span>Directly; or</span></li><li><span>Through a dataplane interface that includes a management interface profile.</span></li></ol><p><span>You greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management interface.</span></p><p><span>Use the following steps to identify your recently detected devices in our internet scans.</span></p><ol><li><span>To find any assets that require remediation action, visit the Assets section of the Customer Support Portal at </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/\"><span>https://support.paloaltonetworks.com</span></a>&nbsp;(Products → Assets → All Assets → Remediation Required).</li><li><span>Review the list of your devices that we discovered in our scans to have an internet-facing management interface and that we tagged with ‘PAN-SA-2024-0015’ and a last seen timestamp (in UTC). If you do not see any such devices listed, then our scan did not find any devices on your account to have an internet-facing management interface within the past three days.</span></li></ol><p><span>GlobalProtect portals and gateways are not vulnerable to this issue. However, if you configure a management profile on interfaces with GlobalProtect portals or gateways, then you expose the device to attacks through the management web interface (typically accessible on port 4443).</span></p>"}]}],"workarounds":[{"lang":"en","value":"Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our critical deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431). Specifically, you should restrict management interface access to only trusted internal IP addresses.\n\nReview information about how to secure management access to your Palo Alto Networks firewalls:\n\n * Palo Alto Networks LIVEcommunity article:https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\n * Palo Alto Networks official and detailed technical documentation:https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\n\nAdditionally, customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510000 and 510001 (introduced in Applications and Threats content version 8943).\nhttps://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices","supportingMedia":[{"type":"text/html","base64":false,"value":"<p></p><p><b>Recommended mitigation</b>—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">critical deployment guidelines</a>. Specifically, you should restrict management interface access to only trusted internal IP addresses.</p><p>Review information about how to secure management access to your Palo Alto Networks firewalls:</p><ul><li>Palo Alto Networks LIVEcommunity article:<a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431</a></li><li>Palo Alto Networks official and detailed technical documentation:<a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\">https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices</a></li></ul>Additionally, customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510000 and 510001 (introduced in Applications and Threats content version 8943).<br><a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\"></a>"}]}],"solutions":[{"lang":"eng","value":"VERSION             MINOR VERSION            SUGGESTED SOLUTION\nPAN-OS 10.1         10.1.0 through 10.1.14   Upgrade to 10.1.14-h9 or later\nPAN-OS 10.2         10.2.0 through 10.2.13   Upgrade to 10.2.13-h3 or later\n                    10.2.7                   Upgrade to 10.2.7-h24 or 10.2.13-h3 or later\n                    10.2.8                   Upgrade to 10.2.8-h21 or 10.2.13-h3 or later\n                    10.2.9                   Upgrade to 10.2.9-h21 or 10.2.13-h3 or later\n                    10.2.10                  Upgrade to 10.2.10-h14 or 10.2.13-h3 or later\n                    10.2.11                  Upgrade to 10.2.11-h12 or 10.2.13-h3 or later\n                    10.2.12                  Upgrade to 10.2.12-h6 or 10.2.13-h3 or later\nPAN-OS 11.0 (EoL)                            Upgrade to a supported fixed version\nPAN-OS 11.1         11.1.0 through 11.1.6    Upgrade to 11.1.6-h1 or later\n                    11.1.2                   Upgrade to 11.1.2-h18 or 11.1.6-h1 or later\n                    11.1.4                   Upgrade to 11.1.4-h13 or 11.1.6-h1 or later\nPAN-OS 11.2         11.2.0 through 11.2.4    Upgrade to 11.2.5 or later\n                    11.2.4                   Upgrade to 11.2.4-h4 or 11.2.5 or later\nAll other older                              Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\n\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>PAN-OS 10.1<br></td><td>10.1.0 through 10.1.14<br></td><td>Upgrade to 10.1.14-h9 or later<br></td></tr><tr><td>PAN-OS 10.2<br></td><td>10.2.0 through 10.2.13<br></td><td>Upgrade to 10.2.13-h3 or later<br></td></tr><tr><td>&nbsp;</td><td>10.2.7</td><td>Upgrade to 10.2.7-h24 or 10.2.13-h3 or later</td></tr><tr><td>&nbsp;</td><td>10.2.8</td><td>Upgrade to 10.2.8-h21 or 10.2.13-h3 or later</td></tr><tr><td>&nbsp;</td><td>10.2.9</td><td>Upgrade to 10.2.9-h21 or 10.2.13-h3 or later</td></tr><tr><td>&nbsp;</td><td>10.2.10</td><td>Upgrade to 10.2.10-h14 or 10.2.13-h3 or later</td></tr><tr><td>&nbsp;</td><td>10.2.11</td><td>Upgrade to 10.2.11-h12 or 10.2.13-h3 or later </td></tr><tr><td>&nbsp;</td><td>10.2.12</td><td>Upgrade to 10.2.12-h6 or 10.2.13-h3 or later<br></td></tr><tr><td>PAN-OS 11.0 (EoL)</td><td>&nbsp;</td><td>Upgrade to a supported fixed version</td></tr><tr><td>PAN-OS 11.1<br></td><td>11.1.0 through 11.1.6<br></td><td>Upgrade to 11.1.6-h1 or later<br></td></tr><tr><td>&nbsp;</td><td>11.1.2</td><td>Upgrade to 11.1.2-h18 or 11.1.6-h1 or later<br></td></tr><tr><td>&nbsp;</td><td>11.1.4</td><td>Upgrade to 11.1.4-h13 or 11.1.6-h1 or later<br></td></tr><tr><td>PAN-OS 11.2<br></td><td>11.2.0 through 11.2.4<br></td><td>Upgrade to 11.2.5 or later<br></td></tr><tr><td>&nbsp;</td><td>11.2.4</td><td>Upgrade to 11.2.4-h4 or 11.2.5 or later</td></tr><tr><td>All other older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr></tbody></table><p><br></p>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks has observed exploit attempts chaining CVE-2025-0108 with CVE-2024-9474 and CVE-2025-0111 on unpatched and unsecured PAN-OS web management interfaces.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>Palo Alto Networks has observed exploit attempts chaining CVE-2025-0108 with CVE-2024-9474 and CVE-2025-0111 on unpatched and unsecured PAN-OS web management interfaces.</span></p>"}]}],"timeline":[{"time":"2025-02-19T23:15:00.000Z","lang":"en","value":"Updated fix availability for PAN-OS 10.2 and 11.1."},{"time":"2025-02-18T23:00:00.000Z","lang":"en","value":"Updated exploit status and solution table."},{"time":"2025-02-18T19:30:00.000Z","lang":"en","value":"Updated fix availability for PAN-OS 10.2."},{"time":"2025-02-12T23:45:00.000Z","lang":"en","value":"Added Threat Prevention Threat ID to Workarounds and Mitigations."},{"time":"2025-02-12T17:00:00.000Z","lang":"en","value":"Initial Publication."},{"time":"2025-02-21T17:10:00.000Z","lang":"en","value":"Updated fix availability for PAN-OS 11.1 and 11.2."},{"time":"2025-02-24T22:30:00.000Z","lang":"en","value":"Clarified recommended remediations and added a FAQ."},{"time":"2025-02-26T19:15:00.000Z","lang":"en","value":"Added remediation guidance in the FAQ."},{"time":"2025-03-06T23:00:00.000Z","lang":"en","value":"Updated to explicitly state that end-of-life (EoL) versions are presumed to be affected"}],"credits":[{"lang":"en","value":"Émilio Gonzalez","type":"finder"},{"lang":"en","value":"Maxime Gaudreault","type":"finder"},{"lang":"en","value":"our Deep Product Security Research Team","type":"finder"}],"source":{"defect":["PAN-273994"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2024-3393","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Firewall Denial of Service (DoS) in DNS Security Using a Specially Crafted Packet","datePublic":"2024-12-27T02:30:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-754","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-540","descriptions":[{"lang":"en","value":"CAPEC-540 Overread Buffers"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"11.2.0","lessThan":"11.2.3","changes":[{"at":"11.2.3","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.5","changes":[{"at":"11.1.5","status":"unaffected"},{"at":"11.1.4-h7","status":"unaffected"},{"at":"11.1.2-h16","status":"unaffected"},{"at":"11.1.3-h13","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"10.2.0","lessThan":"10.2.8","changes":[{"at":"10.2.8","status":"affected"},{"at":"10.2.14","status":"unaffected"},{"at":"10.2.8-h19","status":"unaffected"},{"at":"10.2.9-h19","status":"unaffected"},{"at":"10.2.10-h12","status":"unaffected"},{"at":"10.2.11-h10","status":"unaffected"},{"at":"10.2.12-h4","status":"unaffected"},{"at":"10.2.13-h2","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"10.1.0","lessThan":"10.1.14","changes":[{"at":"10.1.14","status":"affected"},{"at":"10.1.15","status":"unaffected"},{"at":"10.1.14-h8","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"10.0.0","versionType":"custom"},{"status":"unaffected","version":"9.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","platforms":["Prisma Access"],"versions":[{"status":"unaffected","version":"10.2.0","lessThan":"10.2.8","changes":[{"at":"10.2.8","status":"affected"},{"at":"10.2.9-h19","status":"unaffected"},{"at":"10.2.10-h12","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.3","changes":[{"at":"11.2.3","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","platforms":["Panorama"],"versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.\n\nThis issue is applicable to the PAN-OS software versions listed below on PA-Series firewalls, VM-Series firewalls, CN-Series firewalls, and Prisma Access.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.</span></p><p><span>This issue is applicable to the PAN-OS software versions listed below on PA-Series firewalls, VM-Series firewalls, CN-Series firewalls, and Prisma Access.</span></p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-3393","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"An attacker sends a malicious packet through the firewall, which processes a malicious packet that triggers this issue."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"LOW","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"ATTACKED","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"HIGH","threatScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:A/AU:N/R:U/V:C/RE:M/U:Amber"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"Prisma Access, when only providing access to authenticated end users, processes a malicious packet that triggers this issue."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"LOW","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"ATTACKED","baseSeverity":"HIGH","baseScore":7.1,"threatSeverity":"HIGH","threatScore":7.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:A/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"This issue does not affect Cloud NGFW, Panorama M-Series, or Panorama virtual appliances.\n\nBoth of the following must be true for PAN-OS software to be affected:\n\n 1. Either a DNS Security License or an Advanced DNS Security License must be applied, AND\n 2. DNS Security logging must be enabled.\n\nYou can check for existing DNS Security Configuration in your firewalls using the PAN-OS CLI:\n\n> show config merged | match log-level\n\n * Look for entries with the string 'log-level':\n   \n    * If no entries are found (output is empty) or all entries show 'log-level none;', your configuration is not vulnerable, and no workaround is needed.\n    * If any entries show values other than 'log-level none;', your configuration is vulnerable. You should either upgrade PAN-OS or follow the steps in the workaround section.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue does not affect Cloud NGFW, Panorama M-Series, or Panorama virtual appliances.<br><br>Both of the following must be true for PAN-OS software to be affected:<br><ol><li>Either a DNS Security License or an Advanced DNS Security License must be applied, AND</li><li>DNS Security logging must be enabled.</li></ol>You can check for existing DNS Security Configuration in your firewalls using the PAN-OS CLI:<br><br>&gt; show config merged | match log-level<br><ul><li>Look for entries with the string 'log-level':<br></li><ul><li>If no entries are found (output is empty) or all entries show 'log-level none;', your configuration is not vulnerable, and no workaround is needed.</li><li>If any entries show values other than 'log-level none;', your configuration is vulnerable. You should either upgrade PAN-OS or follow the steps in the workaround section.</li></ul></ul>"}]}],"workarounds":[{"lang":"en","value":"If your firewall running the vulnerable PAN-OS versions stops responding or reboots unexpectedly and you cannot immediately apply a fix, apply a workaround below based on your deployment.\n\nUnmanaged NGFWs, NGFW managed by Panorama, or Prisma Access managed by Panorama\n\n 1. Ensure that a DNS Security Configuration is already present in the device's configuration. See the \"Required Configuration for Exposure\" section for details.\n 2. Within Objects → Security Profiles (https://docs.paloaltonetworks.com/pan-os/11-2/pan-os-web-interface-help/objects/objects-security-profiles-anti-spyware-profile), determine if you use the predefined Anti-Spyware profiles (https://docs.paloaltonetworks.com/network-security/security-policy/administration/security-profiles/security-profile-anti-spyware) in your Security Policy. These are named \"Default\" or \"Strict\" (https://docs.paloaltonetworks.com/network-security/security-policy/administration/security-profiles/security-profile-anti-spyware). If you are using the predefined security profiles, clone the predefined Anti-Spyware profile (https://docs.paloaltonetworks.com/pan-os/11-2/pan-os-web-interface-help/objects/move-clone-override-or-revert-objects/move-or-clone-an-object) for use as a custom Anti-Spyware profile. After cloning each relevant predefined Anti-Spyware profile, replace them with the cloned custom Anti-Spyware profile or group in your Security Rules (Policies → Security → (security rule) in either Actions → Profiles or Actions → Group (https://docs.paloaltonetworks.com/network-security/security-policy/administration/security-rules/create-a-security-policy-rule#create-a-security-policy-rule-panorama)).\n    \n 3. For each custom Anti-Spyware profile, navigate to Objects → Security Profiles → Anti-Spyware → (select a custom profile) → DNS Policies → DNS Security.\n 4. Change the Log Severity to \"none\" for all configured DNS Security categories.\n    \n    \n    \n 5. Commit the changes.\n\nNote 1: Setting Log Severity to 'none' for devices that didn't have a DNS Security configuration may block DNS traffic that wasn’t previously blocked. Additionally, this may happen without generating any log entries, making it difficult to detect the blocked traffic. Review the Required Configuration for Exposure section for instructions on identifying existing DNS Security Configuration.\n\nNote 2: Remember to revert the Log Severity settings once the fixes are applied.\n\nNGFW managed by Strata Cloud Manager (SCM)\n\n\nYou can choose one of the following mitigation options:\n 1. Option 1: Disable DNS Security logging directly on each NGFW by following the PAN-OS steps above.\n 2. Option 2: Disable DNS Security logging across all NGFWs in your tenant by opening a support case (https://support.paloaltonetworks.com/Support/Index).\n\nPrisma Access managed by Strata Cloud Manager (SCM)\n\nUntil we perform an upgrade of your Prisma Access tenant, you can disable DNS Security logging across all NGFWs in your tenant by opening a support case (https://support.paloaltonetworks.com/Support/Index). If you would like to expedite the upgrade, please make a note of that in the support case.","supportingMedia":[{"type":"text/html","base64":false,"value":"If your firewall running the vulnerable PAN-OS versions stops responding or reboots unexpectedly and you cannot immediately apply a fix, apply a workaround below based on your deployment.<br><br><b>Unmanaged NGFWs, NGFW managed by Panorama, or Prisma Access managed by Panorama</b><b><br></b><ol><li>Ensure that a DNS Security Configuration is already present in the device's configuration. See the \"Required Configuration for Exposure\" section for details.</li><li>Within <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/pan-os/11-2/pan-os-web-interface-help/objects/objects-security-profiles-anti-spyware-profile\">Objects → Security Profiles</a>, determine if you use the predefined <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/network-security/security-policy/administration/security-profiles/security-profile-anti-spyware\">Anti-Spyware profiles</a> in your Security Policy. <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/network-security/security-policy/administration/security-profiles/security-profile-anti-spyware\">These are named \"Default\" or \"Strict\"</a>. If you are using the predefined security profiles, <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/pan-os/11-2/pan-os-web-interface-help/objects/move-clone-override-or-revert-objects/move-or-clone-an-object\">clone the predefined Anti-Spyware profile</a> for use as a custom Anti-Spyware profile. After cloning each relevant predefined Anti-Spyware profile, replace them with the cloned custom Anti-Spyware profile or group in your Security Rules (<a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/network-security/security-policy/administration/security-rules/create-a-security-policy-rule#create-a-security-policy-rule-panorama\">Policies → Security → (security rule) in either Actions → Profiles or Actions → Group</a>).<br></li><li>For each custom Anti-Spyware profile, navigate to Objects → Security Profiles → Anti-Spyware → (select a custom profile) → DNS Policies → DNS Security.</li><li>Change the Log Severity to \"none\" for all configured DNS Security categories.<br><img alt=\"\" src=\"data:image/png;base64,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\"><br><img alt=\"\" src=\"data:image/png;base64,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\"><br></li><li><span>Commit the changes.</span></li></ol>Note 1:&nbsp;Setting Log Severity to 'none' for devices that didn't have a DNS Security configuration may block DNS traffic that wasn’t previously blocked.&nbsp;Additionally, this may happen without generating any log entries, making it difficult to detect the blocked traffic. Review the Required Configuration for Exposure section for instructions on identifying existing DNS Security Configuration.<br><br>Note 2: Remember to revert the Log Severity settings once the fixes are applied.<br><br><b>NGFW managed by Strata Cloud Manager (SCM)</b><br><br><div><div>You can choose one of the following mitigation options:</div><div><ol><li>Option 1: Disable DNS Security logging directly on each NGFW by following the PAN-OS steps above.</li><li>Option 2: Disable DNS Security logging across all NGFWs in your tenant by opening a <a target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/Support/Index\">support case</a>.</li></ol></div><b><p>Prisma Access managed by Strata Cloud Manager (SCM)</p></b></div><p>Until we perform an upgrade of your Prisma Access tenant, you can disable DNS Security logging across all NGFWs in your tenant by opening a <a target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/Support/Index\">support case</a>. If you would like to expedite the upgrade, please make a note of that in the support case.</p><b></b>"}]}],"solutions":[{"lang":"eng","value":"This issue is fixed in PAN-OS 10.1.15, PAN-OS 10.2.14, PAN-OS 11.1.5, PAN-OS 11.2.3, and all later PAN-OS versions.\n\nNote: PAN-OS 11.0 reached the end of life (EOL) on November 17, 2024, so we do not intend to provide a fix for this release.\n\nPrisma Access customers using DNS Security with affected PAN-OS versions should apply one of the workarounds provided below. We will perform upgrades in two phases for impacted customers on the weekends of January 3rd and January 10th. You can request an expedited Prisma Access upgrade to the latest PAN-OS version by opening a support case (https://support.paloaltonetworks.com/Support/Index).\n\nIn addition, to provide the most seamless upgrade path for our customers, we are making fixes available for other TAC-preferred and commonly deployed maintenance releases.\n\nAdditional PAN-OS 11.1 releases with the fix:\n\n * 11.1.2-h16 (available)\n * 11.1.3-h13 (available)\n * 11.1.4-h7 (available)\n * 11.1.5 (available)\n\nAdditional PAN-OS 10.2 releases with the fix:\n * 10.2.8-h19 (available)\n * 10.2.9-h19 (available)\n * 10.2.10-h12 (available)\n * 10.2.11-h10 (available)\n * 10.2.12-h4 (available)\n * 10.2.13-h2 (available)\n * 10.2.14 (ETA: early March)\n\nAdditional PAN-OS 10.1 releases with the fix:\n * 10.1.14-h8 (available)\n * 10.1.15 (ETA: end of February)\n\nAdditional PAN-OS releases with the fix only applicable to Prisma Access:\n * 10.2.9-h19 (available)\n * 10.2.10-h12 (available)","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>This issue is fixed in PAN-OS 10.1.15, PAN-OS 10.2.14, PAN-OS 11.1.5, PAN-OS 11.2.3, and all later PAN-OS versions.</p><p>Note: PAN-OS 11.0 reached the end of life (EOL) on November 17, 2024, so we do not intend to provide a fix for this release.</p><p>Prisma Access customers using DNS Security with affected PAN-OS versions should apply one of the workarounds provided below. We will perform upgrades in two phases for impacted customers on the weekends of January 3rd and January 10th. You can request an expedited Prisma Access upgrade to the latest PAN-OS version by opening a <a target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/Support/Index\">support case</a>.</p><p>In addition, to provide the most seamless upgrade path for our customers, we are making fixes available for other TAC-preferred and commonly deployed maintenance releases.</p><p>​​Additional PAN-OS 11.1 releases with the fix:</p><div><ul><li>11.1.2-h16&nbsp;(available)</li><li>11.1.3-h13&nbsp;(available)</li><li>11.1.4-h7&nbsp;(available)</li><li>11.1.5&nbsp;(available)</li></ul></div><div>Additional PAN-OS 10.2 releases with the fix:</div><div><ul><li>10.2.8-h19&nbsp;(available)</li><li>10.2.9-h19&nbsp;(available)</li><li>10.2.10-h12&nbsp;(available)</li><li>10.2.11-h10&nbsp;(available)</li><li>10.2.12-h4&nbsp;(available)</li><li>10.2.13-h2&nbsp;(available)</li><li>10.2.14&nbsp;(ETA: early March)</li></ul></div><div>Additional PAN-OS 10.1 releases with the fix:</div><div><ul><li>10.1.14-h8&nbsp;(available)</li><li>10.1.15&nbsp;(ETA: end of February)</li></ul></div><div>Additional PAN-OS releases with the fix only applicable to Prisma Access:</div><div><ul><li>10.2.9-h19&nbsp;(available)</li><li>10.2.10-h12&nbsp;(available)</li></ul></div>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is aware of customers experiencing this denial of service (DoS) when their firewall blocks malicious DNS packets that trigger this issue.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<span>Palo Alto Networks is aware of customers experiencing this denial of service (DoS) when their firewall blocks malicious DNS packets that trigger this issue.</span>"}]}],"timeline":[{"time":"2025-01-30T00:00:00.000Z","lang":"en","value":"Corrected the 11.1.4 fix version to 11.1.4-h7 in the Product Status table"},{"time":"2025-01-17T23:45:00.000Z","lang":"en","value":"Updated Required Configuration section to clarify how to verify if DNS Security is enabled."},{"time":"2024-12-30T19:15:00.000Z","lang":"en","value":"Clarified affected products and platforms, and updated Workarounds and Mitigations"},{"time":"2024-12-27T18:40:00.000Z","lang":"en","value":"Simplified Product Status table, Required Configuration, and added ETAs to Solution"},{"time":"2024-12-27T02:30:00.000Z","lang":"en","value":"Initial publication"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks the CERT-EE team for their extra effort in providing invaluable forensic and analytic assistance.","type":"reporter"}],"source":{"defect":["PAN-259351","PAN-219034"],"discovery":"USER"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2024-2551","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Firewall Denial of Service (DoS) Using a Specially Crafted Packet","datePublic":"2024-11-13T18:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-476","description":"CWE-476 NULL Pointer Dereference","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-129","descriptions":[{"lang":"en","value":"CAPEC-129 Pointer Manipulation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"unaffected","version":"11.2.0","versionType":"custom"},{"status":"unaffected","version":"11.1.0","versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.5","changes":[{"at":"11.0.5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.4-h6","changes":[{"at":"10.2.4-h6","status":"unaffected"},{"at":"10.2.5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.1.0","lessThan":"10.1.14","changes":[{"at":"10.1.14","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop a core system service on the firewall by sending a crafted packet through the data plane that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<span>A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop a core system service on the firewall by sending a crafted packet through the data plane that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.</span><br>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-2551","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"MEDIUM","threatScore":6.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"No special configuration is required to be affected by this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"No special configuration is required to be affected by this issue."}]}],"workarounds":[{"lang":"en","value":"No workaround or mitigation is available.","supportingMedia":[{"type":"text/html","base64":false,"value":"No workaround or mitigation is available."}]}],"solutions":[{"lang":"eng","value":"This issue is fixed in PAN-OS 10.1.14, PAN-OS 10.2.4-h6, PAN-OS 10.2.5, PAN-OS 11.0.5, and all later PAN-OS versions.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is fixed in PAN-OS 10.1.14, PAN-OS 10.2.4-h6, PAN-OS 10.2.5, PAN-OS 11.0.5, and all later PAN-OS versions.<br>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2024-11-13T17:00:00.000Z","lang":"en","value":"Initial publication"}],"credits":[{"lang":"en","value":"a customer","type":"finder"}],"source":{"defect":["PAN-223185"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.0.4-h6","PAN-OS 11.0.4-h5","PAN-OS 11.0.4-h4","PAN-OS 11.0.4-h3","PAN-OS 11.0.4-h2","PAN-OS 11.0.4-h1","PAN-OS 11.0.4","PAN-OS 11.0.3-h13","PAN-OS 11.0.3-h12","PAN-OS 11.0.3-h11","PAN-OS 11.0.3-h10","PAN-OS 11.0.3-h9","PAN-OS 11.0.3-h8","PAN-OS 11.0.3-h7","PAN-OS 11.0.3-h6","PAN-OS 11.0.3-h5","PAN-OS 11.0.3-h4","PAN-OS 11.0.3-h3","PAN-OS 11.0.3-h2","PAN-OS 11.0.3-h1","PAN-OS 11.0.3","PAN-OS 11.0.2-h5","PAN-OS 11.0.2-h4","PAN-OS 11.0.2-h3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h5","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h4","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2024-9472","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Traffic","datePublic":"2024-11-13T18:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-476","description":"CWE-476 NULL Pointer Dereference","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-129","descriptions":[{"lang":"en","value":"CAPEC-129 Pointer Manipulation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected","cpes":[]},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"11.2.0","lessThan":"11.2.2-h3","changes":[{"at":"11.2.2-h3","status":"unaffected"},{"at":"11.2.3","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.2-h14","changes":[{"at":"11.1.2-h14","status":"unaffected"},{"at":"11.1.3-h10","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"11.0.0","versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.7-h16","changes":[{"at":"10.2.7-h16","status":"unaffected"},{"at":"10.2.8-h13","status":"unaffected"},{"at":"10.2.9-h14","status":"unaffected"},{"at":"10.2.10-h7","status":"unaffected"},{"at":"10.2.11-h4","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"10.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected","cpes":[]}],"descriptions":[{"lang":"en","value":"A null pointer dereference in Palo Alto Networks PAN-OS software on PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series hardware platforms when Decryption policy is enabled allows an unauthenticated attacker to crash PAN-OS by sending specific traffic through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.\n\nPalo Alto Networks VM-Series, Cloud NGFW, and Prisma Access are not affected.\n\nThis issue only affects PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series running these specific versions of PAN-OS:\n * 10.2.7-h12\n * 10.2.8-h10\n * 10.2.9-h9\n * 10.2.9-h11\n * 10.2.10-h2\n * 10.2.10-h3\n * 10.2.11\n * 10.2.11-h1\n * 10.2.11-h2\n * 10.2.11-h3\n * 11.1.2-h9\n * 11.1.2-h12\n * 11.1.3-h2\n * 11.1.3-h4\n * 11.1.3-h6\n * 11.2.2\n * 11.2.2-h1","supportingMedia":[{"type":"text/html","base64":false,"value":"<div>A null pointer dereference in Palo Alto Networks PAN-OS software on PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series hardware platforms when Decryption policy is enabled allows an unauthenticated attacker to crash PAN-OS by sending specific traffic through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.</div><br><div>Palo Alto Networks VM-Series, Cloud NGFW, and Prisma Access are not affected.</div><br><div>This issue only affects PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series running these specific versions of PAN-OS:</div><div><ul><li>10.2.7-h12</li><li>10.2.8-h10</li><li>10.2.9-h9</li><li>10.2.9-h11</li><li>10.2.10-h2</li><li>10.2.10-h3</li><li>10.2.11</li><li>10.2.11-h1</li><li>10.2.11-h2</li><li>10.2.11-h3</li><li>11.1.2-h9</li><li>11.1.2-h12</li><li>11.1.3-h2</li><li>11.1.3-h4</li><li>11.1.3-h6</li><li>11.2.2</li><li>11.2.2-h1</li></ul></div>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-9472","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"MEDIUM","threatScore":6.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"This issue is only applicable firewalls where url proxy or any decrypt-policy is configured.\n\nWhen any decrypt policy is configured, this issue may be encountered regardless of whether traffic matches explicit decrypt, explicit no-decrypt, or none of the decryption policies.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is only applicable firewalls where url proxy or any decrypt-policy is configured.<br><br>When any decrypt policy is configured, this issue may be encountered regardless of whether traffic matches explicit decrypt, explicit no-decrypt, or none of the decryption policies."}]}],"workarounds":[{"lang":"en","value":"This issue does not impact firewalls that do not have url proxy or any decrypt-policy configured.\n\nThe issue can be completely mitigated by setting this option:\n\n\n> set system setting ctd nonblocking-pattern-match disable","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue does not impact firewalls that do not have url proxy or any decrypt-policy configured.<br><br>The issue can be completely mitigated by setting this option:<br><blockquote><tt>set system setting ctd nonblocking-pattern-match disable</tt></blockquote>"}]}],"solutions":[{"lang":"eng","value":"This issue is fixed in PAN-OS 10.2.7-h16, PAN-OS 10.2.8-h13, PAN-OS 10.2.9-h14, PAN-OS 10.2.10-h7, PAN-OS 10.2.11-h4, PAN-OS 11.1.2-h14, PAN-OS 11.1.3-h10, PAN-OS 11.2.2-h3, PAN-OS 11.2.3, and all later PAN-OS versions.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is fixed in PAN-OS 10.2.7-h16, PAN-OS 10.2.8-h13, PAN-OS 10.2.9-h14, PAN-OS 10.2.10-h7, PAN-OS 10.2.11-h4, PAN-OS 11.1.2-h14, PAN-OS 11.1.3-h10, PAN-OS 11.2.2-h3, PAN-OS 11.2.3, and all later PAN-OS versions."}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue. However, customers have reported encountering this issue during normal operations.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue. However, customers have reported encountering this issue during normal operations."}]}],"timeline":[{"time":"2024-11-13T17:00:00.000Z","lang":"en","value":"Initial publication"}],"source":{"defect":["PAN-262287","PAN-226361"],"discovery":"USER"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2024-2550","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway Using a Specially Crafted Packet","datePublic":"2024-11-13T18:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-476","description":"CWE-476 NULL Pointer Dereference","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-129","descriptions":[{"lang":"en","value":"CAPEC-129 Pointer Manipulation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*"],"versions":[{"status":"unaffected","version":"11.2.0","versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.5","changes":[{"at":"11.1.5","status":"unaffected"},{"at":"11.1.4-h9","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.6","changes":[{"at":"11.0.6","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.11","changes":[{"at":"10.2.11","status":"unaffected"},{"at":"10.2.10-h10","status":"unaffected"},{"at":"10.2.9-h18","status":"unaffected"},{"at":"10.2.8-h18","status":"unaffected"},{"at":"10.2.7-h21","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"10.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop the GlobalProtect service on the firewall by sending a specially crafted packet that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<span>A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop the GlobalProtect service on the firewall by sending a specially crafted packet that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.</span><br>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-2550","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"MEDIUM","threatScore":6.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"This issue impacts only firewalls on which you configured a GlobalProtect gateway. You can verify whether you configured GlobalProtect gateway by checking for entries in your firewall web interface (Network → GlobalProtect → Gateways).","supportingMedia":[{"type":"text/html","base64":false,"value":"<div><div>This issue impacts only firewalls on which you configured a GlobalProtect gateway. You can verify whether you configured GlobalProtect gateway by checking for entries in your firewall web interface (Network → GlobalProtect → Gateways).</div></div>"}]}],"workarounds":[{"lang":"en","value":"No workaround or mitigation is available.","supportingMedia":[{"type":"text/html","base64":false,"value":"No workaround or mitigation is available."}]}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 10.2.11, PAN-OS 11.0.6, PAN-OS 11.1.5, and all later PAN-OS versions.\n\nIn addition, in an attempt to provide the most seamless upgrade path for our customers, we are making additional fixes available as noted below:\n\n * Additional 11.1 fix:\n   * 11.1.4-h9\n     \n * Additional 10.2 fixes:\n   * 10.2.10-h10\n   * 10.2.9-h18\n   * 10.2.8-h18\n   * 10.2.7-h21","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is fixed in PAN-OS 10.2.11, PAN-OS 11.0.6, PAN-OS 11.1.5, and all later PAN-OS versions.<br><br>In addition, in an attempt to provide the most seamless upgrade path for our customers, we are making additional fixes available as noted below:<br><ul><li>Additional 11.1 fix:<ul><li>11.1.4-h9<br></li></ul></li><li>Additional 10.2 fixes:<ul><li>10.2.10-h10</li><li>10.2.9-h18</li><li>10.2.8-h18</li><li>10.2.7-h21</li></ul></li></ul>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-01-06T21:30:00.000Z","lang":"en","value":"Added additional fixed versions for PAN-OS 10.2"},{"time":"2024-12-20T20:55:00.000Z","lang":"en","value":"Updated the Product Status table"},{"time":"2024-11-13T17:00:00.000Z","lang":"en","value":"Initial publication"}],"credits":[{"lang":"en","value":"Michael Baker from AC3","type":"finder"}],"source":{"defect":["PAN-244950","PAN-221352"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 11.0.5-h2","PAN-OS 11.0.5-h1","PAN-OS 11.0.5","PAN-OS 11.0.4-h6","PAN-OS 11.0.4-h5","PAN-OS 11.0.4-h4","PAN-OS 11.0.4-h3","PAN-OS 11.0.4-h2","PAN-OS 11.0.4-h1","PAN-OS 11.0.4","PAN-OS 11.0.3-h13","PAN-OS 11.0.3-h12","PAN-OS 11.0.3-h11","PAN-OS 11.0.3-h10","PAN-OS 11.0.3-h9","PAN-OS 11.0.3-h8","PAN-OS 11.0.3-h7","PAN-OS 11.0.3-h6","PAN-OS 11.0.3-h5","PAN-OS 11.0.3-h4","PAN-OS 11.0.3-h3","PAN-OS 11.0.3-h2","PAN-OS 11.0.3-h1","PAN-OS 11.0.3","PAN-OS 11.0.2-h5","PAN-OS 11.0.2-h4","PAN-OS 11.0.2-h3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h5","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h4","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2024-9468","assignerOrgId":"00000000-0000-4000-9000-000000000000","assignerShortName":"palo_alto","dateUpdated":"2024-10-14T00:00:00.000Z","serial":1,"dateReserved":"2024-10-09T07:00:00.000Z","datePublished":"2024-10-09T07:00:00.000Z","state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000","shortName":"palo_alto","dateUpdated":"2024-10-09T17:05:00.000Z"},"title":"PAN-OS: Firewall Denial of Service (DoS) via a Maliciously Crafted Packet","datePublic":"2024-10-09T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-583","descriptions":[{"lang":"en","value":"CAPEC-583 Disabling Network Hardware"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h23:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h22:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h21:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*"],"versions":[{"status":"unaffected","version":"11.2.0","versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.3","changes":[{"at":"11.1.3","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.4-h5","changes":[{"at":"11.0.4-h5","status":"unaffected"},{"at":"11.0.6","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.4-h24","changes":[{"at":"10.2.9-h11","status":"unaffected"},{"at":"10.2.10-h4","status":"unaffected"},{"at":"10.2.11","status":"unaffected"},{"at":"10.2.8-h20","status":"unaffected"},{"at":"10.2.7-h24","status":"unaffected"},{"at":"10.2.4-h24","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"10.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.","supportingMedia":[{"type":"text/html","base64":true,"value":"<pre>A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.</pre>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-9468","tags":["x_refsource_CONFIRM"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"LOW","providerUrgency":"AMBER","exploitMaturity":"NOT_DEFINED","baseSeverity":"HIGH","baseScore":8.2,"threatSeverity":"HIGH","threatScore":8.2,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:C/RE:L/U:Amber"}}],"configurations":[{"lang":"en","value":"This issue affects only PAN-OS configurations where all of the following are true:\n* Threat Prevention is enabled.\n* The Threat Prevention signature 86467 (\"Possible Domain Fronting Detection-SNI\") is enabled on an Anti-Spyware profile.\n* This setting is enabled: Device > Setup > Session > Decryption Settings > SSL Decryption Settings > Send handshake messages to CTD for inspection.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue affects only PAN-OS configurations where all of the following are true:\n* Threat Prevention is enabled.\n* The Threat Prevention signature 86467 (\"Possible Domain Fronting Detection-SNI\") is enabled on an Anti-Spyware profile.\n* This setting is enabled: Device > Setup > Session > Decryption Settings > SSL Decryption Settings > Send handshake messages to CTD for inspection."}]}],"workarounds":[{"lang":"en","value":"Customers can block attacks for this vulnerability by disabling this setting: Device > Setup Session > Decryption Settings > SSL Decryption Settings > Send handshake messages to CTD for inspection.\n\nCustomers with a Threat Prevention subscription, who want to keep domain fronting detection enabled, can block attacks for this vulnerability by enabling Threat ID 94971 (introduced in Applications and Threats content version 8854).","supportingMedia":[{"type":"text/html","base64":false,"value":"Customers can block attacks for this vulnerability by disabling this setting: Device > Setup Session > Decryption Settings > SSL Decryption Settings > Send handshake messages to CTD for inspection.\n\nCustomers with a Threat Prevention subscription, who want to keep domain fronting detection enabled, can block attacks for this vulnerability by enabling Threat ID 94971 (introduced in Applications and Threats content version 8854)."}]}],"solutions":[{"lang":"en","value":"This issue is fixed in 10.2.9-h11, 10.2.10-h4, PAN-OS 10.2.11, PAN-OS 11.0.4-h5, PAN-OS 11.0.6, PAN-OS 11.1.3, and all later PAN-OS versions.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is fixed in 10.2.9-h11, 10.2.10-h4, PAN-OS 10.2.11, PAN-OS 11.0.4-h5, PAN-OS 11.0.6, PAN-OS 11.1.3, and all later PAN-OS versions."}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-04-30T17:45:00.000Z","lang":"en","value":"Updated fix availability for PAN-OS 10.2"},{"time":"2024-10-14T22:40:00.000Z","lang":"eng","value":"Clarified the Required Configuration for Exposure section"},{"time":"2024-10-09T16:00:00.000Z","lang":"eng","value":"Initial publication"}],"credits":[{"lang":"en","value":"This issue was found by Jeff Luo of Palo Alto Networks during internal review.","type":"finder"}],"source":{"defect":["PAN-244840"],"discovery":"INTERNAL"},"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"x_affectedList":["PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 11.0.5-h2","PAN-OS 11.0.5-h1","PAN-OS 11.0.5","PAN-OS 11.0.4-h4","PAN-OS 11.0.4-h3","PAN-OS 11.0.4-h2","PAN-OS 11.0.4-h1","PAN-OS 11.0.4","PAN-OS 11.0.3-h13","PAN-OS 11.0.3-h12","PAN-OS 11.0.3-h11","PAN-OS 11.0.3-h10","PAN-OS 11.0.3-h9","PAN-OS 11.0.3-h8","PAN-OS 11.0.3-h7","PAN-OS 11.0.3-h6","PAN-OS 11.0.3-h5","PAN-OS 11.0.3-h4","PAN-OS 11.0.3-h3","PAN-OS 11.0.3-h2","PAN-OS 11.0.3-h1","PAN-OS 11.0.3","PAN-OS 11.0.2-h5","PAN-OS 11.0.2-h4","PAN-OS 11.0.2-h3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h5","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h4","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2024-8686","assignerOrgId":"00000000-0000-4000-9000-000000000000","assignerShortName":"palo_alto","dateUpdated":"2024-09-11T00:00:00.000Z","serial":1,"dateReserved":"2024-09-11T07:00:00.000Z","datePublished":"2024-09-11T07:00:00.000Z","state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000","shortName":"palo_alto","dateUpdated":"2024-09-11T16:34:00.000Z"},"title":"PAN-OS: Command Injection Vulnerability","datePublic":"2024-09-11T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","type":"CWE"}]}],"impacts":[{"descriptions":[{"lang":"en","value":""}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*"],"versions":[{"status":"unaffected","version":"11.2.0","lessThan":"11.2.2","changes":[{"at":"11.2.2","status":"affected"},{"at":"11.2.3","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.2","versionType":"custom"},{"status":"unaffected","version":"11.1.0","versionType":"custom"},{"status":"unaffected","version":"11.0.0","versionType":"custom"},{"status":"unaffected","version":"10.2.0","versionType":"custom"},{"status":"unaffected","version":"10.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as root on the firewall.","supportingMedia":[{"type":"text/html","base64":true,"value":"<pre>A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as root on the firewall.</pre>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-8686","tags":["x_refsource_CONFIRM"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"NOT_DEFINED","baseSeverity":"HIGH","baseScore":8.6,"threatSeverity":"HIGH","threatScore":8.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"TBD","supportingMedia":[{"type":"text/html","base64":false,"value":"TBD"}]}],"workarounds":[{"lang":"en","value":"TBD","supportingMedia":[{"type":"text/html","base64":false,"value":"TBD"}]}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 11.2.3 and all later PAN-OS versions.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is fixed in PAN-OS 11.2.3 and all later PAN-OS versions."}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2024-09-11T16:00:00.000Z","lang":"eng","value":"Initial publication"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Louis Lingg for discovering and reporting this issue.","type":"finder"}],"source":{"defect":["PAN-263321"],"discovery":"EXTERNAL"},"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"x_affectedList":["PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.2"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2024-5911","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2024-07-10T00:00:00","dateReserved":"2024-07-10T00:00:00","dateUpdated":"2024-07-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: File Upload Vulnerability in the Panorama Web Interface","datePublic":"2024-07-10T16:00:00.000Z","providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2024-07-10T18:40:02.209Z"},"descriptions":[{"lang":"en","value":"An arbitrary file upload vulnerability in Palo Alto Networks Panorama software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and crash the Panorama. Repeated attacks eventually cause the Panorama to enter maintenance mode, which requires manual intervention to bring the Panorama back online.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An arbitrary file upload vulnerability in Palo Alto Networks Panorama software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and crash the Panorama. Repeated attacks eventually cause the Panorama to enter maintenance mode, which requires manual intervention to bring the Panorama back online.</pre>"}]}],"x_affectedList":["PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1","PAN-OS 10.2.0","PAN-OS 10.2","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"11.1 All","status":"unaffected"},{"version":"11.0 All","status":"unaffected"},{"version":"11.2 All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.2","status":"affected","lessThan":"10.2.4","versionType":"custom","changes":[{"at":"10.2.4","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.9","versionType":"custom","changes":[{"at":"10.1.9","status":"unaffected"}]}],"platforms":["Panorama"]},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2024-5911"}],"credits":[{"lang":"en","value":"This issue was found by Yasukazu Miyashita of Palo Alto Networks during an internal security review."}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","baseSeverity":"HIGH","baseScore":7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-434 Unrestricted Upload of File with Dangerous Type","cweId":"CWE-434"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["PAN-182835"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 10.1.9, PAN-OS 10.2.4, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 10.1.9, PAN-OS 10.2.4, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2024-07-10T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2024-3382","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2024-04-10T00:00:00","dateReserved":"2024-04-10T00:00:00","dateUpdated":"2024-04-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Firewall Denial of Service (DoS) via a Burst of Crafted Packets","datePublic":"2024-04-10T16:00:00.000Z","providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2024-04-10T17:05:47.325Z"},"descriptions":[{"lang":"en","value":"A memory leak exists in Palo Alto Networks PAN-OS software that enables an attacker to send a burst of crafted packets through the firewall that eventually prevents the firewall from processing traffic. This issue applies only to PA-5400 Series devices that are running PAN-OS software with the SSL Forward Proxy feature enabled.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A memory leak exists in Palo Alto Networks PAN-OS software that enables an attacker to send a burst of crafted packets through the firewall that eventually prevents the firewall from processing traffic. This issue applies only to PA-5400 Series devices that are running PAN-OS software with the SSL Forward Proxy feature enabled.</pre>"}]}],"x_affectedList":["PAN-OS 11.1.0","PAN-OS 11.1","PAN-OS 11.0.3-h3","PAN-OS 11.0.3-h2","PAN-OS 11.0.3-h1","PAN-OS 11.0.3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 11.0","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6","PAN-OS 10.2.5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1","PAN-OS 10.2.0","PAN-OS 10.2"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0 All","status":"unaffected"},{"version":"9.1 All","status":"unaffected"},{"version":"10.1 All","status":"unaffected"},{"version":"10.2","status":"affected","lessThan":"10.2.7-h3","versionType":"custom","changes":[{"at":"10.2.7-h3","status":"unaffected"}]},{"version":"11.0","status":"affected","lessThan":"11.0.4","versionType":"custom","changes":[{"at":"11.0.4","status":"unaffected"}]},{"version":"11.1","status":"affected","lessThan":"11.1.2","versionType":"custom","changes":[{"at":"11.1.2","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2024-3382"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Celedonio Albarran of Equity Residential and their Infrastructure and Security teams for discovering and reporting this issue."}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"LOW","providerUrgency":"AMBER","baseSeverity":"HIGH","baseScore":8.2,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:D/RE:L/U:Amber"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-770 Allocation of Resources Without Limits or Throttling","cweId":"CWE-770"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["PAN-234921"],"discovery":"USER"},"configurations":[{"lang":"en","value":"This issue applies only to PA-5400 Series devices that are running PAN-OS firewall configurations with the SSL Forward Proxy feature enabled. You can verify whether you have the SSL Forward Proxy feature enabled by checking for decryption policy rules in your firewall web interface (Policies > Decryption).","supportingMedia":{"value":"This issue applies only to PA-5400 Series devices that are running PAN-OS firewall configurations with the SSL Forward Proxy feature enabled. You can verify whether you have the SSL Forward Proxy feature enabled by checking for decryption policy rules in your firewall web interface (Policies > Decryption).","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"You can mitigate this issue by disabling decryption on your firewalls. To temporarily disable SSL Decryption, refer to the administrator’s guide for your PAN-OS software (such as PAN-OS 11.1: https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/temporarily-disable-ssl-decryption). Additionally, to ensure that decryption remains disabled after a reboot, configure a policy-based decryption exclusion that excludes all traffic from being decrypted (https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/decryption-exclusions/create-a-policy-based-decryption-exclusion).","supportingMedia":{"value":"You can mitigate this issue by disabling decryption on your firewalls. To temporarily disable SSL Decryption, refer to the administrator’s guide for your PAN-OS software (such as PAN-OS 11.1: https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/temporarily-disable-ssl-decryption). Additionally, to ensure that decryption remains disabled after a reboot, configure a policy-based decryption exclusion that excludes all traffic from being decrypted (https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/decryption-exclusions/create-a-policy-based-decryption-exclusion).","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 10.2.7-h3, PAN-OS 11.0.4, PAN-OS 11.1.2, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 10.2.7-h3, PAN-OS 11.0.4, PAN-OS 11.1.2, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2024-04-10T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2024-3383","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2024-04-10T00:00:00","dateReserved":"2024-04-10T00:00:00","dateUpdated":"2024-04-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Improper Group Membership Change Vulnerability in Cloud Identity Engine (CIE)","datePublic":"2024-04-10T16:00:00.000Z","providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2024-04-10T17:06:15.823Z"},"descriptions":[{"lang":"en","value":"A vulnerability in how Palo Alto Networks PAN-OS software processes data received from Cloud Identity Engine (CIE) agents enables modification of User-ID groups. This impacts user access to network resources where users may be inappropriately denied or allowed access to resources based on your existing Security Policy rules.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability in how Palo Alto Networks PAN-OS software processes data received from Cloud Identity Engine (CIE) agents enables modification of User-ID groups. This impacts user access to network resources where users may be inappropriately denied or allowed access to resources based on your existing Security Policy rules.</pre>"}]}],"x_affectedList":["PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 11.0","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1","PAN-OS 10.2.0","PAN-OS 10.2","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"11.1 All","status":"unaffected"},{"version":"9.1 All","status":"unaffected"},{"version":"9.0 All","status":"unaffected"},{"version":"11.0","status":"affected","lessThan":"11.0.3","versionType":"custom","changes":[{"at":"11.0.3","status":"unaffected"}]},{"version":"10.2","status":"affected","lessThan":"10.2.5","versionType":"custom","changes":[{"at":"10.2.5","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.11","versionType":"custom","changes":[{"at":"10.1.11","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2024-3383"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Rodgers Moore, CCIE# 8153 of Insight.com, for discovering and reporting this issue."}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"LOW","providerUrgency":"AMBER","baseSeverity":"HIGH","baseScore":8.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:D/RE:L/U:Amber"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-282: Improper Ownership Management","cweId":"CWE-282"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["PAN-211764","PAN-218522"],"discovery":"USER"},"configurations":[{"lang":"en","value":"This issue applies only to PAN-OS firewall configurations with Cloud Identity Engine (CIE) enabled. You should verify whether CIE is configured on your firewall web interface (Device > User Identification > Cloud Identity Engine).","supportingMedia":{"value":"This issue applies only to PAN-OS firewall configurations with Cloud Identity Engine (CIE) enabled. You should verify whether CIE is configured on your firewall web interface (Device > User Identification > Cloud Identity Engine).","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 10.1.11, PAN-OS 10.2.5, PAN-OS 11.0.3, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 10.1.11, PAN-OS 10.2.5, PAN-OS 11.0.3, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2024-04-10T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2024-3385","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2024-04-10T00:00:00","dateReserved":"2024-04-10T00:00:00","dateUpdated":"2024-04-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Firewall Denial of Service (DoS) when GTP Security is Disabled","datePublic":"2024-04-10T16:00:00.000Z","providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2024-04-10T17:06:28.153Z"},"descriptions":[{"lang":"en","value":"A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.\n\nThis affects the following hardware firewall models:\n- PA-5400 Series firewalls\n- PA-7000 Series firewalls","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.\n\nThis affects the following hardware firewall models:\n- PA-5400 Series firewalls\n- PA-7000 Series firewalls</pre>"}]}],"x_affectedList":["PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 11.0","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6","PAN-OS 10.2.5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1","PAN-OS 10.2.0","PAN-OS 10.2","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 9.1.16-h3","PAN-OS 9.1.16-h2","PAN-OS 9.1.16-h1","PAN-OS 9.1.16","PAN-OS 9.1.15-h1","PAN-OS 9.1.15","PAN-OS 9.1.14-h7","PAN-OS 9.1.14-h6","PAN-OS 9.1.14-h5","PAN-OS 9.1.14-h4","PAN-OS 9.1.14-h3","PAN-OS 9.1.14-h2","PAN-OS 9.1.14-h1","PAN-OS 9.1.14","PAN-OS 9.1.13-h4","PAN-OS 9.1.13-h3","PAN-OS 9.1.13-h2","PAN-OS 9.1.13-h1","PAN-OS 9.1.13","PAN-OS 9.1.12-h6","PAN-OS 9.1.12-h5","PAN-OS 9.1.12-h4","PAN-OS 9.1.12-h3","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h4","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.16-h5","PAN-OS 9.0.16-h4","PAN-OS 9.0.16-h3","PAN-OS 9.0.16-h2","PAN-OS 9.0.16-h1","PAN-OS 9.0.16","PAN-OS 9.0.15","PAN-OS 9.0.14-h4","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"11.1 All","status":"unaffected"},{"version":"9.0","status":"affected","lessThan":"9.0.17-h4","versionType":"custom","changes":[{"at":"9.0.17-h4","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.17","versionType":"custom","changes":[{"at":"9.1.17","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.12","versionType":"custom","changes":[{"at":"10.1.12","status":"unaffected"}]},{"version":"10.2","status":"affected","lessThan":"10.2.8","versionType":"custom","changes":[{"at":"10.2.8","status":"unaffected"}]},{"version":"11.0","status":"affected","lessThan":"11.0.3","versionType":"custom","changes":[{"at":"11.0.3","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2024-3385"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks an external reporter for discovering and reporting this issue."}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"LOW","providerUrgency":"AMBER","baseSeverity":"HIGH","baseScore":8.2,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:D/RE:L/U:Amber"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]},{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-476: NULL Pointer Dereference","cweId":"CWE-476"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["PAN-221224"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This does not affect VM-Series firewalls, CN-Series firewalls, Cloud NGFWs, or Prisma Access.\n\nThis issue affects only PAN-OS configurations with GTP Security disabled; it does not affect PAN-OS configurations that have GTP Security enabled. You should verify whether GTP Security is disabled by checking your firewall web interface (Device > Setup > Management > General Settings) and take the appropriate actions as needed.","supportingMedia":{"value":"This does not affect VM-Series firewalls, CN-Series firewalls, Cloud NGFWs, or Prisma Access.\n\nThis issue affects only PAN-OS configurations with GTP Security disabled; it does not affect PAN-OS configurations that have GTP Security enabled. You should verify whether GTP Security is disabled by checking your firewall web interface (Device > Setup > Management > General Settings) and take the appropriate actions as needed.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 94993 (introduced in Applications and Threats content version 8832).","supportingMedia":{"value":"Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 94993 (introduced in Applications and Threats content version 8832).","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue. This was encountered by two customers in normal production usage.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue. This was encountered by two customers in normal production usage.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.12, PAN-OS 10.2.8, PAN-OS 11.0.3, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.12, PAN-OS 10.2.8, PAN-OS 11.0.3, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2024-04-10T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2024-3384","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2024-04-10T00:00:00","dateReserved":"2024-04-10T00:00:00","dateUpdated":"2024-04-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Firewall Denial of Service (DoS) via Malformed NTLM Packets","datePublic":"2024-04-10T16:00:00.000Z","providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2024-04-10T17:06:21.704Z"},"descriptions":[{"lang":"en","value":"A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN Manager (NTLM) packets from Windows servers. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN Manager (NTLM) packets from Windows servers. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.</pre>"}]}],"x_affectedList":["PAN-OS 10.0.11-h3","PAN-OS 10.0.11-h2","PAN-OS 10.0.11-h1","PAN-OS 10.0.11","PAN-OS 10.0.10-h1","PAN-OS 10.0.10","PAN-OS 10.0.9","PAN-OS 10.0.8-h10","PAN-OS 10.0.8-h9","PAN-OS 10.0.8-h8","PAN-OS 10.0.8-h7","PAN-OS 10.0.8-h6","PAN-OS 10.0.8-h5","PAN-OS 10.0.8-h4","PAN-OS 10.0.8-h3","PAN-OS 10.0.8-h2","PAN-OS 10.0.8-h1","PAN-OS 10.0.8","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.15","PAN-OS 9.1.14-h7","PAN-OS 9.1.14-h6","PAN-OS 9.1.14-h5","PAN-OS 9.1.14-h4","PAN-OS 9.1.14-h3","PAN-OS 9.1.14-h2","PAN-OS 9.1.14-h1","PAN-OS 9.1.14","PAN-OS 9.1.13-h4","PAN-OS 9.1.13-h3","PAN-OS 9.1.13-h2","PAN-OS 9.1.13-h1","PAN-OS 9.1.13","PAN-OS 9.1.12-h6","PAN-OS 9.1.12-h5","PAN-OS 9.1.12-h4","PAN-OS 9.1.12-h3","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h4","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.16-h5","PAN-OS 9.0.16-h4","PAN-OS 9.0.16-h3","PAN-OS 9.0.16-h2","PAN-OS 9.0.16-h1","PAN-OS 9.0.16","PAN-OS 9.0.15","PAN-OS 9.0.14-h4","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.23-h1","PAN-OS 8.1.23","PAN-OS 8.1.22","PAN-OS 8.1.21-h1","PAN-OS 8.1.21","PAN-OS 8.1.20-h1","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.1 All","status":"unaffected"},{"version":"10.2 All","status":"unaffected"},{"version":"11.0 All","status":"unaffected"},{"version":"11.1 All","status":"unaffected"},{"version":"8.1","status":"affected","lessThan":"8.1.24","versionType":"custom","changes":[{"at":"8.1.24","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.17","versionType":"custom","changes":[{"at":"9.0.17","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.15-h1","versionType":"custom","changes":[{"at":"9.1.15-h1","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.12","versionType":"custom","changes":[{"at":"10.0.12","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2024-3384"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks rqu for discovering and reporting this issue."}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","baseSeverity":"HIGH","baseScore":8.2,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-1286 Improper Validation of Syntactic Correctness of Input","cweId":"CWE-1286"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["PAN-198992"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This issue affects only PAN-OS configurations with NTLM authentication enabled. You should verify whether NTLM authentication is enabled by checking your firewall web interface (Device > User Identification > User Mapping > Palo Alto Networks User-ID Agent Setup > NTLM).","supportingMedia":{"value":"This issue affects only PAN-OS configurations with NTLM authentication enabled. You should verify whether NTLM authentication is enabled by checking your firewall web interface (Device > User Identification > User Mapping > Palo Alto Networks User-ID Agent Setup > NTLM).","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.15-h1, PAN-OS 10.0.12, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.15-h1, PAN-OS 10.0.12, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2024-04-10T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-6790","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2023-12-13T00:00:00","dateReserved":"2023-12-13T00:00:00","dateUpdated":"2023-12-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: DOM-Based Cross-Site Scripting (XSS) Vulnerability in the Web Interface","datePublic":"2023-12-13T17:00:00.000Z","providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2023-12-13T18:15:48.142Z"},"descriptions":[{"lang":"en","value":"A DOM-Based cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to execute a JavaScript payload in the context of an administrator’s browser when they view a specifically crafted link to the PAN-OS web interface.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A DOM-Based cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to execute a JavaScript payload in the context of an administrator’s browser when they view a specifically crafted link to the PAN-OS web interface.</pre>"}]}],"x_affectedList":["PAN-OS 11.0.0","PAN-OS 11.0","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1","PAN-OS 10.2.0","PAN-OS 10.2","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.11-h1","PAN-OS 10.0.11","PAN-OS 10.0.10","PAN-OS 10.0.9","PAN-OS 10.0.8-h8","PAN-OS 10.0.8-h7","PAN-OS 10.0.8-h6","PAN-OS 10.0.8-h5","PAN-OS 10.0.8-h4","PAN-OS 10.0.8-h3","PAN-OS 10.0.8-h2","PAN-OS 10.0.8-h1","PAN-OS 10.0.8","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.15-h1","PAN-OS 9.1.15","PAN-OS 9.1.14-h4","PAN-OS 9.1.14-h3","PAN-OS 9.1.14-h2","PAN-OS 9.1.14-h1","PAN-OS 9.1.14","PAN-OS 9.1.13-h3","PAN-OS 9.1.13-h2","PAN-OS 9.1.13-h1","PAN-OS 9.1.13","PAN-OS 9.1.12-h3","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.16-h3","PAN-OS 9.0.16-h2","PAN-OS 9.0.16-h1","PAN-OS 9.0.16","PAN-OS 9.0.15","PAN-OS 9.0.14-h4","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.24-h1","PAN-OS 8.1.24","PAN-OS 8.1.23-h1","PAN-OS 8.1.23","PAN-OS 8.1.22","PAN-OS 8.1.21-h1","PAN-OS 8.1.21","PAN-OS 8.1.20-h1","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","Cloud NGFW"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"11.1 All","status":"unaffected"},{"version":"8.1","status":"affected","lessThan":"8.1.25","versionType":"custom","changes":[{"at":"8.1.25","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.17","versionType":"custom","changes":[{"at":"9.0.17","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.16","versionType":"custom","changes":[{"at":"9.1.16","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.9","versionType":"custom","changes":[{"at":"10.1.9","status":"unaffected"}]},{"version":"10.2","status":"affected","lessThan":"10.2.4","versionType":"custom","changes":[{"at":"10.2.4","status":"unaffected"}]},{"version":"11.0","status":"affected","lessThan":"11.0.1","versionType":"custom","changes":[{"at":"11.0.1","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.12","versionType":"custom","changes":[{"at":"10.0.12","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2023-3284"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Kajetan Rostojek for discovering and reporting this issue."}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"ACTIVE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"AUTOMATIC","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"LOW","providerUrgency":"AMBER","baseSeverity":"HIGH","baseScore":7.5,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/AU:Y/R:A/V:D/RE:L/U:Amber"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","cweId":"CWE-79"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["PAN-193367"],"discovery":"EXTERNAL"},"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.25, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.12, PAN-OS 10.1.9, PAN-OS 10.2.4, PAN-OS 11.0.1, and all later PAN-OS versions.\n\nPlease note that customers impacted by the PAN-OS root and default certificate expiration issue must carefully select the fixed version of PAN-OS they upgrade their devices to when addressing this vulnerability to not reintroduce the certificate issue. More information and support for the certificate expiration issue in PAN-OS is available at https://live.paloaltonetworks.com/t5/customer-advisories/emergency-update-required-pan-os-root-and-default-certificate/ta-p/564672.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.25, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.12, PAN-OS 10.1.9, PAN-OS 10.2.4, PAN-OS 11.0.1, and all later PAN-OS versions.\n\nPlease note that customers impacted by the PAN-OS root and default certificate expiration issue must carefully select the fixed version of PAN-OS they upgrade their devices to when addressing this vulnerability to not reintroduce the certificate issue. More information and support for the certificate expiration issue in PAN-OS is available at https://live.paloaltonetworks.com/t5/customer-advisories/emergency-update-required-pan-os-root-and-default-certificate/ta-p/564672.","type":"text/html","base64":false}}],"timeline":[{"time":"2023-12-13T17:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-38802","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2023-09-13T16:00:00.000Z","dateReserved":"2023-09-13T16:00:00.000Z","dateUpdated":"2024-01-18T00:00:00.000000Z"},"containers":{"cna":{"title":" PAN-OS: Denial-of-Service (DoS) Vulnerability in BGP Software","datePublic":"2023-09-13T16:00:00.000Z","providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2023-11-15T05:07:02.171314"},"descriptions":[{"lang":"en","value":"BGP software such as FRRouting FRR included as part of the PAN-OS, Prisma SD-WAN ION, and Prisma Access routing features enable a remote attacker to incorrectly reset network sessions though an invalid BGP update. This issue is applicable only to devices and appliances with BGP routing features enabled.\n\nThis issue requires the remote attacker to control at least one established BGP session that is propagated to the router to exploit it. The denial-of-service (DoS) impact on the network is dependent on the network's architecture and fault tolerant design.\n\nPrisma Access ‘Security Processing Node Endpoint Remote Network (SP-RN/Branches)' and 'Service Connections (SCs/CANs)' nodes do not peer with the Internet and do not receive Internet routes directly unless explicitly configured by the customer. Prisma Access Nodes are commonly protected by unaffected customer-premise equipment (CPE router devices). Hence the impact of this issue on Prisma Access is limited.\n\nFurther details about this issue can be found at: https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>BGP software such as FRRouting FRR included as part of the PAN-OS, Prisma SD-WAN ION, and Prisma Access routing features enable a remote attacker to incorrectly reset network sessions though an invalid BGP update. This issue is applicable only to devices and appliances with BGP routing features enabled.\n\nThis issue requires the remote attacker to control at least one established BGP session that is propagated to the router to exploit it. The denial-of-service (DoS) impact on the network is dependent on the network's architecture and fault tolerant design.\n\nPrisma Access ‘Security Processing Node Endpoint Remote Network (SP-RN/Branches)' and 'Service Connections (SCs/CANs)' nodes do not peer with the Internet and do not receive Internet routes directly unless explicitly configured by the customer. Prisma Access Nodes are commonly protected by unaffected customer-premise equipment (CPE router devices). Hence the impact of this issue on Prisma Access is limited.\n\nFurther details about this issue can be found at: https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling\n</pre>"}]}],"x_affectedList":["Prisma SD-WAN ION 6.2","Prisma SD-WAN ION 6.1","Prisma Access","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0","PAN-OS 11.0","PAN-OS 10.2.5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1","PAN-OS 10.2.0","PAN-OS 10.2","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 9.1.16-h2","PAN-OS 9.1.16-h1","PAN-OS 9.1.16","PAN-OS 9.1.15-h1","PAN-OS 9.1.15","PAN-OS 9.1.14-h4","PAN-OS 9.1.14-h3","PAN-OS 9.1.14-h2","PAN-OS 9.1.14-h1","PAN-OS 9.1.14","PAN-OS 9.1.13-h3","PAN-OS 9.1.13-h2","PAN-OS 9.1.13-h1","PAN-OS 9.1.13","PAN-OS 9.1.12-h3","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"11.0","status":"affected","lessThan":"11.0.3","versionType":"custom","changes":[{"at":"11.0.3","status":"unaffected"}]},{"version":"10.2","status":"affected","lessThan":"10.2.6","versionType":"custom","changes":[{"at":"10.2.6","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.11","versionType":"custom","changes":[{"at":"10.1.11","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.16-h3","versionType":"custom","changes":[{"at":"9.1.16-h3","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.26","versionType":"custom","changes":[{"at":"8.1.26","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.17-h4","versionType":"custom","changes":[{"at":"9.0.17-h4","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"Customers whose most recent software upgrade was before 09/30","status":"affected"},{"version":"Customers who have received a software upgrade or are using new software on or after 09/30","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Prisma SD-WAN ION","versions":[{"version":"5.6 All","status":"unaffected"},{"version":"6.1","status":"affected","lessThan":"6.1.5","versionType":"custom","changes":[{"at":"6.1.5","status":"unaffected"}]},{"version":"6.2","status":"affected","lessThan":"6.2.3","versionType":"custom","changes":[{"at":"6.2.3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2023-38802"},{"tags":["x_refsource_CONFIRM"],"url":"https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Ben Cartwright-Cox for discovering this issue in BGP implementations."}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"AUTOMATIC","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"LOW","providerUrgency":"AMBER","baseSeverity":"HIGH","baseScore":8.2,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:Y/R:A/V:C/RE:L/U:Amber"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions","cweId":"CWE-754"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["PAN-227523"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only to devices and appliances that are configured with BGP routing features enabled. You can verify whether BGP is enabled for a router by selecting it from 'Network > Virtual Routers’ or 'Network > Logical Routers’ in the web interface of PAN-OS firewalls.\n\nTo exploit this issue, the remote attacker must control at least one established BGP session that is propagated to the router.","supportingMedia":{"value":"This issue is applicable only to devices and appliances that are configured with BGP routing features enabled. You can verify whether BGP is enabled for a router by selecting it from 'Network > Virtual Routers’ or 'Network > Logical Routers’ in the web interface of PAN-OS firewalls.\n\nTo exploit this issue, the remote attacker must control at least one established BGP session that is propagated to the router.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"You can prevent exploitation of this issue by inserting an unaffected BGP router—configured to drop the invalid BGP update instead of propagating it—between the attacker-originated BGP update and PAN-OS, Prisma SD-WAN ION, and Prisma Access devices. This stops the invalid BGP update from reaching the affected router.","supportingMedia":{"value":"You can prevent exploitation of this issue by inserting an unaffected BGP router—configured to drop the invalid BGP update instead of propagating it—between the attacker-originated BGP update and PAN-OS, Prisma SD-WAN ION, and Prisma Access devices. This stops the invalid BGP update from reaching the affected router.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue targeting our customers. However, knowledge of invalid BGP attributes that trigger this issue is publicly available.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue targeting our customers. However, knowledge of invalid BGP attributes that trigger this issue is publicly available.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.26, PAN-OS 9.0.17-h4, PAN-OS 9.1.16-h3, PAN-OS 10.1.11, PAN-OS 10.2.6, PAN-OS 11.0.3, and all later PAN-OS versions.\n\nThis issue is fixed in Prisma SD-WAN ION 6.1.5, Prisma SD-WAN ION 6.2.3, and all later Prisma SD-WAN ION versions. This issue does not impact Prisma SD-WAN ION 5.6 versions.\n\nFor Prisma Access customers, the upgrade to fix this issue will be available on 09/30. Customers should work with their Prisma Access contacts and support to secure a maintenance window for the on-demand software upgrade.\n\nPlease note that full Prisma Access data plane upgrades scheduled on and after 09/30 will have this fix incorporated by default. No additional action is necessary for these customers to remediate this issue.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.26, PAN-OS 9.0.17-h4, PAN-OS 9.1.16-h3, PAN-OS 10.1.11, PAN-OS 10.2.6, PAN-OS 11.0.3, and all later PAN-OS versions.\n\nThis issue is fixed in Prisma SD-WAN ION 6.1.5, Prisma SD-WAN ION 6.2.3, and all later Prisma SD-WAN ION versions. This issue does not impact Prisma SD-WAN ION 5.6 versions.\n\nFor Prisma Access customers, the upgrade to fix this issue will be available on 09/30. Customers should work with their Prisma Access contacts and support to secure a maintenance window for the on-demand software upgrade.\n\nPlease note that full Prisma Access data plane upgrades scheduled on and after 09/30 will have this fix incorporated by default. No additional action is necessary for these customers to remediate this issue.","type":"text/html","base64":false}}],"timeline":[{"time":"2023-12-13T17:00:00.000Z","lang":"eng","value":"Updated the ETA for the fix in Prisma SD-WAN ION 6.2"},{"time":"2023-12-09T00:00:00.000Z","lang":"eng","value":"Updated availability of the fix in PAN-OS 8.1.26 and PAN-OS 9.0.17-h4"},{"time":"2023-11-08T17:00:00.000Z","lang":"eng","value":"Updated availability of the fix in PAN-OS 11.0.3 and added CVSS 4.0 scoring"},{"time":"2023-11-08T17:00:00.000Z","lang":"eng","value":"A fix for this issue is being developed for PAN-OS 8.1 and PAN-OS 9.0"},{"time":"2023-11-02T21:05:00.000Z","lang":"eng","value":"Updated the ETA for the fix in PAN-OS 11.0.3"},{"time":"2023-10-24T02:20:00.000Z","lang":"eng","value":"Updated availability of the fix in Prisma SD-WAN ION 6.1.5"},{"time":"2023-10-16T16:15:00.000Z","lang":"eng","value":"Updated the ETA for the fix in Prisma SD-WAN ION 6.1"},{"time":"2023-10-11T16:00:00.000Z","lang":"eng","value":"Updated the ETA for the fix in PAN-OS 11.0.3"},{"time":"2023-10-04T02:05:00.000Z","lang":"eng","value":"Updated availability of the fix in PAN-OS 9.1.16-h3"},{"time":"2023-09-28T04:45:00.000Z","lang":"eng","value":"Updated availability of the fix in PAN-OS 10.1.11 and 10.2.6"},{"time":"2023-09-22T00:02:00.000Z","lang":"eng","value":"Updated guidance for Prisma Access customers"},{"time":"2023-09-16T00:34:00.000Z","lang":"eng","value":"Prisma SD-WAN ION is confirmed to be impacted"},{"time":"2023-09-15T01:00:00.000Z","lang":"eng","value":"The impact of this issue is under investigation for Prisma Access"},{"time":"2023-09-13T16:00:00.000Z","lang":"eng","value":"Initial Publication"},{"time":"2024-01-18T18:00:00.000Z","lang":"eng","value":"Updated availability of the fix in Prisma SD-WAN ION 6.2.3"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-0030","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2022-10-12T00:00:00","dateReserved":"2022-10-12T00:00:00","dateUpdated":"2022-10-12T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Authentication Bypass in Web Interface","datePublic":"2022-10-12T16:00:00.000Z","providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2022-10-12T00:00:00"},"descriptions":[{"lang":"en","value":"An authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface allows a network-based attacker with specific knowledge of the target firewall or Panorama appliance to impersonate an existing PAN-OS administrator and perform privileged actions.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface allows a network-based attacker with specific knowledge of the target firewall or Panorama appliance to impersonate an existing PAN-OS administrator and perform privileged actions.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.23-h1","PAN-OS 8.1.23","PAN-OS 8.1.22","PAN-OS 8.1.21-h1","PAN-OS 8.1.21","PAN-OS 8.1.20-h1","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0 All","status":"unaffected"},{"version":"9.1 All","status":"unaffected"},{"version":"10.1 All","status":"unaffected"},{"version":"10.2 All","status":"unaffected"},{"version":"10.0 All","status":"unaffected"},{"version":"8.1","status":"affected","lessThan":"8.1.24","versionType":"custom","changes":[{"at":"8.1.24","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2022-0030"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks the security researcher that discovered and reported this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-290 Authentication Bypass by Spoofing","cweId":"CWE-290"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-195571"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Customers with a Threat Prevention subscription can block known attacks for this vulnerability by enabling Threat ID 92720 (Applications and Threats content update 8630-7638).\n\nTo exploit this issue, the attacker must have network access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices.","supportingMedia":{"value":"Customers with a Threat Prevention subscription can block known attacks for this vulnerability by enabling Threat ID 92720 (Applications and Threats content update 8630-7638).\n\nTo exploit this issue, the attacker must have network access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.24 and all later PAN-OS versions.\n\nPlease note that PAN-OS 8.1 has reached its software end-of-life (EoL) and is supported only on PA-200, PA-500, and PA-5000 Series firewalls and on M-100 appliances and only until each of their respective hardware EoL dates:  https://www.paloaltonetworks.com/services/support/end-of-life-announcements/hardware-end-of-life-dates.html.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.24 and all later PAN-OS versions.\n\nPlease note that PAN-OS 8.1 has reached its software end-of-life (EoL) and is supported only on PA-200, PA-500, and PA-5000 Series firewalls and on M-100 appliances and only until each of their respective hardware EoL dates:  https://www.paloaltonetworks.com/services/support/end-of-life-announcements/hardware-end-of-life-dates.html.","type":"text/html","base64":false}}],"timeline":[{"time":"2022-10-12T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-0028","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2022-08-10T00:00:00","dateReserved":"2022-08-10T00:00:00","dateUpdated":"2022-08-19T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Reflected Amplification Denial-of-Service (DoS) Vulnerability in URL Filtering","datePublic":"2022-08-10T16:00:00.000Z","providerMetadata":{"dateUpdated":"2022-08-10T16:00:16","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series (virtual) and CN-Series (container) firewall against an attacker-specified target.\n\nTo be misused by an external attacker, the firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a security rule with a source zone that has an external facing network interface. This configuration is not typical for URL filtering and, if set, is likely unintended by the administrator.\n\nIf exploited, this issue would not impact the confidentiality, integrity, or availability of our products. However, the resulting denial-of-service (DoS) attack may help obfuscate the identity of the attacker and implicate the firewall as the source of the attack.\n\nWe have taken prompt action to address this issue in our PAN-OS software. All PAN-OS software updates for this issue are now available. This issue does not impact Panorama M-Series or Panorama virtual appliances.\n\nThis issue has been resolved for all Cloud NGFW and Prisma Access customers and no additional action is required from them.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series (virtual) and CN-Series (container) firewall against an attacker-specified target.\n\nTo be misused by an external attacker, the firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a security rule with a source zone that has an external facing network interface. This configuration is not typical for URL filtering and, if set, is likely unintended by the administrator.\n\nIf exploited, this issue would not impact the confidentiality, integrity, or availability of our products. However, the resulting denial-of-service (DoS) attack may help obfuscate the identity of the attacker and implicate the firewall as the source of the attack.\n\nWe have taken prompt action to address this issue in our PAN-OS software. All PAN-OS software updates for this issue are now available. This issue does not impact Panorama M-Series or Panorama virtual appliances.\n\nThis issue has been resolved for all Cloud NGFW and Prisma Access customers and no additional action is required from them.</pre>"}]}],"x_affectedList":["PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1","PAN-OS 10.2.0","PAN-OS 10.2","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.11","PAN-OS 10.0.10","PAN-OS 10.0.9","PAN-OS 10.0.8-h8","PAN-OS 10.0.8-h7","PAN-OS 10.0.8-h6","PAN-OS 10.0.8-h5","PAN-OS 10.0.8-h4","PAN-OS 10.0.8-h3","PAN-OS 10.0.8-h2","PAN-OS 10.0.8-h1","PAN-OS 10.0.8","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.14-h3","PAN-OS 9.1.14-h2","PAN-OS 9.1.14-h1","PAN-OS 9.1.14","PAN-OS 9.1.13-h3","PAN-OS 9.1.13-h2","PAN-OS 9.1.13-h1","PAN-OS 9.1.13","PAN-OS 9.1.12-h3","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.16-h2","PAN-OS 9.0.16-h1","PAN-OS 9.0.16","PAN-OS 9.0.15","PAN-OS 9.0.14-h4","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.23","PAN-OS 8.1.22","PAN-OS 8.1.21-h1","PAN-OS 8.1.21","PAN-OS 8.1.20-h1","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.23-h1","versionType":"custom","changes":[{"at":"8.1.23-h1","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.16-h3","versionType":"custom","changes":[{"at":"9.0.16-h3","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.14-h4","versionType":"custom","changes":[{"at":"9.1.14-h4","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.11-h1","versionType":"custom","changes":[{"at":"10.0.11-h1","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.6-h6","versionType":"custom","changes":[{"at":"10.1.6-h6","status":"unaffected"}]},{"version":"10.2","status":"affected","lessThan":"10.2.2-h2","versionType":"custom","changes":[{"at":"10.2.2-h2","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"2.1 All","status":"unaffected"},{"version":"2.2 All","status":"unaffected"},{"version":"3.0 All","status":"unaffected"},{"version":"3.1 All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2022-0028"}],"credits":[{"lang":"en","value":"This issue was responsibly reported to Palo Alto Networks by Excellium-Services S.A. CSIRT, CERT-XLM."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":8.6,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-406 Insufficient Control of Network Message Volume (Network Amplification)","cweId":"CWE-406"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-192999"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"The firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a security rule with a source zone that has an external facing interface for this issue to be misused by an external attacker. This configuration is not typical for URL filtering and is likely unintended by the administrator.\n\nThis issue is applicable to PA-Series (hardware), VM-Series (virtual), and CN-Series (container) firewalls only when all three of the following conditions are true:\n\n1. The security policy on the firewall that allows traffic to pass from Zone A to Zone B includes a URL filtering profile with one or more blocked categories;\nAND\n2. Packet-based attack protection is not enabled in a Zone Protection profile for Zone A including both (Packet Based Attack Protection > TCP Drop > TCP Syn With Data) and (Packet Based Attack Protection > TCP Drop > Strip TCP Options > TCP Fast Open);\nAND\n3. Flood protection through SYN cookies is not enabled in a Zone Protection profile for Zone A (Flood Protection > SYN > Action > SYN Cookie) with an activation threshold of 0 connections.","supportingMedia":{"value":"The firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a security rule with a source zone that has an external facing interface for this issue to be misused by an external attacker. This configuration is not typical for URL filtering and is likely unintended by the administrator.\n\nThis issue is applicable to PA-Series (hardware), VM-Series (virtual), and CN-Series (container) firewalls only when all three of the following conditions are true:\n\n1. The security policy on the firewall that allows traffic to pass from Zone A to Zone B includes a URL filtering profile with one or more blocked categories;\nAND\n2. Packet-based attack protection is not enabled in a Zone Protection profile for Zone A including both (Packet Based Attack Protection > TCP Drop > TCP Syn With Data) and (Packet Based Attack Protection > TCP Drop > Strip TCP Options > TCP Fast Open);\nAND\n3. Flood protection through SYN cookies is not enabled in a Zone Protection profile for Zone A (Flood Protection > SYN > Action > SYN Cookie) with an activation threshold of 0 connections.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"If you have a URL filtering policy with one or more blocked categories assigned to a security rule with a source zone that has an external facing interface, removing this configuration will prevent this issue from being exploited by remote attackers to conduct reflected DoS.\n\nTo prevent denial-of-service (DoS) attacks resulting from this issue from all sources, you can configure your Palo Alto Networks firewalls by enabling one of two zone protection mitigations on all Security zones with an assigned Security policy that includes a URL filtering profile:\n\n1. Packet-based attack protection including both (Packet Based Attack Protection > TCP Drop > TCP SYN with Data) and (Packet Based Attack Protection > TCP Drop > Strip TCP Options > TCP Fast Open);\nOR\n2. Flood protection (Flood Protection > SYN > Action > SYN Cookie) with an activation threshold of 0 connections.\n\nNOTES:\nIt is not necessary nor advantageous to apply both the attack and flood protections. \n(Palo Alto Networks Aporeto software only) You should not enable either of these protections if using Aporeto software; instead, wait for and install a fixed version of PAN-OS software.\n\nPacket-Based Attack Protection Workaround (Recommended)\n\nFollow the technical documentation to configure packet-based attack protection options for all defined Security zones with URL filtering enabled in the Security profile for that zone:\nhttps://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/zone-protection-and-dos-protection/configure-zone-protection-to-increase-network-security/configure-packet-based-attack-protection\n\nThe packet-based attack protection workaround will prevent the firewall from establishing TCP sessions in impacted zones when the TCP SYN packet contains data in the three-way handshake for a TCP session. Please note that this workaround may disrupt applications that use TCP Fast Open in the zone.\n\nFlood Protection (Alternate) Workaround\n\nIf you instead decide to enable the flood protection workaround, first make sure you understand how  enabling SYN cookies will change traffic flow in the impacted zones:\nhttps://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/zone-protection-and-dos-protection/zone-defense/zone-protection-profiles/flood-protection","supportingMedia":{"value":"If you have a URL filtering policy with one or more blocked categories assigned to a security rule with a source zone that has an external facing interface, removing this configuration will prevent this issue from being exploited by remote attackers to conduct reflected DoS.\n\nTo prevent denial-of-service (DoS) attacks resulting from this issue from all sources, you can configure your Palo Alto Networks firewalls by enabling one of two zone protection mitigations on all Security zones with an assigned Security policy that includes a URL filtering profile:\n\n1. Packet-based attack protection including both (Packet Based Attack Protection > TCP Drop > TCP SYN with Data) and (Packet Based Attack Protection > TCP Drop > Strip TCP Options > TCP Fast Open);\nOR\n2. Flood protection (Flood Protection > SYN > Action > SYN Cookie) with an activation threshold of 0 connections.\n\nNOTES:\nIt is not necessary nor advantageous to apply both the attack and flood protections. \n(Palo Alto Networks Aporeto software only) You should not enable either of these protections if using Aporeto software; instead, wait for and install a fixed version of PAN-OS software.\n\nPacket-Based Attack Protection Workaround (Recommended)\n\nFollow the technical documentation to configure packet-based attack protection options for all defined Security zones with URL filtering enabled in the Security profile for that zone:\nhttps://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/zone-protection-and-dos-protection/configure-zone-protection-to-increase-network-security/configure-packet-based-attack-protection\n\nThe packet-based attack protection workaround will prevent the firewall from establishing TCP sessions in impacted zones when the TCP SYN packet contains data in the three-way handshake for a TCP session. Please note that this workaround may disrupt applications that use TCP Fast Open in the zone.\n\nFlood Protection (Alternate) Workaround\n\nIf you instead decide to enable the flood protection workaround, first make sure you understand how  enabling SYN cookies will change traffic flow in the impacted zones:\nhttps://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/zone-protection-and-dos-protection/zone-defense/zone-protection-profiles/flood-protection","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks recently learned that an attempted reflected denial-of-service (RDoS) attack was identified by a service provider. This attempted attack took advantage of susceptible firewalls from multiple vendors, including Palo Alto Networks. We immediately started to root cause and remediate this issue.\n\nExploitation of this issue does not impact the confidentiality, integrity, or availability of our products.\n","supportingMedia":{"value":"Palo Alto Networks recently learned that an attempted reflected denial-of-service (RDoS) attack was identified by a service provider. This attempted attack took advantage of susceptible firewalls from multiple vendors, including Palo Alto Networks. We immediately started to root cause and remediate this issue.\n\nExploitation of this issue does not impact the confidentiality, integrity, or availability of our products.\n","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"We identified workarounds to prevent the denial-of-service (DoS) attacks that result from this issue in certain Palo Alto Networks firewalls, with this policy configuration.\n\nThis issue is fixed in PAN-OS 8.1.23-h1, PAN-OS 9.0.16-h3, PAN-OS 9.1.14-h4, PAN-OS 10.0.11-h1, PAN-OS 10.1.6-h6, PAN-OS 10.2.2-h2, and all later PAN-OS versions for PA-Series, VM-Series and CN-Series firewalls.\n\nAll PAN-OS software updates for this issue are now available.","supportingMedia":{"value":"We identified workarounds to prevent the denial-of-service (DoS) attacks that result from this issue in certain Palo Alto Networks firewalls, with this policy configuration.\n\nThis issue is fixed in PAN-OS 8.1.23-h1, PAN-OS 9.0.16-h3, PAN-OS 9.1.14-h4, PAN-OS 10.0.11-h1, PAN-OS 10.1.6-h6, PAN-OS 10.2.2-h2, and all later PAN-OS versions for PA-Series, VM-Series and CN-Series firewalls.\n\nAll PAN-OS software updates for this issue are now available.","type":"text/html","base64":false}}],"timeline":[{"time":"2022-08-10T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2022-08-10T23:10:00.000Z","lang":"eng","value":"PAN-OS 10.1.6-h6 fixed version is now available. Updated ETA for PAN-OS 8.1.23-h1. Clarified URL filtering assignment language."},{"time":"2022-08-12T02:45:00.000Z","lang":"eng","value":"An update to the acknowledgements section of the advisory."},{"time":"2022-08-16T00:42:00.000Z","lang":"eng","value":"PAN-OS 8.1.23-h1 fixed version is now available."},{"time":"2022-08-18T23:38:00.000Z","lang":"eng","value":"PAN-OS 10.2.2-h2 fixed version is now available."},{"time":"2022-08-19T16:22:00.000Z","lang":"eng","value":"PAN-OS 9.0.16-h3, PAN-OS 9.1.14-h4, and PAN-OS 10.0.11-h1 fixed versions are now available."}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-0024","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2022-05-11T00:00:00","dateReserved":"2022-05-11T00:00:00","dateUpdated":"2022-05-11T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Improper Neutralization Vulnerability Leads to Unintended Program Execution During Configuration Commit","datePublic":"2022-05-11T16:00:00.000Z","providerMetadata":{"dateUpdated":"2022-05-11T16:30:22","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A vulnerability exists in Palo Alto Networks PAN-OS software that enables an authenticated network-based PAN-OS administrator to upload a specifically created configuration that disrupts system processes and potentially execute arbitrary code with root privileges when the configuration is committed on both hardware and virtual firewalls.\n\nThis issue does not impact Panorama appliances or Prisma Access customers.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists in Palo Alto Networks PAN-OS software that enables an authenticated network-based PAN-OS administrator to upload a specifically created configuration that disrupts system processes and potentially execute arbitrary code with root privileges when the configuration is committed on both hardware and virtual firewalls.\n\nThis issue does not impact Panorama appliances or Prisma Access customers.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.23;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.16;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.13;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.10;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.5.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.23;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.16;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.13;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.10;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.5.\n</pre>"}]}],"x_affectedList":["PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.9","PAN-OS 10.0.8-h8","PAN-OS 10.0.8-h7","PAN-OS 10.0.8-h6","PAN-OS 10.0.8-h5","PAN-OS 10.0.8-h4","PAN-OS 10.0.8-h3","PAN-OS 10.0.8-h2","PAN-OS 10.0.8-h1","PAN-OS 10.0.8","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.12-h3","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.15","PAN-OS 9.0.14-h4","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.22","PAN-OS 8.1.21-h1","PAN-OS 8.1.21","PAN-OS 8.1.20-h1","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.1","status":"affected","lessThan":"9.1.13","versionType":"custom","changes":[{"at":"9.1.13","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.5","versionType":"custom","changes":[{"at":"10.1.5","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.16","versionType":"custom","changes":[{"at":"9.0.16","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.23","versionType":"custom","changes":[{"at":"8.1.23","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.10","versionType":"custom","changes":[{"at":"10.0.10","status":"unaffected"}]},{"version":"10.2.0","status":"unaffected","lessThan":"10.2*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2022-0024"}],"credits":[{"lang":"en","value":" This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-138 Improper Neutralization of Special Elements","cweId":"CWE-138"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-177551"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue requires the attacker to have authenticated access to the PAN-OS management interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue requires the attacker to have authenticated access to the PAN-OS management interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.23, PAN-OS 9.0.16, PAN-OS 9.1.13, PAN-OS 10.0.10, PAN-OS 10.1.5, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.23, PAN-OS 9.0.16, PAN-OS 9.1.13, PAN-OS 10.0.10, PAN-OS 10.1.5, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2022-05-11T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-0778","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2022-03-31T00:00:00","dateReserved":"2022-03-31T00:00:00","dateUpdated":"2022-06-24T00:00:00.000000Z"},"containers":{"cna":{"title":"Impact of the OpenSSL Infinite Loop Vulnerability CVE-2022-0778","datePublic":"2022-03-31T02:30:00.000Z","providerMetadata":{"orgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","shortName":"openssl","dateUpdated":"2024-06-21T19:07:01.186352"},"descriptions":[{"lang":"en","value":"The Palo Alto Networks Product Security Assurance team has evaluated the OpenSSL infinite loop vulnerability (CVE-2022-0778) as it relates to our products.\n\nThis vulnerability causes the OpenSSL library to enter an infinite loop when parsing an invalid certificate and can result in a Denial-of-Service (DoS) to the application. An attacker does not need a verified certificate to exploit this vulnerability because parsing a bad certificate triggers the infinite loop before the verification process is completed.\n\nThe Prisma Cloud and Cortex XSOAR products are not impacted by this vulnerability. However, PAN-OS, GlobalProtect app, and Cortex XDR agent software contain a vulnerable version of the OpenSSL library and product availability is impacted by this vulnerability. For PAN-OS software, this includes both hardware and virtual firewalls and Panorama appliances as well as Prisma Access customers. This vulnerability has reduced severity on Cortex XDR agent and GlobalProtect app as successful exploitation requires a meddler-in-the-middle attack (MITM): 5.9 Medium (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).\n\nAll fixed versions of Cortex XDR agent, GlobalProtect app, and PAN-OS are now available.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The Palo Alto Networks Product Security Assurance team has evaluated the OpenSSL infinite loop vulnerability (CVE-2022-0778) as it relates to our products.\n\nThis vulnerability causes the OpenSSL library to enter an infinite loop when parsing an invalid certificate and can result in a Denial-of-Service (DoS) to the application. An attacker does not need a verified certificate to exploit this vulnerability because parsing a bad certificate triggers the infinite loop before the verification process is completed.\n\nThe Prisma Cloud and Cortex XSOAR products are not impacted by this vulnerability. However, PAN-OS, GlobalProtect app, and Cortex XDR agent software contain a vulnerable version of the OpenSSL library and product availability is impacted by this vulnerability. For PAN-OS software, this includes both hardware and virtual firewalls and Panorama appliances as well as Prisma Access customers. This vulnerability has reduced severity on Cortex XDR agent and GlobalProtect app as successful exploitation requires a meddler-in-the-middle attack (MITM): 5.9 Medium (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).\n\nAll fixed versions of Cortex XDR agent, GlobalProtect app, and PAN-OS are now available.</pre>"}]},{"lang":"en","value":"This issue impacts the following versions of PAN-OS:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.23;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.16-h2;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.13-h3;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.10;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.5-h1;\nPAN-OS 10.2 versions earlier than PAN-OS 10.2.1.\n\n\nThis issue impacts the following versions of GlobalProtect app:\nGlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.11;\nGlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.12;\nGlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.4;\nGlobalProtect app 6.0 versions earlier than GlobalProtect app 6.0.1 on Windows and macOS;\nGlobalProtect app 6.0 versions earlier than GlobalProtect app 6.0.2 on Android and iOS.\n\n\nThis issue impacts the following versions and builds of Cortex XDR agent:\nCortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9 hotfix build 6.1.9.61370 on Windows;\nCortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.7 hotfix build 6.1.7.1690 on macOS;\nCortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.7 hotfix build 6.1.7.60245 on Linux;\nAll versions and builds of Cortex XDR agent 7.4;\nCortex XDR agent 7.5-CE versions earlier than Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.60642 on Windows;\nCortex XDR agent 7.5-CE versions earlier than Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.2276 on macOS;\nCortex XDR agent 7.5-CE versions earlier than Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.59687 on Linux\nCortex XDR agent 7.5 versions earlier than Cortex XDR agent 7.5.3 build 7.5.3.60113 on Windows;\nCortex XDR agent 7.5 versions earlier than Cortex XDR agent 7.5.3 build 7.5.3.2265 on macOS;\nCortex XDR agent 7.5 versions earlier than Cortex XDR agent 7.5.3 build 7.5.3.59465 on Linux;\nCortex XDR agent 7.6 versions earlier than Cortex XDR agent 7.6.2 hotfix build 7.6.2.60545 on Windows;\nCortex XDR agent 7.6 versions earlier than Cortex XDR agent 7.6.2 hotfix build 7.6.2.2311 on macOS;\nCortex XDR agent 7.6 versions earlier than Cortex XDR agent 7.6.2 hotfix build 7.6.2.59612 on Linux;\nCortex XDR agent 7.7 versions earlier than Cortex XDR agent 7.7.0 hotfix build 7.7.0.60725 on Windows;\nCortex XDR agent 7.7 versions earlier than Cortex XDR agent 7.7.0 hotfix build 7.7.0.2356 on macOS;\nCortex XDR agent 7.7 versions earlier than Cortex XDR agent 7.7.0 hotfix build 7.7.0.59559 on Linux.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts the following versions of PAN-OS:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.23;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.16-h2;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.13-h3;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.10;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.5-h1;\nPAN-OS 10.2 versions earlier than PAN-OS 10.2.1.\n\n\nThis issue impacts the following versions of GlobalProtect app:\nGlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.11;\nGlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.12;\nGlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.4;\nGlobalProtect app 6.0 versions earlier than GlobalProtect app 6.0.1 on Windows and macOS;\nGlobalProtect app 6.0 versions earlier than GlobalProtect app 6.0.2 on Android and iOS.\n\n\nThis issue impacts the following versions and builds of Cortex XDR agent:\nCortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9 hotfix build 6.1.9.61370 on Windows;\nCortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.7 hotfix build 6.1.7.1690 on macOS;\nCortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.7 hotfix build 6.1.7.60245 on Linux;\nAll versions and builds of Cortex XDR agent 7.4;\nCortex XDR agent 7.5-CE versions earlier than Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.60642 on Windows;\nCortex XDR agent 7.5-CE versions earlier than Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.2276 on macOS;\nCortex XDR agent 7.5-CE versions earlier than Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.59687 on Linux\nCortex XDR agent 7.5 versions earlier than Cortex XDR agent 7.5.3 build 7.5.3.60113 on Windows;\nCortex XDR agent 7.5 versions earlier than Cortex XDR agent 7.5.3 build 7.5.3.2265 on macOS;\nCortex XDR agent 7.5 versions earlier than Cortex XDR agent 7.5.3 build 7.5.3.59465 on Linux;\nCortex XDR agent 7.6 versions earlier than Cortex XDR agent 7.6.2 hotfix build 7.6.2.60545 on Windows;\nCortex XDR agent 7.6 versions earlier than Cortex XDR agent 7.6.2 hotfix build 7.6.2.2311 on macOS;\nCortex XDR agent 7.6 versions earlier than Cortex XDR agent 7.6.2 hotfix build 7.6.2.59612 on Linux;\nCortex XDR agent 7.7 versions earlier than Cortex XDR agent 7.7.0 hotfix build 7.7.0.60725 on Windows;\nCortex XDR agent 7.7 versions earlier than Cortex XDR agent 7.7.0 hotfix build 7.7.0.2356 on macOS;\nCortex XDR agent 7.7 versions earlier than Cortex XDR agent 7.7.0 hotfix build 7.7.0.59559 on Linux.</pre>"}]},{"lang":"en","value":"This issue is addressed for Prisma Access customers in the Prisma Access patch rollout that will begin on May 7, 2022 and will be a phased rollout performed based on theaters. Palo Alto Networks will send an additional email notification through Prisma Access Insights one week before the rollout begins for affected tenant(s).","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue is addressed for Prisma Access customers in the Prisma Access patch rollout that will begin on May 7, 2022 and will be a phased rollout performed based on theaters. Palo Alto Networks will send an additional email notification through Prisma Access Insights one week before the rollout begins for affected tenant(s).</pre>"}]}],"x_affectedList":["Prisma Access 3.1","Prisma Access 3.0","Prisma Access 2.2","Prisma Access 2.1","PAN-OS 10.2.0","PAN-OS 10.2","PAN-OS 10.1.5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.9","PAN-OS 10.0.8-h8","PAN-OS 10.0.8-h7","PAN-OS 10.0.8-h6","PAN-OS 10.0.8-h5","PAN-OS 10.0.8-h4","PAN-OS 10.0.8-h3","PAN-OS 10.0.8-h2","PAN-OS 10.0.8-h1","PAN-OS 10.0.8","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.13-h2","PAN-OS 9.1.13-h1","PAN-OS 9.1.13","PAN-OS 9.1.12-h3","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.16-h1","PAN-OS 9.0.16","PAN-OS 9.0.15","PAN-OS 9.0.14-h4","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.22","PAN-OS 8.1.21-h1","PAN-OS 8.1.21","PAN-OS 8.1.20-h1","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","GlobalProtect App 6.0","GlobalProtect App 5.3","GlobalProtect App 5.2","GlobalProtect App 5.1","Cortex XDR Agent 7.7","Cortex XDR Agent 7.6","Cortex XDR Agent 7.5-CE","Cortex XDR Agent 7.5","Cortex XDR Agent 7.4","Cortex XDR Agent 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.23","versionType":"custom","changes":[{"at":"8.1.23","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.13-h3","versionType":"custom","changes":[{"at":"9.1.13-h3","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.10","versionType":"custom","changes":[{"at":"10.0.10","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.5-h1","versionType":"custom","changes":[{"at":"10.1.5-h1","status":"unaffected"}]},{"version":"10.2","status":"affected","lessThan":"10.2.1","versionType":"custom","changes":[{"at":"10.2.1","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.16-h2","versionType":"custom","changes":[{"at":"9.0.16-h2","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"2.1 Preferred, Innovation","status":"affected"},{"version":"2.2 Preferred","status":"affected"},{"version":"3.0 Preferred, Innovation","status":"affected"},{"version":"3.1 Preferred, Innovation","status":"affected"}]},{"vendor":"Palo Alto Networks","product":"GlobalProtect App","versions":[{"version":"6.0","status":"affected","lessThan":"6.0.1","versionType":"custom","changes":[{"at":"6.0.1","status":"unaffected"}]}],"platforms":["Windows and macOS"]},{"vendor":"Palo Alto Networks","product":"GlobalProtect App","versions":[{"version":"5.2","status":"affected","lessThan":"5.2.12","versionType":"custom","changes":[{"at":"5.2.12","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThan":"5.1.11","versionType":"custom","changes":[{"at":"5.1.11","status":"unaffected"}]},{"version":"5.3","status":"affected","lessThan":"5.3.4","versionType":"custom","changes":[{"at":"5.3.4","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"GlobalProtect App","versions":[{"version":"6.0","status":"affected","lessThan":"6.0.2","versionType":"custom","changes":[{"at":"6.0.2","status":"unaffected"}]}],"platforms":["Android and iOS"]},{"vendor":"Palo Alto Networks","product":"Cortex XSOAR","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Cortex XDR Agent","versions":[{"version":"7.4.*","status":"affected"}]},{"vendor":"Palo Alto Networks","product":"Cortex XDR Agent","versions":[{"version":"6.1","status":"affected","lessThan":"6.1.9.61370","versionType":"custom","changes":[{"at":"6.1.9.61370","status":"unaffected"}]},{"version":"7.5-CE","status":"affected","lessThan":"7.5.100.60642","versionType":"custom","changes":[{"at":"7.5.100.60642","status":"unaffected"}]},{"version":"7.5","status":"affected","lessThan":"7.5.3.60113","versionType":"custom","changes":[{"at":"7.5.3.60113","status":"unaffected"}]},{"version":"7.6","status":"affected","lessThan":"7.6.2.60545","versionType":"custom","changes":[{"at":"7.6.2.60545","status":"unaffected"}]},{"version":"7.7","status":"affected","lessThan":"7.7.0.60725","versionType":"custom","changes":[{"at":"7.7.0.60725","status":"unaffected"}]}],"platforms":["Windows"]},{"vendor":"Palo Alto Networks","product":"Cortex XDR Agent","versions":[{"version":"7.5","status":"affected","lessThan":"7.5.3.2265","versionType":"custom","changes":[{"at":"7.5.3.2265","status":"unaffected"}]},{"version":"7.6","status":"affected","lessThan":"7.6.2.2311","versionType":"custom","changes":[{"at":"7.6.2.2311","status":"unaffected"}]},{"version":"7.7","status":"affected","lessThan":"7.7.0.2356","versionType":"custom","changes":[{"at":"7.7.0.2356","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThan":"6.1.7.1690","versionType":"custom","changes":[{"at":"6.1.7.1690","status":"unaffected"}]},{"version":"7.5-CE","status":"affected","lessThan":"7.5.100.2276","versionType":"custom","changes":[{"at":"7.5.100.2276","status":"unaffected"}]}],"platforms":["macOS"]},{"vendor":"Palo Alto Networks","product":"Cortex XDR Agent","versions":[{"version":"7.5","status":"affected","lessThan":"7.5.3.59465","versionType":"custom","changes":[{"at":"7.5.3.59465","status":"unaffected"}]},{"version":"7.6","status":"affected","lessThan":"7.6.2.59612","versionType":"custom","changes":[{"at":"7.6.2.59612","status":"unaffected"}]},{"version":"7.7","status":"affected","lessThan":"7.7.0.59559","versionType":"custom","changes":[{"at":"7.7.0.59559","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThan":"6.1.7.60245","versionType":"custom","changes":[{"at":"6.1.7.60245","status":"unaffected"}]},{"version":"7.5-CE","status":"affected","lessThan":"7.5.100.59687","versionType":"custom","changes":[{"at":"7.5.100.59687","status":"unaffected"}]}],"platforms":["Linux"]},{"vendor":"Palo Alto Networks","product":"Prisma Cloud","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2022-0778"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.openssl.org/news/secadv/20220315.txt"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-834 Excessive Iteration","cweId":"CWE-834"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-190175","PAN-190223"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Customers with a Threat Prevention subscription can block known attacks for this vulnerability by enabling Threat IDs 92409 and 92411 (Applications and Threats content update 8552). This mitigation reduces the risk of exploitation from known exploits.\n\nCustomers will need to upgrade their products to a fixed version to completely remove the risk of this issue.\n","supportingMedia":{"value":"Customers with a Threat Prevention subscription can block known attacks for this vulnerability by enabling Threat IDs 92409 and 92411 (Applications and Threats content update 8552). This mitigation reduces the risk of exploitation from known exploits.\n\nCustomers will need to upgrade their products to a fixed version to completely remove the risk of this issue.\n","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue on any of our products.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue on any of our products.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.23, PAN-OS 9.0.16-h2, PAN-OS 9.1.13-h3, PAN-OS 10.0.10, PAN-OS 10.1.5-h1, PAN-OS 10.2.1, and all later PAN-OS versions.\n\nThis issue is fixed in GlobalProtect app 5.1.11, GlobalProtect app 5.2.12, GlobalProtect app 5.3.4, GlobalProtect app 6.0.1 on Window and macOS, GlobalProtect app 6.0.2 on Android and iOS, and all later GlobalProtect app versions.\n\nThis issue is fixed in Cortex XDR agent 6.1.9 hotfix build 6.1.9.61370 on Windows, Cortex XDR agent 6.1.7 hotfix build 6.1.7.1690 on macOS, Cortex XDR agent 6.1.7 hotfix build 6.1.7.60245 on Linux, Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.60642 on Windows, Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.2276 on macOS, Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.59687 on Linux, Cortex XDR agent 7.5.3 build 7.5.3.60113 on Windows, Cortex XDR agent 7.5.3 build 7.5.3.2265 on macOS, Cortex XDR agent 7.5.3 build 7.5.3.59465 on Linux, Cortex XDR agent 7.6.2 hotfix build 7.6.2.60545 on Windows, Cortex XDR agent 7.6.2 hotfix build 7.6.2.2311 on macOS, Cortex XDR agent 7.6.2 hotfix build 7.6.2.59612 hotfix on Linux, Cortex XDR agent 7.7.0 hotfix build 7.7.0.60725 on Windows, Cortex XDR agent 7.7.0 hotfix build 7.7.0.2356 on macOS, Cortex XDR agent 7.7.0 hotfix build 7.7.0.59559 on Linux, and all later versions and builds of Cortex XDR agent. Cortex XDR agent 7.4 is end-of-life on May 24, 2022 and is not expected to receive a fix for this issue.\n\nThis issue is addressed for Prisma Access customers in the Prisma Access patch rollout that will begin on May 7, 2022 and will be a phased rollout performed based on theaters. Palo Alto Networks will send an additional email notification through Prisma Access Insights one week before the rollout begins for affected tenant(s).","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.23, PAN-OS 9.0.16-h2, PAN-OS 9.1.13-h3, PAN-OS 10.0.10, PAN-OS 10.1.5-h1, PAN-OS 10.2.1, and all later PAN-OS versions.\n\nThis issue is fixed in GlobalProtect app 5.1.11, GlobalProtect app 5.2.12, GlobalProtect app 5.3.4, GlobalProtect app 6.0.1 on Window and macOS, GlobalProtect app 6.0.2 on Android and iOS, and all later GlobalProtect app versions.\n\nThis issue is fixed in Cortex XDR agent 6.1.9 hotfix build 6.1.9.61370 on Windows, Cortex XDR agent 6.1.7 hotfix build 6.1.7.1690 on macOS, Cortex XDR agent 6.1.7 hotfix build 6.1.7.60245 on Linux, Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.60642 on Windows, Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.2276 on macOS, Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.59687 on Linux, Cortex XDR agent 7.5.3 build 7.5.3.60113 on Windows, Cortex XDR agent 7.5.3 build 7.5.3.2265 on macOS, Cortex XDR agent 7.5.3 build 7.5.3.59465 on Linux, Cortex XDR agent 7.6.2 hotfix build 7.6.2.60545 on Windows, Cortex XDR agent 7.6.2 hotfix build 7.6.2.2311 on macOS, Cortex XDR agent 7.6.2 hotfix build 7.6.2.59612 hotfix on Linux, Cortex XDR agent 7.7.0 hotfix build 7.7.0.60725 on Windows, Cortex XDR agent 7.7.0 hotfix build 7.7.0.2356 on macOS, Cortex XDR agent 7.7.0 hotfix build 7.7.0.59559 on Linux, and all later versions and builds of Cortex XDR agent. Cortex XDR agent 7.4 is end-of-life on May 24, 2022 and is not expected to receive a fix for this issue.\n\nThis issue is addressed for Prisma Access customers in the Prisma Access patch rollout that will begin on May 7, 2022 and will be a phased rollout performed based on theaters. Palo Alto Networks will send an additional email notification through Prisma Access Insights one week before the rollout begins for affected tenant(s).","type":"text/html","base64":false}}],"timeline":[{"time":"2022-05-11T16:00:00.000Z","lang":"eng","value":"Cortex XDR agent fixes for Cortex XDR agent 6.1 and 7.5-CE are now available."},{"time":"2022-05-04T17:40:00.000Z","lang":"eng","value":"GlobalProtect app fixed version GlobalProtect app 6.0.1 is now available."},{"time":"2022-04-30T01:00:00.000Z","lang":"eng","value":"Updated fix information for Cortex XDR agent. New fix ETA for Prisma Access customers."},{"time":"2022-04-27T17:15:00.000Z","lang":"eng","value":"PAN-OS fixed version PAN-OS 8.1.23 is now available."},{"time":"2022-04-22T03:00:00.000Z","lang":"eng","value":"Added new Cortex XDR agent fix ETAs. Updated ETA for PAN-OS 8.1.23 fix."},{"time":"2022-04-20T17:00:00.000Z","lang":"eng","value":"Added new GlobalProtect app 5.3 fix ETA."},{"time":"2022-04-19T18:15:00.000Z","lang":"eng","value":"PAN-OS fixed version PAN-OS 10.2.1 is now available."},{"time":"2022-04-15T20:30:00.000Z","lang":"eng","value":"Added new GlobalProtect app fix ETAs."},{"time":"2022-04-12T23:45:00.000Z","lang":"eng","value":"PAN-OS fixed version PAN-OS 10.0.10 is now available."},{"time":"2022-04-12T01:00:00.000Z","lang":"eng","value":"PAN-OS fixed version PAN-OS 9.0.16-h2 is now available."},{"time":"2022-04-07T23:45:00.000Z","lang":"eng","value":"PAN-OS fixed versions PAN-OS 9.1.13-h3 and PAN-OS 10.1.5-h1 are now available."},{"time":"2022-04-06T18:00:00.000Z","lang":"eng","value":"Added new PAN-OS fix ETAs, available threat prevention signatures, and additional FAQ."},{"time":"2022-03-31T02:30:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2022-05-12T21:10:00.000Z","lang":"eng","value":"GlobalProtect app fixed version GlobalProtect app 5.1.11 is now available."},{"time":"2022-05-28T01:45:00.000Z","lang":"eng","value":"GlobalProtect app fixed version GlobalProtect app 5.2.12 is now available."},{"time":"2022-05-31T16:40:00.000Z","lang":"eng","value":"GlobalProtect app fixed version GlobalProtect app 5.3.4 is now available."},{"time":"2022-06-24T19:04:00.000Z","lang":"eng","value":"Fixed version clarification for GlobalProtect app on Android and iOS platforms."}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3058","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-11-10T00:00:00","dateReserved":"2021-11-10T00:00:00","dateUpdated":"2021-11-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS Command Injection Vulnerability in Web Interface XML API","datePublic":"2021-11-10T17:00:00.000Z","providerMetadata":{"dateUpdated":"2021-11-10T17:10:21","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permissions to use XML API the ability to execute arbitrary OS commands to escalate privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permissions to use XML API the ability to execute arbitrary OS commands to escalate privileges.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.3.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.3.</pre>"}]},{"lang":"en","value":"This issue does not impact Prisma Access firewalls.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue does not impact Prisma Access firewalls.</pre>"}]}],"x_affectedList":["PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.1","status":"affected","lessThan":"10.1.3","versionType":"custom","changes":[{"at":"10.1.3","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.14-h3","versionType":"custom","changes":[{"at":"9.0.14-h3","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.20-h1","versionType":"custom","changes":[{"at":"8.1.20-h1","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.11-h2","versionType":"custom","changes":[{"at":"9.1.11-h2","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.8","versionType":"custom","changes":[{"at":"10.0.8","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"2.1 All","status":"unaffected"},{"version":"2.2 All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3058"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks CJ, an external security researcher, for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-176653"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This vulnerability is only applicable to PAN-OS firewalls configured to use the XML API.","supportingMedia":{"value":"This vulnerability is only applicable to PAN-OS firewalls configured to use the XML API.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Enable signatures for Unique Threat ID 91715 on traffic processed by the firewall to block attacks against CVE-2021-3058.\n\nThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"Enable signatures for Unique Threat ID 91715 on traffic processed by the firewall to block attacks against CVE-2021-3058.\n\nThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.20-h1, PAN-OS 9.0.14-h3, PAN-OS 9.1.11-h2, PAN-OS 10.0.8, PAN-OS 10.1.3, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.20-h1, PAN-OS 9.0.14-h3, PAN-OS 9.1.11-h2, PAN-OS 10.0.8, PAN-OS 10.1.3, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-11-10T18:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3063","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-11-10T00:00:00","dateReserved":"2021-11-10T00:00:00","dateUpdated":"2021-12-09T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Denial-of-Service (DoS) Vulnerability in GlobalProtect Portal and Gateway Interfaces","datePublic":"2021-11-10T17:00:00.000Z","providerMetadata":{"dateUpdated":"2021-11-10T17:10:29","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An improper handling of exceptional conditions vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to send specifically crafted traffic to a GlobalProtect interface that causes the service to stop responding. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An improper handling of exceptional conditions vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to send specifically crafted traffic to a GlobalProtect interface that causes the service to stop responding. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.21;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h4;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h3;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8-h4;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.3.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.21;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h4;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h3;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8-h4;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.3.</pre>"}]},{"lang":"en","value":"Prisma Access customers are not impacted by this issue.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Prisma Access customers are not impacted by this issue.</pre>"}]}],"x_affectedList":["PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.8-h3","PAN-OS 10.0.8-h2","PAN-OS 10.0.8-h1","PAN-OS 10.0.8","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.20-h1","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.21","versionType":"custom","changes":[{"at":"8.1.21","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.14-h4","versionType":"custom","changes":[{"at":"9.0.14-h4","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.8-h4","versionType":"custom","changes":[{"at":"10.0.8-h4","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.3","versionType":"custom","changes":[{"at":"10.1.3","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.11-h3","versionType":"custom","changes":[{"at":"9.1.11-h3","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"2.2 All","status":"unaffected"},{"version":"2.1 All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3063"}],"credits":[{"lang":"en","value":" This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-755 Improper Handling of Exceptional Conditions","cweId":"CWE-755"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-180032"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect portal or gateway enabled. You can verify whether you have a GlobalProtect portal or gateway configured by checking for entries in 'Network > GlobalProtect > Portals' and in 'Network > GlobalProtect > Gateways' from the web interface.","supportingMedia":{"value":"This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect portal or gateway enabled. You can verify whether you have a GlobalProtect portal or gateway configured by checking for entries in 'Network > GlobalProtect > Portals' and in 'Network > GlobalProtect > Gateways' from the web interface.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Enable signatures for Unique Threat IDs 91820 and 91855 on traffic destined for GlobalProtect interfaces to block attacks against CVE-2021-3063.\n\nIt is not necessary to enable SSL decryption to detect and block attacks against this issue.","supportingMedia":{"value":"Enable signatures for Unique Threat IDs 91820 and 91855 on traffic destined for GlobalProtect interfaces to block attacks against CVE-2021-3063.\n\nIt is not necessary to enable SSL decryption to detect and block attacks against this issue.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.21, PAN-OS 9.0.14-h4, PAN-OS 9.1.11-h3, PAN-OS 10.0.8-h4, PAN-OS 10.1.3, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.21, PAN-OS 9.0.14-h4, PAN-OS 9.1.11-h3, PAN-OS 10.0.8-h4, PAN-OS 10.1.3, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-11-11T02:00:00.000Z","lang":"eng","value":"PAN-OS 10.0.8-h4 is now available"},{"time":"2021-11-10T17:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-12-09T17:16:00.000Z","lang":"eng","value":"Fixed the discovery status as this was internally found."}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3059","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-11-10T00:00:00","dateReserved":"2021-11-10T00:00:00","dateUpdated":"2021-11-17T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS Command Injection Vulnerability When Performing Dynamic Updates","datePublic":"2021-11-10T17:00:00.000Z","providerMetadata":{"dateUpdated":"2021-11-10T17:10:23","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS command injection vulnerability in the Palo Alto Networks PAN-OS management interface exists when performing dynamic updates. This vulnerability enables a man-in-the-middle attacker to execute arbitrary OS commands to escalate privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS command injection vulnerability in the Palo Alto Networks PAN-OS management interface exists when performing dynamic updates. This vulnerability enables a man-in-the-middle attacker to execute arbitrary OS commands to escalate privileges.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.3.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.3.</pre>"}]},{"lang":"en","value":"Prisma Access customers are not impacted by this issue.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Prisma Access customers are not impacted by this issue.</pre>"}]}],"x_affectedList":["PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.0","status":"affected","lessThan":"10.0.8","versionType":"custom","changes":[{"at":"10.0.8","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.3","versionType":"custom","changes":[{"at":"10.1.3","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.20-h1","versionType":"custom","changes":[{"at":"8.1.20-h1","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.14-h3","versionType":"custom","changes":[{"at":"9.0.14-h3","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.11-h2","versionType":"custom","changes":[{"at":"9.1.11-h2","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"2.2 All","status":"unaffected"},{"version":"2.1 All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3059"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks CJ, an external security researcher, for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-176618"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only to firewalls and Panoramas that receive dynamic updates from an update server.\n\nTo verify this on firewalls not managed by Panorama ‘Device > Dynamic Updates’ from the web interface.\n\nTo verify this on Panorama review ‘Panorama > Dynamic Updates’ from the web interface.\n\nTo verify this for Panorama managed firewalls review ‘Panorama > Device Deployment > Dynamic Updates’ from the Panorama web interface.\n\nFirewalls that only receive content updates pushed from Panoramas are not susceptible to this issue.","supportingMedia":{"value":"This issue is applicable only to firewalls and Panoramas that receive dynamic updates from an update server.\n\nTo verify this on firewalls not managed by Panorama ‘Device > Dynamic Updates’ from the web interface.\n\nTo verify this on Panorama review ‘Panorama > Dynamic Updates’ from the web interface.\n\nTo verify this for Panorama managed firewalls review ‘Panorama > Device Deployment > Dynamic Updates’ from the Panorama web interface.\n\nFirewalls that only receive content updates pushed from Panoramas are not susceptible to this issue.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Updating dynamic content from a local file will prevent exposure to this vulnerability until you are able to upgrade PAN-OS firewalls and Panorama to a fixed version. You can disable scheduled dynamic updates in the web interface.\n\nPush content updates from Panorama to the managed firewalls until you are able to upgrade PAN-OS to a fixed version. The process of upgrading dynamic content on managed devices is referenced here:\nhttps://docs.paloaltonetworks.com/pan-os/10-0/pan-os-web-interface-help/panorama-web-interface/panorama-managed-devices-summary/firewall-software-and-content-updates.html","supportingMedia":{"value":"Updating dynamic content from a local file will prevent exposure to this vulnerability until you are able to upgrade PAN-OS firewalls and Panorama to a fixed version. You can disable scheduled dynamic updates in the web interface.\n\nPush content updates from Panorama to the managed firewalls until you are able to upgrade PAN-OS to a fixed version. The process of upgrading dynamic content on managed devices is referenced here:\nhttps://docs.paloaltonetworks.com/pan-os/10-0/pan-os-web-interface-help/panorama-web-interface/panorama-managed-devices-summary/firewall-software-and-content-updates.html","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.20-h1, PAN-OS 9.0.14-h3, PAN-OS 9.1.11-h2, PAN-OS 10.0.8, PAN-OS 10.1.3, and all later PAN-OS versions.\n","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.20-h1, PAN-OS 9.0.14-h3, PAN-OS 9.1.11-h2, PAN-OS 10.0.8, PAN-OS 10.1.3, and all later PAN-OS versions.\n","type":"text/html","base64":false}}],"timeline":[{"time":"2021-11-10T18:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-11-12T00:00:00.000Z","lang":"eng","value":"Prisma Access is not impacted"},{"time":"2021-11-17T22:20:00.000Z","lang":"eng","value":"Updated workaround and required configuration"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3062","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-11-10T00:00:00","dateReserved":"2021-11-10T00:00:00","dateUpdated":"2021-11-17T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Improper Access Control Vulnerability Exposing AWS Instance Metadata Endpoint to GlobalProtect Users","datePublic":"2021-11-10T17:00:00.000Z","providerMetadata":{"dateUpdated":"2021-11-10T17:10:27","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An improper access control vulnerability in PAN-OS software enables an attacker with authenticated access to GlobalProtect portals and gateways to connect to the EC2 instance metadata endpoint for VM-Series firewalls hosted on Amazon AWS.\n\nExploitation of this vulnerability enables an attacker to perform any operations allowed by the EC2 role in AWS.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An improper access control vulnerability in PAN-OS software enables an attacker with authenticated access to GlobalProtect portals and gateways to connect to the EC2 instance metadata endpoint for VM-Series firewalls hosted on Amazon AWS.\n\nExploitation of this vulnerability enables an attacker to perform any operations allowed by the EC2 role in AWS.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20 VM-Series firewalls;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11 VM-Series firewalls;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14 VM-Series firewalls;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8 VM-Series firewalls.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20 VM-Series firewalls;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11 VM-Series firewalls;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14 VM-Series firewalls;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8 VM-Series firewalls.</pre>"}]},{"lang":"en","value":"Prisma Access customers are not impacted by this issue.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Prisma Access customers are not impacted by this issue.</pre>"}]}],"x_affectedList":["PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.1.*","status":"unaffected"},{"version":"9.1","status":"affected","lessThan":"9.1.11","versionType":"custom","changes":[{"at":"9.1.11","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.20","versionType":"custom","changes":[{"at":"8.1.20","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.14","versionType":"custom","changes":[{"at":"9.0.14","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.8","versionType":"custom","changes":[{"at":"10.0.8","status":"unaffected"}]}],"platforms":["VM-Series"]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"2.1 All","status":"unaffected"},{"version":"2.2 All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3062"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Matthew Flanagan of Computer Systems Australia (CSA) and Suresh Kumar Ponnusamy of Freshworks for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-284 Improper Access Control","cweId":"CWE-284"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-164422"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect portal or gateway enabled. You can verify whether you have a GlobalProtect portal or gateway configured by checking for entries in 'Network > GlobalProtect > Portals' and in 'Network > GlobalProtect > Gateways' on the web interface.","supportingMedia":{"value":"This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect portal or gateway enabled. You can verify whether you have a GlobalProtect portal or gateway configured by checking for entries in 'Network > GlobalProtect > Portals' and in 'Network > GlobalProtect > Gateways' on the web interface.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"There are no known workarounds for this issue.","supportingMedia":{"value":"There are no known workarounds for this issue.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.11, PAN-OS 10.0.8, and all later PAN-OS versions","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.11, PAN-OS 10.0.8, and all later PAN-OS versions","type":"text/html","base64":false}}],"timeline":[{"time":"2021-11-10T17:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-11-17T22:40:00.000Z","lang":"eng","value":"Updated credit"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2021-3056","assignerOrgId":"00000000-0000-4000-9000-000000000000","assignerShortName":"palo_alto","dateUpdated":"2021-11-10T00:00:00.000Z","serial":1,"dateReserved":"2021-11-10T08:00:00.000Z","datePublished":"2021-11-10T08:00:00.000Z","state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000","shortName":"palo_alto","dateUpdated":"2021-11-11T01:10:00.000Z"},"title":"PAN-OS: Memory Corruption Vulnerability in GlobalProtect Clientless VPN During SAML Authentication","datePublic":"2021-11-10T17:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-120","description":"CWE-120 Buffer Overflow","type":"CWE"}]}],"impacts":[{"descriptions":[{"lang":"en","value":""}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"2.2","versionType":"custom"},{"status":"affected","version":"2.1","changes":[{"at":"2.1","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"status":"unaffected","version":"10.1.0","versionType":"custom"},{"status":"affected","version":"10.0.0","lessThan":"10.0.1","changes":[{"at":"10.0.1","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"9.1.0","lessThan":"9.1.9","changes":[{"at":"9.1.9","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"9.0.0","lessThan":"9.0.14","changes":[{"at":"9.0.14","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"8.1.0","lessThan":"8.1.20","changes":[{"at":"8.1.20","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.0","versionEndExcluding":"10.0.1"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"9.1.0","versionEndExcluding":"9.1.9"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.0.14"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"8.1.0","versionEndExcluding":"8.1.20"}]}]}],"descriptions":[{"lang":"en","value":"A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables an authenticated attacker to execute arbitrary code with root user privileges during SAML authentication.\n\nThis issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.9;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.1.\n\nPrisma Access customers with Prisma Access 2.1 Preferred firewalls are impacted by this issue.","supportingMedia":[{"type":"text/html","base64":true,"value":"A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables an authenticated attacker to execute arbitrary code with root user privileges during SAML authentication.<br><br>This issue impacts:<br>PAN-OS 8.1 versions earlier than PAN-OS 8.1.20;<br>PAN-OS 9.0 versions earlier than PAN-OS 9.0.14;<br>PAN-OS 9.1 versions earlier than PAN-OS 9.1.9;<br>PAN-OS 10.0 versions earlier than PAN-OS 10.0.1.<br><br>Prisma Access customers with Prisma Access 2.1 Preferred firewalls are impacted by this issue."}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2021-3056","tags":["x_refsource_CONFIRM"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseSeverity":"HIGH","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}}],"configurations":[{"lang":"en","value":"This issue is applicable only to PAN-OS firewall configurations with the Clientless VPN feature and SAML authentication enabled for GlobalProtect Portal.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is applicable only to PAN-OS firewall configurations with the Clientless VPN feature and SAML authentication enabled for GlobalProtect Portal."}]}],"workarounds":[{"lang":"en","value":"Enable signatures for Unique Threat ID 91585 on traffic processed by the firewall to block attacks against CVE-2021-3056.","supportingMedia":[{"type":"text/html","base64":false,"value":"Enable signatures for Unique Threat ID 91585 on traffic processed by the firewall to block attacks against CVE-2021-3056."}]}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.9, PAN-OS 10.0.1, and all later PAN-OS versions.\nThis issue is fixed in Prisma Access 2.2 Preferred and all later Prisma Access versions.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.9, PAN-OS 10.0.1, and all later PAN-OS versions.<br>This issue is fixed in Prisma Access 2.2 Preferred and all later Prisma Access versions."}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2021-11-10T17:00:00.000Z","lang":"eng","value":"Initial publication"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom of Palo Alto Networks during an internal security review.","type":"finder"}],"source":{"defect":["PAN-149501"],"discovery":"INTERNAL"},"x_generator":{"engine":"Vulnogram 0.0.9"},"x_affectedList":["Prisma Access 2.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3060","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-11-10T00:00:00","dateReserved":"2021-11-10T00:00:00","dateUpdated":"2022-08-06T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS Command Injection in Simple Certificate Enrollment Protocol (SCEP)","datePublic":"2021-11-10T17:00:00.000Z","providerMetadata":{"dateUpdated":"2021-11-10T17:10:24","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS command injection vulnerability in the Simple Certificate Enrollment Protocol (SCEP) feature of PAN-OS software allows an unauthenticated network-based attacker with specific knowledge of the firewall configuration to execute arbitrary code with root user privileges. The attacker must have network access to the GlobalProtect interfaces to exploit this issue.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS command injection vulnerability in the Simple Certificate Enrollment Protocol (SCEP) feature of PAN-OS software allows an unauthenticated network-based attacker with specific knowledge of the firewall configuration to execute arbitrary code with root user privileges. The attacker must have network access to the GlobalProtect interfaces to exploit this issue.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.3.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.3.</pre>"}]},{"lang":"en","value":"Prisma Access customers with Prisma Access 2.1 Preferred and Prisma Access 2.1 Innovation firewalls are impacted by this issue.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Prisma Access customers with Prisma Access 2.1 Preferred and Prisma Access 2.1 Innovation firewalls are impacted by this issue.</pre>"}]}],"x_affectedList":["Prisma Access 2.1","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.20-h1","versionType":"custom","changes":[{"at":"8.1.20-h1","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.14-h3","versionType":"custom","changes":[{"at":"9.0.14-h3","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.11-h2","versionType":"custom","changes":[{"at":"9.1.11-h2","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.8","versionType":"custom","changes":[{"at":"10.0.8","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.3","versionType":"custom","changes":[{"at":"10.1.3","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"2.1 Preferred","status":"affected"},{"version":"2.2 All","status":"unaffected"},{"version":"2.1 Innovation","status":"affected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3060"},{"tags":["x_refsource_CONFIRM"],"url":"https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/certificate-management/configure-the-master-key.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://docs.paloaltonetworks.com/prisma/prisma-access/innovation/2-1/prisma-access-panorama-admin/prepare-the-prisma-access-infrastructure/get-started-with-prisma-access-overview.html"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks CJ, an external security researcher, for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-176661"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only to GlobalProtect portal and gateway configurations that are configured with a SCEP profile and when the default master key was not changed.\n\nYou can determine if your configuration has a SCEP profile by selecting 'Device > Certificate Management > SCEP' from the web interface.\n\nNote: The SCEP profile does not need to be enabled for the firewall to be at risk; it need only exist in the configuration to be a risk even if disabled.\n\nYou know you are using the default master key when the master key was not explicitly configured on the firewall. Review the master key configuration by selecting 'Device > Master Key and Diagnostics' from the web interface and change the key if needed.\n","supportingMedia":{"value":"This issue is applicable only to GlobalProtect portal and gateway configurations that are configured with a SCEP profile and when the default master key was not changed.\n\nYou can determine if your configuration has a SCEP profile by selecting 'Device > Certificate Management > SCEP' from the web interface.\n\nNote: The SCEP profile does not need to be enabled for the firewall to be at risk; it need only exist in the configuration to be a risk even if disabled.\n\nYou know you are using the default master key when the master key was not explicitly configured on the firewall. Review the master key configuration by selecting 'Device > Master Key and Diagnostics' from the web interface and change the key if needed.\n","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Changing the master key for the firewall prevents exploitation of this vulnerability. This is a security best practice for both PAN-OS and Prisma Access customers.\n\nDocumentation for configuring the master key is available at: https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/certificate-management/configure-the-master-key.html. Please note the special requirements for high-availability (HA) and Panorama-managed environments.\n\nAdditional information is available for Prisma Access customers at: https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-admin/prepare-the-prisma-access-infrastructure/get-started-with-prisma-access-overview.\n\nRemove all configured SCEP profiles from the firewall to completely eliminate any risk of exploitation related to this issue. You can view any existing SCEP profiles configured on the firewall by selecting 'Device > Certificate Management > SCEP' from the web interface.\n\nThis issue requires the attacker to have network access to the GlobalProtect interface.\n\nIn addition to these workarounds, you should enable signatures for Unique Threat ID 91526 on traffic destined for GlobalProtect interfaces to further mitigate the risk of attacks against CVE-2021-3060. SSL decryption is not necessary to detect attacks against this issue.","supportingMedia":{"value":"Changing the master key for the firewall prevents exploitation of this vulnerability. This is a security best practice for both PAN-OS and Prisma Access customers.\n\nDocumentation for configuring the master key is available at: https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/certificate-management/configure-the-master-key.html. Please note the special requirements for high-availability (HA) and Panorama-managed environments.\n\nAdditional information is available for Prisma Access customers at: https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-admin/prepare-the-prisma-access-infrastructure/get-started-with-prisma-access-overview.\n\nRemove all configured SCEP profiles from the firewall to completely eliminate any risk of exploitation related to this issue. You can view any existing SCEP profiles configured on the firewall by selecting 'Device > Certificate Management > SCEP' from the web interface.\n\nThis issue requires the attacker to have network access to the GlobalProtect interface.\n\nIn addition to these workarounds, you should enable signatures for Unique Threat ID 91526 on traffic destined for GlobalProtect interfaces to further mitigate the risk of attacks against CVE-2021-3060. SSL decryption is not necessary to detect attacks against this issue.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue at time of publication. However, a proof of concept script for this issue is publicly available.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue at time of publication. However, a proof of concept script for this issue is publicly available.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.20-h1, PAN-OS 9.0.14-h3, PAN-OS 9.1.11-h2, PAN-OS 10.0.8, PAN-OS 10.1.3, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.20-h1, PAN-OS 9.0.14-h3, PAN-OS 9.1.11-h2, PAN-OS 10.0.8, PAN-OS 10.1.3, and all later PAN-OS versions.","type":"text/html","base64":false}},{"lang":"en","value":"This issue is fixed in Prisma Access 2.2 Preferred and all later Prisma Access versions."}],"timeline":[{"time":"2021-11-10T17:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2022-08-06T00:15:00.000Z","lang":"eng","value":"Updated Prisma Access documentation link; added a note about a public proof of concept script."}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3054","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-09-08T00:00:00","dateReserved":"2021-09-08T00:00:00","dateUpdated":"2021-09-12T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Unsigned Code Execution During Plugin Installation Race Condition Vulnerability","datePublic":"2021-09-08T16:00:00.000Z","providerMetadata":{"dateUpdated":"2021-09-08T17:10:21","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permission to upload plugins to execute arbitrary code with root user privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permission to upload plugins to execute arbitrary code with root user privileges.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.7;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.2.\n\nThis issue does not affect Prisma Access.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.7;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.2.\n\nThis issue does not affect Prisma Access.</pre>"}]}],"x_affectedList":["PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.20","versionType":"custom","changes":[{"at":"8.1.20","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.14","versionType":"custom","changes":[{"at":"9.0.14","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.7","versionType":"custom","changes":[{"at":"10.0.7","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.11","versionType":"custom","changes":[{"at":"9.1.11","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.2","versionType":"custom","changes":[{"at":"10.1.2","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3054"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Praetorian for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition","cweId":"CWE-367"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-138727"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Enable signatures for Unique Threat ID 91572 on traffic processed by the firewall to block attacks against CVE-2021-3054.\n\nThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"Enable signatures for Unique Threat ID 91572 on traffic processed by the firewall to block attacks against CVE-2021-3054.\n\nThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.11, PAN-OS 10.0.7, PAN-OS 10.1.2, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.11, PAN-OS 10.0.7, PAN-OS 10.1.2, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-09-08T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-09-12T16:00:00.000Z","lang":"eng","value":"Added threat prevention workaround for the vulnerability"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-10188","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-09-08T00:00:00","dateReserved":"2021-09-08T00:00:00","dateUpdated":"2021-09-08T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Impact of Telnet Remote-Code-Execution (RCE) Vulnerability (CVE-2020-10188)","datePublic":"2021-09-08T16:00:00.000Z","providerMetadata":{"dateUpdated":"2021-11-08T11:09:32","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code.\n\nThe Telnet-based administrative management service is disabled by default and this issue is not exploitable if this service is disabled.\n\nThis issue does not impact SSH or HTTPS management interfaces. This issue does not affect Prisma Access.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code.\n\nThe Telnet-based administrative management service is disabled by default and this issue is not exploitable if this service is disabled.\n\nThis issue does not impact SSH or HTTPS management interfaces. This issue does not affect Prisma Access.</pre>"}]}],"x_affectedList":["PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.1.*","status":"unaffected"},{"version":"8.1","status":"affected","lessThan":"8.1.20","versionType":"custom","changes":[{"at":"8.1.20","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.14","versionType":"custom","changes":[{"at":"9.0.14","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.9","versionType":"custom","changes":[{"at":"9.1.9","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.6","versionType":"custom","changes":[{"at":"10.0.6","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-10188"}],"credits":[{"lang":"en","value":"This issue was found by an external researcher in the upstream Telnet code."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-120 Buffer Overflow","cweId":"CWE-120"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-158262"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This issue is exploitable only if the Telnet service is enabled and is accessible to attackers.","supportingMedia":{"value":"This issue is exploitable only if the Telnet service is enabled and is accessible to attackers.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Disabling the Telnet-based administrative management service completely eliminates risks of exploitation of this issue.\n\nThis issue requires the attacker to have network access to the PAN-OS Telnet interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.\n\nIf the Telnet-based administrative management service is required and you cannot immediately upgrade your PAN-OS software, enable signatures for Unique Threat ID 59125 on traffic destined for the Telnet interface to block attacks against CVE-2020-10188.","supportingMedia":{"value":"Disabling the Telnet-based administrative management service completely eliminates risks of exploitation of this issue.\n\nThis issue requires the attacker to have network access to the PAN-OS Telnet interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.\n\nIf the Telnet-based administrative management service is required and you cannot immediately upgrade your PAN-OS software, enable signatures for Unique Threat ID 59125 on traffic destined for the Telnet interface to block attacks against CVE-2020-10188.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue targeting Palo Alto Networks products.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue targeting Palo Alto Networks products.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.9, PAN-OS 10.0.6, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.9, PAN-OS 10.0.6, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-09-08T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3052","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-09-08T00:00:00","dateReserved":"2021-09-08T00:00:00","dateUpdated":"2021-09-12T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Reflected Cross-Site Scripting (XSS) in Web Interface","datePublic":"2021-09-08T16:00:00.000Z","providerMetadata":{"dateUpdated":"2021-09-08T17:10:18","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A reflected cross-site scripting (XSS) vulnerability in the Palo Alto Network PAN-OS web interface enables an authenticated network-based attacker to mislead another authenticated PAN-OS administrator to click on a specially crafted link that performs arbitrary actions in the PAN-OS web interface as the targeted authenticated administrator.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A reflected cross-site scripting (XSS) vulnerability in the Palo Alto Network PAN-OS web interface enables an authenticated network-based attacker to mislead another authenticated PAN-OS administrator to click on a specially crafted link that performs arbitrary actions in the PAN-OS web interface as the targeted authenticated administrator.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than 8.1.20;\nPAN-OS 9.0 versions earlier than 9.0.14;\nPAN-OS 9.1 versions earlier than 9.1.10;\nPAN-OS 10.0 versions earlier than 10.0.2.\n\nThis issue does not affect Prisma Access.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than 8.1.20;\nPAN-OS 9.0 versions earlier than 9.0.14;\nPAN-OS 9.1 versions earlier than 9.1.10;\nPAN-OS 10.0 versions earlier than 10.0.2.\n\nThis issue does not affect Prisma Access.</pre>"}]}],"x_affectedList":["PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.1.*","status":"unaffected"},{"version":"9.0","status":"affected","lessThan":"9.0.14","versionType":"custom","changes":[{"at":"9.0.14","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.20","versionType":"custom","changes":[{"at":"8.1.20","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.10","versionType":"custom","changes":[{"at":"9.1.10","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.2","versionType":"custom","changes":[{"at":"10.0.2","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3052"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Cristian Mocanu and Dan Marin of Deloitte for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-79 Cross-site Scripting (XSS)","cweId":"CWE-79"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-150337"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Enable signatures for Unique Threat IDs 91573, 91574, 91575, 91576 on traffic destined for the web interface to block attacks against CVE-2021-3052.\n\nThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"Enable signatures for Unique Threat IDs 91573, 91574, 91575, 91576 on traffic destined for the web interface to block attacks against CVE-2021-3052.\n\nThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 9.0.14, PAN-OS 8.1.20, PAN-OS 9.1.10, PAN-OS 10.0.2, PAN-OS 10.1.0, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 9.0.14, PAN-OS 8.1.20, PAN-OS 9.1.10, PAN-OS 10.0.2, PAN-OS 10.1.0, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-09-08T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-09-12T16:00:00.000Z","lang":"eng","value":"Added threat prevention workaround for the vulnerability"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3053","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-09-08T00:00:00","dateReserved":"2021-09-08T00:00:00","dateUpdated":"2021-09-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Exceptional Condition Denial-of-Service (DoS)","datePublic":"2021-09-08T16:00:00.000Z","providerMetadata":{"dateUpdated":"2021-09-08T17:10:19","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An improper handling of exceptional conditions vulnerability exists in the Palo Alto Networks PAN-OS dataplane that enables an unauthenticated network-based attacker to send specifically crafted traffic through the firewall that causes the service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An improper handling of exceptional conditions vulnerability exists in the Palo Alto Networks PAN-OS dataplane that enables an unauthenticated network-based attacker to send specifically crafted traffic through the firewall that causes the service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.9;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.5.\n\nThis issue does not affect Prisma Access.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.9;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.5.\n\nThis issue does not affect Prisma Access.</pre>"}]}],"x_affectedList":["PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.1.*","status":"unaffected"},{"version":"8.1","status":"affected","lessThan":"8.1.20","versionType":"custom","changes":[{"at":"8.1.20","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.14","versionType":"custom","changes":[{"at":"9.0.14","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.9","versionType":"custom","changes":[{"at":"9.1.9","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.5","versionType":"custom","changes":[{"at":"10.0.5","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3053"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-755 Improper Handling of Exceptional Conditions","cweId":"CWE-755"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-158723"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only if GTP security is configured on the firewall.","supportingMedia":{"value":"This issue is applicable only if GTP security is configured on the firewall.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Enable signatures for Unique Threat ID 91593 on traffic processed by the firewall to block attacks against CVE-2021-3053.","supportingMedia":{"value":"Enable signatures for Unique Threat ID 91593 on traffic processed by the firewall to block attacks against CVE-2021-3053.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.9, PAN-OS 10.0.5, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.9, PAN-OS 10.0.5, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-09-08T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-09-13T16:00:00.000Z","lang":"eng","value":"Added required configuration for exposure and threat prevention workaround for the vulnerability"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3050","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-08-11T00:00:00","dateReserved":"2021-08-11T00:00:00","dateUpdated":"2021-08-11T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS Command Injection Vulnerability in Web Interface","datePublic":"2021-08-11T16:00:00.000Z","providerMetadata":{"dateUpdated":"2021-08-11T17:10:20","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to execute arbitrary OS commands to escalate privileges.\n\nThis issue impacts:\nPAN-OS 9.0 version 9.0.10 through PAN-OS 9.0.14;\nPAN-OS 9.1 version 9.1.4 through PAN-OS 9.1.10;\nPAN-OS 10.0 version 10.0.7 and earlier PAN-OS 10.0 versions;\nPAN-OS 10.1 version 10.1.0 through PAN-OS 10.1.1.\n\nPrisma Access firewalls and firewalls running PAN-OS 8.1 versions are not impacted by this issue.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to execute arbitrary OS commands to escalate privileges.\n\nThis issue impacts:\nPAN-OS 9.0 version 9.0.10 through PAN-OS 9.0.14;\nPAN-OS 9.1 version 9.1.4 through PAN-OS 9.1.10;\nPAN-OS 10.0 version 10.0.7 and earlier PAN-OS 10.0 versions;\nPAN-OS 10.1 version 10.1.0 through PAN-OS 10.1.1.\n\nPrisma Access firewalls and firewalls running PAN-OS 8.1 versions are not impacted by this issue.\n</pre>"}]}],"x_affectedList":["PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.11-h1","PAN-OS 10.0.11","PAN-OS 10.0.10","PAN-OS 10.0.9","PAN-OS 10.0.8-h8","PAN-OS 10.0.8-h7","PAN-OS 10.0.8-h6","PAN-OS 10.0.8-h5","PAN-OS 10.0.8-h4","PAN-OS 10.0.8-h3","PAN-OS 10.0.8-h2","PAN-OS 10.0.8-h1","PAN-OS 10.0.8","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.14-h4","PAN-OS 9.1.14-h3","PAN-OS 9.1.14-h2","PAN-OS 9.1.14-h1","PAN-OS 9.1.14","PAN-OS 9.1.13-h3","PAN-OS 9.1.13-h2","PAN-OS 9.1.13-h1","PAN-OS 9.1.13","PAN-OS 9.1.12-h3","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1","PAN-OS 9.0.16-h3","PAN-OS 9.0.16-h2","PAN-OS 9.0.16-h1","PAN-OS 9.0.16","PAN-OS 9.0.15","PAN-OS 9.0.14-h4","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1.*","status":"unaffected"},{"version":"9.0.10","status":"affected","lessThan":"9.0*","versionType":"custom","changes":[{"at":"9.0.15","status":"unaffected"}]},{"version":"9.1.4","status":"affected","lessThan":"9.1*","versionType":"custom","changes":[{"at":"9.1.11","status":"unaffected"}]},{"version":"10.0.0","status":"affected","lessThan":"10.0*","versionType":"custom","changes":[{"at":"10.0.8","status":"unaffected"}]},{"version":"10.1.0","status":"affected","lessThan":"10.1*","versionType":"custom","changes":[{"at":"10.1.2","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3050"}],"credits":[{"lang":"en","value":"This issue was found by an external security researcher."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-174326"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Enable signatures for Unique Threat ID 91439 on traffic destined for the web interface to block attacks against CVE-2021-3050.\n\nThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.\n","supportingMedia":{"value":"Enable signatures for Unique Threat ID 91439 on traffic destined for the web interface to block attacks against CVE-2021-3050.\n\nThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.\n","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.  However, exploits for this issue are publicly available.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.  However, exploits for this issue are publicly available.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"We intend to fix this issue in PAN-OS 9.0.15 (ETA November 2021), PAN-OS 9.1.11 (ETA September 2021), PAN-OS 10.0.8 (ETA September 2021), PAN-OS 10.1.2 (ETA September 2021) and all later PAN-OS versions.","supportingMedia":{"value":"We intend to fix this issue in PAN-OS 9.0.15 (ETA November 2021), PAN-OS 9.1.11 (ETA September 2021), PAN-OS 10.0.8 (ETA September 2021), PAN-OS 10.1.2 (ETA September 2021) and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-08-11T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2022","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-11-11T00:00:00","dateReserved":"2020-11-11T00:00:00","dateUpdated":"2020-11-11T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Panorama session disclosure during context switch into managed device","datePublic":"2020-11-11T17:00:00.000Z","providerMetadata":{"dateUpdated":"2020-11-12T00:05:20","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An information exposure vulnerability exists in Palo Alto Networks Panorama software that discloses the token for the Panorama web interface administrator's session to a managed device when the Panorama administrator performs a context switch into that device. This vulnerability allows an attacker to gain privileged access to the Panorama web interface. An attacker requires some knowledge of managed firewalls to exploit this issue.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An information exposure vulnerability exists in Palo Alto Networks Panorama software that discloses the token for the Panorama web interface administrator's session to a managed device when the Panorama administrator performs a context switch into that device. This vulnerability allows an attacker to gain privileged access to the Panorama web interface. An attacker requires some knowledge of managed firewalls to exploit this issue.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.17;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.11;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.5.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.17;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.11;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.5.</pre>"}]}],"x_affectedList":["PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.0.*","status":"unaffected"},{"version":"8.1","status":"affected","lessThan":"8.1.17","versionType":"custom","changes":[{"at":"8.1.17","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.11","versionType":"custom","changes":[{"at":"9.0.11","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.5","versionType":"custom","changes":[{"at":"9.1.5","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2022"}],"credits":[{"lang":"en","value":"This issue was found by Ben Nott of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-200 Information Exposure","cweId":"CWE-200"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-125218"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"This issue is not applicable when custom certificate authentication is enabled between Panorama and managed firewalls. See https://docs.paloaltonetworks.com/panorama/10-0/panorama-admin/set-up-panorama/set-up-authentication-using-custom-certificates.html","supportingMedia":{"value":"This issue is not applicable when custom certificate authentication is enabled between Panorama and managed firewalls. See https://docs.paloaltonetworks.com/panorama/10-0/panorama-admin/set-up-panorama/set-up-authentication-using-custom-certificates.html","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"This issue can be completely mitigated by enabling custom certificate authentication between Panorama and managed firewalls. See https://docs.paloaltonetworks.com/panorama/10-0/panorama-admin/set-up-panorama/set-up-authentication-using-custom-certificates.html","supportingMedia":{"value":"This issue can be completely mitigated by enabling custom certificate authentication between Panorama and managed firewalls. See https://docs.paloaltonetworks.com/panorama/10-0/panorama-admin/set-up-panorama/set-up-authentication-using-custom-certificates.html","type":"text/html","base64":false}},{"lang":"en","value":"This issue impacts the management web interface of appliances running PAN-OS software and is strongly mitigated by following best practices for securing the interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com/best-practices"}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.17, PAN-OS 9.0.11, PAN-OS 9.1.5, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.17, PAN-OS 9.0.11, PAN-OS 9.1.5, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-11-11T17:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2050","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-11-11T00:00:00","dateReserved":"2020-11-11T00:00:00","dateUpdated":"2020-11-19T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Authentication bypass vulnerability in GlobalProtect client certificate verification","datePublic":"2020-11-11T17:00:00.000Z","providerMetadata":{"dateUpdated":"2020-11-12T00:05:22","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an attacker to bypass all client certificate checks with an invalid certificate. A remote attacker can successfully authenticate as any user and gain access to restricted VPN network resources when the gateway or portal is configured to rely entirely on certificate-based authentication.\n\nImpacted features that use SSL VPN with client certificate verification are:\n  GlobalProtect Gateway,\n  GlobalProtect Portal,\n  GlobalProtect Clientless VPN,\n  GlobalProtect Large Scale VPN\n\nIn configurations where client certificate verification is used in conjunction with other authentication methods, the protections added by the certificate check are ignored as a result of this issue.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an attacker to bypass all client certificate checks with an invalid certificate. A remote attacker can successfully authenticate as any user and gain access to restricted VPN network resources when the gateway or portal is configured to rely entirely on certificate-based authentication.\n\nImpacted features that use SSL VPN with client certificate verification are:\n  GlobalProtect Gateway,\n  GlobalProtect Portal,\n  GlobalProtect Clientless VPN,\n  GlobalProtect Large Scale VPN\n\nIn configurations where client certificate verification is used in conjunction with other authentication methods, the protections added by the certificate check are ignored as a result of this issue.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.17;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.11;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.5;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.1.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.17;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.11;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.5;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.1.</pre>"}]}],"x_affectedList":["PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.17","versionType":"custom","changes":[{"at":"8.1.17","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.11","versionType":"custom","changes":[{"at":"9.0.11","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.5","versionType":"custom","changes":[{"at":"9.1.5","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.1","versionType":"custom","changes":[{"at":"10.0.1","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2050"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":8.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-285 Improper Authorization","cweId":"CWE-285"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-146650"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"This issue is only applicable to PAN-OS appliances using the GlobalProtect VPN, gateway, or portal configured to allow users to authenticate with client certificate authentication.\n\nThis issue can not be exploited if client certificate authentication is not in use.\n\nOther forms of authentication are not impacted by this issue.\n","supportingMedia":{"value":"This issue is only applicable to PAN-OS appliances using the GlobalProtect VPN, gateway, or portal configured to allow users to authenticate with client certificate authentication.\n\nThis issue can not be exploited if client certificate authentication is not in use.\n\nOther forms of authentication are not impacted by this issue.\n","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59884 on traffic destined for the GlobalProtect portal, gateway, or VPN will block attacks against CVE-2020-2050.\n\nThis issue can be mitigated by configuring GlobalProtect to require users to authenticate with their credentials. Other authentication methods are not impacted by this issue.","supportingMedia":{"value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59884 on traffic destined for the GlobalProtect portal, gateway, or VPN will block attacks against CVE-2020-2050.\n\nThis issue can be mitigated by configuring GlobalProtect to require users to authenticate with their credentials. Other authentication methods are not impacted by this issue.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.17, PAN-OS 9.0.11, PAN-OS 9.1.5, PAN-OS 10.0.1, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.17, PAN-OS 9.0.11, PAN-OS 9.1.5, PAN-OS 10.0.1, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-11-11T17:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2020-11-13T00:42:00.000Z","lang":"eng","value":"New workaround is available."},{"time":"2020-11-19T21:00:00.000Z","lang":"eng","value":"Updated to mention LSVPN and IPSec based VPN is not affected."}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2000","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-11-11T00:00:00","dateReserved":"2020-11-11T00:00:00","dateUpdated":"2020-11-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection and memory corruption vulnerability","datePublic":"2020-11-11T17:00:00.000Z","providerMetadata":{"dateUpdated":"2020-11-12T00:05:20","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS command injection and memory corruption vulnerability in the PAN-OS management web interface that allows authenticated administrators to disrupt system processes and potentially execute arbitrary code and OS commands with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS command injection and memory corruption vulnerability in the PAN-OS management web interface that allows authenticated administrators to disrupt system processes and potentially execute arbitrary code and OS commands with root privileges.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.16;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.10;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.4;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.1.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.16;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.10;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.4;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.1.\n</pre>"}]}],"x_affectedList":["PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.16","versionType":"custom","changes":[{"at":"8.1.16","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.10","versionType":"custom","changes":[{"at":"9.0.10","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.4","versionType":"custom","changes":[{"at":"9.1.4","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.1","versionType":"custom","changes":[{"at":"10.0.1","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2000"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]},{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]},{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-121 Stack-based Buffer Overflow","cweId":"CWE-121"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-149822","PAN-150013","PAN-150170","CYR-14134","CYR-14135"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59888, and 59891 on a firewall protecting the management interface will block attacks against CVE-2020-2000.\n\nThis issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59888, and 59891 on a firewall protecting the management interface will block attacks against CVE-2020-2000.\n\nThis issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.10, PAN-OS 9.1.4, PAN-OS 10.0.1, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.10, PAN-OS 9.1.4, PAN-OS 10.0.1, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-11-11T17:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2020-11-13T00:47:00.000Z","lang":"eng","value":"Added a new workaround"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2042","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-09-09T00:00:00","dateReserved":"2020-09-09T00:00:00","dateUpdated":"2020-09-09T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Buffer overflow in the management web interface","datePublic":"2020-09-09T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-09-09T16:45:28","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A buffer overflow vulnerability in the PAN-OS management web interface allows authenticated administrators to disrupt system processes and potentially execute arbitrary code with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A buffer overflow vulnerability in the PAN-OS management web interface allows authenticated administrators to disrupt system processes and potentially execute arbitrary code with root privileges.</pre>"}]},{"lang":"en","value":"This issue impacts only PAN-OS 10.0 versions earlier than PAN-OS 10.0.1.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts only PAN-OS 10.0 versions earlier than PAN-OS 10.0.1.\n</pre>"}]}],"x_affectedList":["PAN-OS 10.0.0","PAN-OS 10.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.1.*","status":"unaffected"},{"version":"9.0.*","status":"unaffected"},{"version":"8.1.*","status":"unaffected"},{"version":"10.0","status":"affected","lessThan":"10.0.1","versionType":"custom","changes":[{"at":"10.0.1","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2042"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-121 Stack-based Buffer Overflow","cweId":"CWE-121"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-145797","PAN-150409"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 10.0.1 and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 10.0.1 and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-09-09T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2038","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-09-09T00:00:00","dateReserved":"2020-09-09T00:00:00","dateUpdated":"2021-02-12T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection vulnerability in the management web interface","datePublic":"2020-09-09T16:00:00.000Z","providerMetadata":{"dateUpdated":"2022-09-16T15:06:18","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 9.0 versions earlier than 9.0.10;\nPAN-OS 9.1 versions earlier than 9.1.4;\nPAN-OS 10.0 versions earlier than 10.0.1.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 9.0 versions earlier than 9.0.10;\nPAN-OS 9.1 versions earlier than 9.1.4;\nPAN-OS 10.0 versions earlier than 10.0.1.</pre>"}]}],"x_affectedList":["PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1.*","status":"unaffected"},{"version":"10.0","status":"affected","lessThan":"10.0.1","versionType":"custom","changes":[{"at":"10.0.1","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.10","versionType":"custom","changes":[{"at":"9.0.10","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.4","versionType":"custom","changes":[{"at":"9.1.4","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2038"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Mikhail Klyuchnikov and Nikita Abramov of Positive Technologies for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-101484"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59954 on traffic destined for the GlobalProtect portal, gateway, or VPN will block attacks against CVE-2020-2038.\n\nThis issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59954 on traffic destined for the GlobalProtect portal, gateway, or VPN will block attacks against CVE-2020-2038.\n\nThis issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n\nPalo Alto Networks is aware of publicly available information that may help construct proof of concept exploits for these issues.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n\nPalo Alto Networks is aware of publicly available information that may help construct proof of concept exploits for these issues.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 9.0.10, PAN-OS 9.1.4, PAN-OS 10.0.1, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 9.0.10, PAN-OS 9.1.4, PAN-OS 10.0.1, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-02-12T20:00:00.000Z","lang":"eng","value":"Updated the availability of exploitation resources"},{"time":"2020-09-09T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2037","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-09-09T00:00:00","dateReserved":"2020-09-09T00:00:00","dateUpdated":"2021-02-12T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection vulnerability in the management web interface","datePublic":"2020-09-09T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-09-09T16:45:26","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.16;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.10;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.3.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.16;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.10;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.3.</pre>"}]}],"x_affectedList":["PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.16","versionType":"custom","changes":[{"at":"8.1.16","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.10","versionType":"custom","changes":[{"at":"9.0.10","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.3","versionType":"custom","changes":[{"at":"9.1.3","status":"unaffected"}]},{"version":"10.0.0","status":"unaffected","lessThan":"10.0*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2037"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Mikhail Klyuchnikov of Positive Technologies, and Nicholas Newsom of Palo Alto Networks for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-128761"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59971 on traffic destined for the GlobalProtect portal, gateway, or VPN will block attacks against CVE-2020-2037.\n\nThis issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59971 on traffic destined for the GlobalProtect portal, gateway, or VPN will block attacks against CVE-2020-2037.\n\nThis issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n\nPalo Alto Networks is aware of publicly available information that may help construct proof of concept exploits for these issues.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n\nPalo Alto Networks is aware of publicly available information that may help construct proof of concept exploits for these issues.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.10, PAN-OS 9.1.3, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.10, PAN-OS 9.1.3, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-09-09T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-02-12T20:00:00.000Z","lang":"eng","value":"Updated the availability of exploitation resources"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2036","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-09-09T00:00:00","dateReserved":"2020-09-09T00:00:00","dateUpdated":"2021-02-12T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Reflected Cross-Site Scripting (XSS) vulnerability in management web interface","datePublic":"2020-09-09T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-09-09T18:16:56","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A reflected cross-site scripting (XSS) vulnerability exists in the PAN-OS management web interface. A remote attacker able to convince an administrator with an active authenticated session on the firewall management interface to click on a crafted link to that management web interface could potentially execute arbitrary JavaScript code in the administrator's browser and perform administrative actions.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A reflected cross-site scripting (XSS) vulnerability exists in the PAN-OS management web interface. A remote attacker able to convince an administrator with an active authenticated session on the firewall management interface to click on a crafted link to that management web interface could potentially execute arbitrary JavaScript code in the administrator's browser and perform administrative actions.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.16;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.9.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.16;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.9.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0","status":"affected","lessThan":"9.0.9","versionType":"custom","changes":[{"at":"9.0.9","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"},{"version":"8.1","status":"affected","lessThan":"8.1.16","versionType":"custom","changes":[{"at":"8.1.16","status":"unaffected"}]},{"version":"10.0.0","status":"unaffected","lessThan":"10.0*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2036"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Mikhail Klyuchnikov and Nikita Abramov of Positive Technologies and Ben Nott of Palo Alto Networks for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-79 Cross-site Scripting (XSS)","cweId":"CWE-79"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-116720"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59968 on traffic destined for the GlobalProtect portal, gateway, or VPN will block attacks against CVE-2020-2036.\n\nAdministrators should use caution when they are authenticated to the firewall management web interface and not click or open links from unsolicited sources.  \n\nThis issue impacts the management web interface of PAN-OS. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. \nPlease review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59968 on traffic destined for the GlobalProtect portal, gateway, or VPN will block attacks against CVE-2020-2036.\n\nAdministrators should use caution when they are authenticated to the firewall management web interface and not click or open links from unsolicited sources.  \n\nThis issue impacts the management web interface of PAN-OS. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. \nPlease review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n\nPalo Alto Networks is aware of publicly available information that may help construct proof of concept exploits for these issues.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n\nPalo Alto Networks is aware of publicly available information that may help construct proof of concept exploits for these issues.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.9, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.9, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-09-09T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-02-12T20:00:00.000Z","lang":"eng","value":"Updated the availability of exploitation resources"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2041","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-09-09T00:00:00","dateReserved":"2020-09-09T00:00:00","dateUpdated":"2020-09-09T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Management web interface denial-of-service (DoS)","datePublic":"2020-09-09T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-09-09T16:45:28","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An insecure configuration of the appweb daemon of Palo Alto Networks PAN-OS 8.1 allows a remote unauthenticated user to send a specifically crafted request to the device that causes the appweb service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode.\n\nThis issue impacts all versions of PAN-OS 8.0, and PAN-OS 8.1 versions earlier than 8.1.16.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An insecure configuration of the appweb daemon of Palo Alto Networks PAN-OS 8.1 allows a remote unauthenticated user to send a specifically crafted request to the device that causes the appweb service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode.\n\nThis issue impacts all versions of PAN-OS 8.0, and PAN-OS 8.1 versions earlier than 8.1.16.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0.*","status":"unaffected"},{"version":"9.1.*","status":"unaffected"},{"version":"10.0.*","status":"unaffected"},{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.16","versionType":"custom","changes":[{"at":"8.1.16","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2041"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-16 Configuration","cweId":"CWE-16"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-151978"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue impacts the management web interface of PAN-OS. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue impacts the management web interface of PAN-OS. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.16 and all later PAN-OS versions.\n\nPAN-OS 7.1 and PAN-OS 8.0 are end-of-life and are no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.16 and all later PAN-OS versions.\n\nPAN-OS 7.1 and PAN-OS 8.0 are end-of-life and are no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-09-09T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2034","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-07-08T00:00:00","dateReserved":"2020-07-08T00:00:00","dateUpdated":"2020-07-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection vulnerability in GlobalProtect portal","datePublic":"2020-07-08T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-07-08T16:35:17","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network-based attacker to execute arbitrary OS commands with root privileges. An attacker would require some level of specific information about the configuration of an impacted firewall or perform brute-force attacks to exploit this issue. This issue cannot be exploited if the GlobalProtect portal feature is not enabled.\nThis issue impacts PAN-OS 9.1 versions earlier than PAN-OS 9.1.3; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; all versions of PAN-OS 8.0 and PAN-OS 7.1.\nPrisma Access services are not impacted by this vulnerability. Firewalls that were upgraded to the latest versions of PAN-OS to resolve CVE-2020-2021 are not vulnerable to this issue.\nPalo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network-based attacker to execute arbitrary OS commands with root privileges. An attacker would require some level of specific information about the configuration of an impacted firewall or perform brute-force attacks to exploit this issue. This issue cannot be exploited if the GlobalProtect portal feature is not enabled.\nThis issue impacts PAN-OS 9.1 versions earlier than PAN-OS 9.1.3; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; all versions of PAN-OS 8.0 and PAN-OS 7.1.\nPrisma Access services are not impacted by this vulnerability. Firewalls that were upgraded to the latest versions of PAN-OS to resolve CVE-2020-2021 are not vulnerable to this issue.\nPalo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n</pre>"}]}],"x_affectedList":["PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1.*","status":"affected"},{"version":"9.1","status":"affected","lessThan":"9.1.3","versionType":"custom","changes":[{"at":"9.1.3","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.9","versionType":"custom","changes":[{"at":"9.0.9","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.15","versionType":"custom","changes":[{"at":"8.1.15","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2034"}],"credits":[{"lang":"en","value":"This issue was found by Yamata Li of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-145587"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only where GlobalProtect portal is enabled.","supportingMedia":{"value":"This issue is applicable only where GlobalProtect portal is enabled.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 58658 on traffic destined for the GlobalProtect portal will block attacks against CVE-2020-2034.","supportingMedia":{"value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 58658 on traffic destined for the GlobalProtect portal will block attacks against CVE-2020-2034.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.15, PAN-OS 9.0.9, PAN-OS 9.1.3, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.15, PAN-OS 9.0.9, PAN-OS 9.1.3, and all later PAN-OS versions.","type":"text/html","base64":false}},{"lang":"en","value":"PAN-OS 7.1 and PAN-OS 8.0 are end-of-life (as of June 30, 2020 and October 31, 2019 respectively) and are no longer covered by our Product Security Assurance policies."}],"timeline":[{"time":"2020-07-08T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2020-07-10T06:07:00.000Z","lang":"eng","value":"Updated workaround section with Threat Prevention signature."}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2030","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-07-08T00:00:00","dateReserved":"2020-07-08T00:00:00","dateUpdated":"2020-07-08T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection vulnerability in the management interface","datePublic":"2020-07-08T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-07-08T16:35:16","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges.</pre>"}]},{"lang":"en","value":"This issue impacts PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; and all versions of PAN-OS 7.1 and PAN-OS 8.0.\n\nThis issue does not impact PAN-OS 9.0, PAN-OS 9.1, or Prisma Access services.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; and all versions of PAN-OS 7.1 and PAN-OS 8.0.\n\nThis issue does not impact PAN-OS 9.0, PAN-OS 9.1, or Prisma Access services.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.15","versionType":"custom","changes":[{"at":"8.1.15","status":"unaffected"}]},{"version":"9.0.0","status":"unaffected","lessThan":"9.0*","versionType":"custom"},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2030"}],"credits":[{"lang":"en","value":"This issue was found by Jin Chen of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-100226","PAN-102677"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue impacts the PAN-OS management interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue impacts the PAN-OS management interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.15 and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.15 and all later PAN-OS versions.","type":"text/html","base64":false}},{"lang":"en","value":"PAN-OS 7.1 and PAN-OS 8.0 are end-of-life (as of June 30, 2020 and October 31, 2019 respectively) and are no longer covered by our Product Security Assurance policies."}],"timeline":[{"time":"2020-07-08T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2027","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-06-10T00:00:00","dateReserved":"2020-06-10T00:00:00","dateUpdated":"2020-06-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Buffer overflow in authd authentication response","datePublic":"2020-06-10T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-10T17:28:15","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A buffer overflow vulnerability in the authd component of the PAN-OS management server allows authenticated administrators to disrupt system processes and potentially execute arbitrary code with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A buffer overflow vulnerability in the authd component of the PAN-OS management server allows authenticated administrators to disrupt system processes and potentially execute arbitrary code with root privileges.</pre>"}]},{"lang":"en","value":"This issue affects:\nAll versions of PAN-OS 7.1 and PAN-OS 8.0;\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.13;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.7.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\nAll versions of PAN-OS 7.1 and PAN-OS 8.0;\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.13;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.7.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"affected"},{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2027"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-121 Stack-based Buffer Overflow","cweId":"CWE-121"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["CYR-10833"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and you can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and you can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7, PAN-OS 9.1.0, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7, PAN-OS 9.1.0, and all later PAN-OS versions.","type":"text/html","base64":false}},{"lang":"en","value":"PAN-OS 8.0 is end-of-life (as of October 31, 2019) and is no longer covered by our Product Security Assurance policies.\nPAN-OS 7.1 is on extended support until June 30, 2020, and we are considering updates only for critical security vulnerability fixes.\n"}],"timeline":[{"time":"2020-06-10T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2028","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-06-10T00:00:00","dateReserved":"2020-06-10T00:00:00","dateUpdated":"2020-06-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection vulnerability in FIPS-CC mode certificate verification","datePublic":"2020-06-10T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-10T17:28:28","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS Command Injection vulnerability in PAN-OS management server allows authenticated administrators to execute arbitrary OS commands with root privileges when uploading a new certificate in FIPS-CC mode.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS Command Injection vulnerability in PAN-OS management server allows authenticated administrators to execute arbitrary OS commands with root privileges when uploading a new certificate in FIPS-CC mode.</pre>"}]},{"lang":"en","value":"This issue affects:\nAll versions of PAN-OS 7.1 and PAN-OS 8.0;\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.13;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.7.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\nAll versions of PAN-OS 7.1 and PAN-OS 8.0;\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.13;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.7.\n</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"affected"},{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2028"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-125804"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and you can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and you can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7, PAN-OS 9.1.0, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7, PAN-OS 9.1.0, and all later PAN-OS versions.","type":"text/html","base64":false}},{"lang":"en","value":"PAN-OS 8.0 is end-of-life (as of October 31, 2019) and is no longer covered by our Product Security Assurance policies.\nPAN-OS 7.1 is on extended support until June 30, 2020, and we are considering updates only for critical security vulnerability fixes."}],"timeline":[{"time":"2020-06-10T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2029","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-06-10T00:00:00","dateReserved":"2020-06-10T00:00:00","dateUpdated":"2020-06-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection vulnerability in management interface certificate generator","datePublic":"2020-06-10T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-10T17:28:40","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS Command Injection vulnerability in the PAN-OS web management interface allows authenticated administrators to execute arbitrary OS commands with root privileges by sending a malicious request to generate new certificates for use in the PAN-OS configuration.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS Command Injection vulnerability in the PAN-OS web management interface allows authenticated administrators to execute arbitrary OS commands with root privileges by sending a malicious request to generate new certificates for use in the PAN-OS configuration.</pre>"}]},{"lang":"en","value":"This issue affects:\nAll versions of PAN-OS 8.0;\nPAN-OS 7.1 versions earlier than PAN-OS 7.1.26;\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.13.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\nAll versions of PAN-OS 8.0;\nPAN-OS 7.1 versions earlier than PAN-OS 7.1.26;\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.13.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0.0","status":"unaffected","lessThan":"9.0*","versionType":"custom"},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2029"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Przemysław Kowalski of STM Solutions for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-124621"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and you can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and you can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, and all later PAN-OS versions.","type":"text/html","base64":false}},{"lang":"en","value":"PAN-OS 8.0 is end-of-life (as of October 31, 2019) and is no longer covered by our Product Security Assurance policies.\nPAN-OS 7.1 is on extended support until June 30, 2020, and we are considering updates only for critical security vulnerability fixes.\n"}],"timeline":[{"time":"2020-06-10T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2012","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Panorama: XML external entity reference ('XXE') vulnerability leads the to information leak","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-10T17:23:19","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"Improper restriction of XML external entity reference ('XXE') vulnerability in Palo Alto Networks Panorama management service allows remote unauthenticated attackers with network access to the Panorama management interface to read arbitrary files on the system.\n\nThis issue affects:\nAll versions of PAN-OS for Panorama 7.1 and 8.0;\nPAN-OS for Panorama 8.1 versions earlier than 8.1.13;\nPAN-OS for Panorama 9.0 versions earlier than 9.0.7.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Improper restriction of XML external entity reference ('XXE') vulnerability in Palo Alto Networks Panorama management service allows remote unauthenticated attackers with network access to the Panorama management interface to read arbitrary files on the system.\n\nThis issue affects:\nAll versions of PAN-OS for Panorama 7.1 and 8.0;\nPAN-OS for Panorama 8.1 versions earlier than 8.1.13;\nPAN-OS for Panorama 9.0 versions earlier than 9.0.7.\n</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2012"}],"credits":[{"lang":"en","value":"This issue was found by Ben Nott of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-611 Improper Restriction of XML External Entity Reference ('XXE')","cweId":"CWE-611"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-119810"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7, PAN-OS 9.1.0, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7, PAN-OS 9.1.0, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2010","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Authenticated user command injection vulnerability","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-10T17:22:50","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS command injection vulnerability in PAN-OS management interface allows an authenticated administrator to execute arbitrary OS commands with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS command injection vulnerability in PAN-OS management interface allows an authenticated administrator to execute arbitrary OS commands with root privileges.</pre>"}]},{"lang":"en","value":"This issue affects:\nAll versions of PAN-OS 7.1 and 8.0;\nPAN-OS 8.1 versions earlier than 8.1.14;\nPAN-OS 9.0 versions earlier than 9.0.7.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\nAll versions of PAN-OS 7.1 and 8.0;\nPAN-OS 8.1 versions earlier than 8.1.14;\nPAN-OS 9.0 versions earlier than 9.0.7.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1.*","status":"affected"},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.14","versionType":"custom","changes":[{"at":"8.1.14","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2010"}],"credits":[{"lang":"en","value":"This issue was discovered by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-126362"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, PAN-OS 9.1.0, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, PAN-OS 9.1.0, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2009","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Panorama SD WAN arbitrary file creation","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-13T19:07:14","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An external control of filename vulnerability in the SD WAN component of Palo Alto Networks PAN-OS Panorama allows an authenticated administrator to send a request that results in the creation and write of an arbitrary file on all firewalls managed by the Panorama. In some cases this results in arbitrary code execution with root permissions.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An external control of filename vulnerability in the SD WAN component of Palo Alto Networks PAN-OS Panorama allows an authenticated administrator to send a request that results in the creation and write of an arbitrary file on all firewalls managed by the Panorama. In some cases this results in arbitrary code execution with root permissions.</pre>"}]},{"lang":"en","value":"This issue affects:\n\nAll versions of PAN-OS 7.1 and 8.0;\n\nPAN-OS 8.1 versions earlier than 8.1.14;\n\nPAN-OS 9.0 versions earlier than 9.0.7.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\n\nAll versions of PAN-OS 7.1 and 8.0;\n\nPAN-OS 8.1 versions earlier than 8.1.14;\n\nPAN-OS 9.0 versions earlier than 9.0.7.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"affected"},{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.14","versionType":"custom","changes":[{"at":"8.1.14","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2009"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom and Jin Chen of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-73 External Control of File Name or Path","cweId":"CWE-73"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-130361"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2013","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Panorama context switch session cookie disclosure","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-14T15:40:56","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A cleartext transmission of sensitive information vulnerability in Palo Alto Networks PAN-OS Panorama that discloses an authenticated PAN-OS administrator's PAN-OS session cookie. When an administrator issues a context switch request into a managed firewall with an affected PAN-OS Panorama version, their PAN-OS session cookie is transmitted over cleartext to the firewall. An attacker with the ability to intercept this network traffic between the firewall and Panorama can access the administrator's account and further manipulate devices managed by Panorama.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A cleartext transmission of sensitive information vulnerability in Palo Alto Networks PAN-OS Panorama that discloses an authenticated PAN-OS administrator's PAN-OS session cookie. When an administrator issues a context switch request into a managed firewall with an affected PAN-OS Panorama version, their PAN-OS session cookie is transmitted over cleartext to the firewall. An attacker with the ability to intercept this network traffic between the firewall and Panorama can access the administrator's account and further manipulate devices managed by Panorama.</pre>"}]},{"lang":"en","value":"This issue affects:\n\nPAN-OS 7.1 versions earlier than 7.1.26;\n\nPAN-OS 8.1 versions earlier than 8.1.13;\n\nPAN-OS 9.0 versions earlier than 9.0.6;\n\nPAN-OS 9.1 versions earlier than 9.1.1;\n\nAll version of PAN-OS 8.0;","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\n\nPAN-OS 7.1 versions earlier than 7.1.26;\n\nPAN-OS 8.1 versions earlier than 8.1.13;\n\nPAN-OS 9.0 versions earlier than 9.0.6;\n\nPAN-OS 9.1 versions earlier than 9.1.1;\n\nAll version of PAN-OS 8.0;</pre>"}]}],"x_affectedList":["PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"9.0","status":"affected","lessThan":"9.0.6","versionType":"custom","changes":[{"at":"9.0.6","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.1","versionType":"custom","changes":[{"at":"9.1.1","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2013"}],"credits":[{"lang":"en","value":"This issue was found by Ben Nott of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.3,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-319 Cleartext Transmission of Sensitive Information","cweId":"CWE-319"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-125122"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"One possible vulnerability mitigation is to shorten the length of administrator session idle timeout. This reduces the likelihood the exposed administrator’s session cookie is valid at time of attack.","supportingMedia":{"value":"One possible vulnerability mitigation is to shorten the length of administrator session idle timeout. This reduces the likelihood the exposed administrator’s session cookie is valid at time of attack.","type":"text/html","base64":false}},{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com"}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, PAN-OS 9.1.1, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, PAN-OS 9.1.1, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2002","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Spoofed Kerberos key distribution center authentication bypass","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-14T15:40:56","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An authentication bypass by spoofing vulnerability exists in the authentication daemon and User-ID components of Palo Alto Networks PAN-OS by failing to verify the integrity of the Kerberos key distribution center (KDC) before authenticating users. This affects all forms of authentication that use a Kerberos authentication profile. A man-in-the-middle type of attacker with the ability to intercept communication between PAN-OS and KDC can login to PAN-OS as an administrator. ","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An authentication bypass by spoofing vulnerability exists in the authentication daemon and User-ID components of Palo Alto Networks PAN-OS by failing to verify the integrity of the Kerberos key distribution center (KDC) before authenticating users. This affects all forms of authentication that use a Kerberos authentication profile. A man-in-the-middle type of attacker with the ability to intercept communication between PAN-OS and KDC can login to PAN-OS as an administrator. </pre>"}]},{"lang":"en","value":"This issue affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.6;\nAll version of PAN-OS 8.0.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.6;\nAll version of PAN-OS 8.0.\n</pre>"}]}],"x_affectedList":["PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.6","versionType":"custom","changes":[{"at":"9.0.6","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2002"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Yoav Iellin, Yaron Kassner, and Rotem Zach from Silverfort for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-290 Authentication Bypass by Spoofing","cweId":"CWE-290"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-118957"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Ensure that PAN-OS communicates to Kerberos server over a secured network with access restricted to trusted users.\n\nPlease review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","supportingMedia":{"value":"Ensure that PAN-OS communicates to Kerberos server over a secured network with access restricted to trusted users.\n\nPlease review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2001","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-09-11T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Panorama External control of file vulnerability leads to privilege escalation","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-14T15:40:56","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An external control of path and data vulnerability in the Palo Alto Networks PAN-OS Panorama XSLT processing logic that allows an unauthenticated user with network access to PAN-OS management interface to write attacker supplied file on the system and elevate privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An external control of path and data vulnerability in the Palo Alto Networks PAN-OS Panorama XSLT processing logic that allows an unauthenticated user with network access to PAN-OS management interface to write attacker supplied file on the system and elevate privileges.</pre>"}]},{"lang":"en","value":"This issue affects:\n\nAll PAN-OS 7.1 Panorama and 8.0 Panorama versions;\n\nPAN-OS 8.1 versions earlier than 8.1.12 on Panorama;\n\nPAN-OS 9.0 versions earlier than 9.0.6 on Panorama.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\n\nAll PAN-OS 7.1 Panorama and 8.0 Panorama versions;\n\nPAN-OS 8.1 versions earlier than 8.1.12 on Panorama;\n\nPAN-OS 9.0 versions earlier than 9.0.6 on Panorama.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.12","versionType":"custom","changes":[{"at":"8.1.12","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.6","versionType":"custom","changes":[{"at":"9.0.6","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2001"}],"credits":[{"lang":"en","value":"This issue was found by Ben Nott of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-123 Write-what-where Condition","cweId":"CWE-123"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-120397"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue impacts the management web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue impacts the management web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.12, PAN-OS 9.0.6, and all later PAN-OS versions.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.12, PAN-OS 9.0.6, and all later PAN-OS versions.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2020-09-11T22:06:00.000Z","lang":"eng","value":"Added workaround section"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2017","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: DOM-Based cross site scripting vulnerability in management web interface","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-10T17:24:05","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A DOM-Based Cross Site Scripting Vulnerability exists in PAN-OS and Panorama Management Web Interfaces.\nA remote attacker able to convince an authenticated administrator to click on a crafted link to PAN-OS and Panorama Web Interfaces could execute arbitrary JavaScript code in the administrator's browser and perform administrative actions.\n\nThis issue affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.6;\nAll versions of PAN-OS 8.0.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A DOM-Based Cross Site Scripting Vulnerability exists in PAN-OS and Panorama Management Web Interfaces.\nA remote attacker able to convince an authenticated administrator to click on a crafted link to PAN-OS and Panorama Web Interfaces could execute arbitrary JavaScript code in the administrator's browser and perform administrative actions.\n\nThis issue affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.6;\nAll versions of PAN-OS 8.0.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.6","versionType":"custom","changes":[{"at":"9.0.6","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2017"}],"credits":[{"lang":"en","value":"This issue was found by Chris Ganas of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-79 Cross-site Scripting (XSS)","cweId":"CWE-79"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-121058"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, PAN-OS 9.1.0, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, PAN-OS 9.1.0, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2014","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS injection vulnerability in PAN-OS management server","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-13T19:07:14","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS Command Injection vulnerability in PAN-OS management server allows authenticated users to inject and execute arbitrary shell commands with root privileges.\n\nThis issue affects:\nAll versions of PAN-OS 7.1 and 8.0;\nPAN-OS 8.1 versions earlier than 8.1.14;\nPAN-OS 9.0 versions earlier than 9.0.7.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS Command Injection vulnerability in PAN-OS management server allows authenticated users to inject and execute arbitrary shell commands with root privileges.\n\nThis issue affects:\nAll versions of PAN-OS 7.1 and 8.0;\nPAN-OS 8.1 versions earlier than 8.1.14;\nPAN-OS 9.0 versions earlier than 9.0.7.\n</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.14","versionType":"custom","changes":[{"at":"8.1.14","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2014"}],"credits":[{"lang":"en","value":"This issue was found by Ben Nott of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-127118"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, PAN-OS 9.1.0 and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, PAN-OS 9.1.0 and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2020-0006","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Nginx software upgraded to resolve multiple vulnerabilities","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"Nginx software included with PAN-OS has been upgraded to resolve multiple vulnerabilities.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Nginx software included with PAN-OS has been upgraded to resolve multiple vulnerabilities.</pre>"}]},{"lang":"en","value":"This issue affects:\n\nAll PAN-OS 7.1 and 8.0 versions;\n\nPAN-OS 8.1 versions earlier than 8.1.14;\n\nPAN-OS 9.0 versions earlier than 9.0.7.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\n\nAll PAN-OS 7.1 and 8.0 versions;\n\nPAN-OS 8.1 versions earlier than 8.1.14;\n\nPAN-OS 9.0 versions earlier than 9.0.7.</pre>"}]},{"lang":"en","value":"The resolved vulnerabilities include:","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The resolved vulnerabilities include:</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"affected"},{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.14","versionType":"custom","changes":[{"at":"8.1.14","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2012"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-476 NULL Pointer Dereference","cweId":"CWE-476"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-117480"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"Issues that affect the management interface of PAN-OS are strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","supportingMedia":{"value":"Issues that affect the management interface of PAN-OS are strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"These issues are fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"These issues are fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2006","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Buffer overflow in management server payload parser","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-13T19:07:14","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A stack-based buffer overflow vulnerability in the management server component of PAN-OS that allows an authenticated user to potentially execute arbitrary code with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A stack-based buffer overflow vulnerability in the management server component of PAN-OS that allows an authenticated user to potentially execute arbitrary code with root privileges.</pre>"}]},{"lang":"en","value":"This issue affects:\n\nAll versions of PAN-OS 7.1 and 8.0;\n\nPAN-OS 8.1 versions earlier than 8.1.14.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\n\nAll versions of PAN-OS 7.1 and 8.0;\n\nPAN-OS 8.1 versions earlier than 8.1.14.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"affected"},{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.14","versionType":"custom","changes":[{"at":"8.1.14","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2006"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Jin Chen of Palo Alto Networks for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-121 Stack-based Buffer Overflow","cweId":"CWE-121"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-100855"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.14 and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.14 and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2020-0005","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OpenSSH software upgraded to resolve multiple vulnerabilities","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"OpenSSH software included with PAN-OS has been upgraded to resolve security vulnerability CVE-2016-10012. Additionally, code changes have been made to the server component of the OpenSSH software included in PAN-OS in response to CVE-2015-8325 and CVE-2016-1908 though PAN-OS is not impacted by these issues.\n\nThis issues affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.1;\nAll versions of PAN-OS 8.0.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>OpenSSH software included with PAN-OS has been upgraded to resolve security vulnerability CVE-2016-10012. Additionally, code changes have been made to the server component of the OpenSSH software included in PAN-OS in response to CVE-2015-8325 and CVE-2016-1908 though PAN-OS is not impacted by these issues.\n\nThis issues affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.1;\nAll versions of PAN-OS 8.0.\n</pre>"}]}],"x_affectedList":["PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.1","versionType":"custom","changes":[{"at":"9.0.1","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2020-0005"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-111061"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.1, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.1, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2008","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection or arbitrary file deletion vulnerability","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-13T19:07:14","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS command injection and external control of filename vulnerability in Palo Alto Networks PAN-OS allows authenticated administrators to execute code with root privileges or delete arbitrary system files and impact the system's integrity or cause a denial of service condition.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS command injection and external control of filename vulnerability in Palo Alto Networks PAN-OS allows authenticated administrators to execute code with root privileges or delete arbitrary system files and impact the system's integrity or cause a denial of service condition.</pre>"}]},{"lang":"en","value":"This issue affects:\nAll versions of PAN-OS 7.1 and 8.0;\nPAN-OS 8.1 versions earlier than 8.1.14.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\nAll versions of PAN-OS 7.1 and 8.0;\nPAN-OS 8.1 versions earlier than 8.1.14.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.14","versionType":"custom","changes":[{"at":"8.1.14","status":"unaffected"}]},{"version":"9.0.0","status":"unaffected","lessThan":"9.0*","versionType":"custom"},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2008"}],"credits":[{"lang":"en","value":"This issue was found by Jin Chen of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-73 External Control of File Name or Path","cweId":"CWE-73"}]},{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-102688"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.14 and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.14 and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2015","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Buffer overflow in the management server","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-10T17:23:49","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A buffer overflow vulnerability in the PAN-OS management server allows authenticated users to crash system processes or potentially execute arbitrary code with root privileges.\n\nThis issue affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.7;\nPAN-OS 9.1 versions earlier than 9.1.1;\nAll versions of PAN-OS 8.0.\n\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A buffer overflow vulnerability in the PAN-OS management server allows authenticated users to crash system processes or potentially execute arbitrary code with root privileges.\n\nThis issue affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.7;\nPAN-OS 9.1 versions earlier than 9.1.1;\nAll versions of PAN-OS 8.0.\n\n</pre>"}]}],"x_affectedList":["PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.1","versionType":"custom","changes":[{"at":"9.1.1","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2015"}],"credits":[{"lang":"en","value":"This issue was discovered by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-120 Buffer Overflow","cweId":"CWE-120"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-100734"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.7, PAN-OS 9.1.1, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.7, PAN-OS 9.1.1, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2005","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: GlobalProtect Clientless VPN session hijacking","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-14T15:40:56","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A cross-site scripting (XSS) vulnerability exists when visiting malicious websites with the Palo Alto Networks GlobalProtect Clientless VPN that can compromise the user's active session.\nThis issue affects:\n\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.7;\nAll versions of PAN-OS 8.0.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A cross-site scripting (XSS) vulnerability exists when visiting malicious websites with the Palo Alto Networks GlobalProtect Clientless VPN that can compromise the user's active session.\nThis issue affects:\n\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.7;\nAll versions of PAN-OS 8.0.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2005"}],"credits":[{"lang":"en","value":"This issue was discovered by Ron Masas of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":7.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-79 Cross-site Scripting (XSS)","cweId":"CWE-79"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["GPCON-551"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"This issue only affects firewalls configured with GlobalProtect Clientless VPN.","supportingMedia":{"value":"This issue only affects firewalls configured with GlobalProtect Clientless VPN.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Configure GlobalProtect Clientless VPN to only access known trusted websites, and block access all other websites.","supportingMedia":{"value":"Configure GlobalProtect Clientless VPN to only access known trusted websites, and block access all other websites.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.7, and all later versions of PAN-OS.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.7, and all later versions of PAN-OS.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2007","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection in management server","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-13T19:07:14","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS command injection vulnerability in the management server component of PAN-OS allows an authenticated user to potentially execute arbitrary commands with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS command injection vulnerability in the management server component of PAN-OS allows an authenticated user to potentially execute arbitrary commands with root privileges.</pre>"}]},{"lang":"en","value":"This issue affects:\n\nAll PAN-OS 7.1 and 8.0 versions;\n\nPAN-OS 8.1 versions earlier than 8.1.14;\n\nPAN-OS 9.0 versions earlier than 9.0.7. ","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\n\nAll PAN-OS 7.1 and 8.0 versions;\n\nPAN-OS 8.1 versions earlier than 8.1.14;\n\nPAN-OS 9.0 versions earlier than 9.0.7. </pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"affected"},{"version":"8.0.*","status":"affected"},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.14","versionType":"custom","changes":[{"at":"8.1.14","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2007"}],"credits":[{"lang":"en","value":"This issue was found by Jin Chen of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-102682"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 9.0.7 and later PAN-OS 9.0 versions; PAN-OS 8.1.14 and later PAN-OS 8.1 versions; and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"This issue is fixed in PAN-OS 9.0.7 and later PAN-OS 9.0 versions; PAN-OS 8.1.14 and later PAN-OS 8.1 versions; and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2011","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-20T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Panorama registration denial of service","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-13T19:07:14","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An improper input validation vulnerability in the configuration daemon of Palo Alto Networks PAN-OS Panorama allows for a remote unauthenticated user to send a specifically crafted registration request to the device that causes the configuration service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS Panorama services by restarting the device and putting it into maintenance mode.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An improper input validation vulnerability in the configuration daemon of Palo Alto Networks PAN-OS Panorama allows for a remote unauthenticated user to send a specifically crafted registration request to the device that causes the configuration service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS Panorama services by restarting the device and putting it into maintenance mode.</pre>"}]},{"lang":"en","value":"This issue affects:\n\nAll versions of PAN-OS 7.1 and 8.0;\n\nPAN-OS 8.1 versions earlier than 8.1.14;\n\nPAN-OS 9.0 versions earlier than 9.0.7;","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\n\nAll versions of PAN-OS 7.1 and 8.0;\n\nPAN-OS 8.1 versions earlier than 8.1.14;\n\nPAN-OS 9.0 versions earlier than 9.0.7;</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"affected"},{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.14","versionType":"custom","changes":[{"at":"8.1.14","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2011"}],"credits":[{"lang":"en","value":"This issue was found by Ben Nott of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-118226"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issues affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","supportingMedia":{"value":"This issues affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, PAN-OS 9.1.0 and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, PAN-OS 9.1.0 and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2020-05-20T19:00:00.000Z","lang":"eng","value":"Removed 9.1.0 from affected releases"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2016","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Temporary file race condition vulnerability in PAN-OS leads to local privilege escalation","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-10T17:24:03","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A race condition due to insecure creation of a file in a temporary directory vulnerability in PAN-OS allows for root privilege escalation from a limited linux user account.\n\nThis allows an attacker who has escaped the restricted shell as a low privilege administrator, possibly by exploiting another vulnerability, to escalate privileges to become root user.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A race condition due to insecure creation of a file in a temporary directory vulnerability in PAN-OS allows for root privilege escalation from a limited linux user account.\n\nThis allows an attacker who has escaped the restricted shell as a low privilege administrator, possibly by exploiting another vulnerability, to escalate privileges to become root user.</pre>"}]},{"lang":"en","value":"This issue affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.6;\nAll versions of PAN-OS 8.0.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.6;\nAll versions of PAN-OS 8.0.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.6","versionType":"custom","changes":[{"at":"9.0.6","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2016"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks the UK's National Cyber Security Centre (NCSC) for discovering and reporting this issue."},{"lang":"en","value":"Palo Alto Networks thanks the NCC Group for finding this issue independently during a contracted PAN-OS security assessment."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-377 Insecure Temporary File","cweId":"CWE-377"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-128248"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, PAN-OS 9.1.0, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, PAN-OS 9.1.0, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-1992","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-04-08T00:00:00","dateReserved":"2020-04-08T00:00:00","dateUpdated":"2020-04-08T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS on PA-7000 Series: Varrcvr daemon network-based denial of service or privilege escalation","datePublic":"2020-04-08T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-04-08T18:41:58","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A format string vulnerability in the Varrcvr daemon of PAN-OS on PA-7000 Series devices with a Log Forwarding Card (LFC) allows remote attackers to crash the daemon creating a denial of service condition or potentially execute code with root privileges.\n\nThis issue affects Palo Alto Networks PAN-OS 9.0 versions before 9.0.7; PAN-OS 9.1 versions before 9.1.2 on PA-7000 Series devices with an LFC installed and configured.\n\nThis issue requires WildFire services to be configured and enabled.\n\nThis issue does not affect PAN-OS 8.1 and earlier releases.\n\nThis issue does not affect any other PA Series firewalls.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A format string vulnerability in the Varrcvr daemon of PAN-OS on PA-7000 Series devices with a Log Forwarding Card (LFC) allows remote attackers to crash the daemon creating a denial of service condition or potentially execute code with root privileges.\n\nThis issue affects Palo Alto Networks PAN-OS 9.0 versions before 9.0.7; PAN-OS 9.1 versions before 9.1.2 on PA-7000 Series devices with an LFC installed and configured.\n\nThis issue requires WildFire services to be configured and enabled.\n\nThis issue does not affect PAN-OS 8.1 and earlier releases.\n\nThis issue does not affect any other PA Series firewalls.</pre>"}]}],"x_affectedList":["PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.2","versionType":"custom","changes":[{"at":"9.1.2","status":"unaffected"}]}],"platforms":["PA-7000 series with LFC"]},{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1.*","status":"unaffected"},{"version":"8.0.*","status":"unaffected"},{"version":"7.1.*","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-1992"}],"credits":[{"lang":"en","value":"This issue was found by a customer."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-134 Use of Externally-Controlled Format String","cweId":"CWE-134"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-135103"],"discovery":"USER"},"configurations":[{"lang":"en","value":"This issue requires WildFire services to be configured and enabled.","supportingMedia":{"value":"This issue requires WildFire services to be configured and enabled.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"There are no viable workarounds for this issue.","supportingMedia":{"value":"There are no viable workarounds for this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 9.0.7, PAN-OS 9.1.2 and all later versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 9.0.7, PAN-OS 9.1.2 and all later versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-04-08T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-1990","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-04-08T00:00:00","dateReserved":"2020-04-08T00:00:00","dateUpdated":"2020-04-08T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Buffer overflow in the management server","datePublic":"2020-04-08T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-04-08T18:41:58","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A stack-based buffer overflow vulnerability in the management server component of PAN-OS allows an authenticated user to upload a corrupted PAN-OS configuration and potentially execute code with root privileges.\n\nThis issue affects Palo Alto Networks PAN-OS 8.1 versions before 8.1.13; 9.0 versions before 9.0.7.\nThis issue does not affect PAN-OS 7.1.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A stack-based buffer overflow vulnerability in the management server component of PAN-OS allows an authenticated user to upload a corrupted PAN-OS configuration and potentially execute code with root privileges.\n\nThis issue affects Palo Alto Networks PAN-OS 8.1 versions before 8.1.13; 9.0 versions before 9.0.7.\nThis issue does not affect PAN-OS 7.1.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"unaffected"},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-1990"}],"credits":[{"lang":"en","value":"This issue was discovered by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-121 Stack-based Buffer Overflow","cweId":"CWE-121"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-121319"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"These issues affect the management interface of PAN-OS and are strongly mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 9.0 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","supportingMedia":{"value":"These issues affect the management interface of PAN-OS and are strongly mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 9.0 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7 and all later versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7 and all later versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-04-08T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-1979","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-03-11T00:00:00","dateReserved":"2020-03-11T00:00:00","dateUpdated":"2020-05-12T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: A format string vulnerability in PAN-OS log daemon (logd) on Panorama allows local privilege escalation","datePublic":"2020-03-11T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-13T19:07:13","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A format string vulnerability in the PAN-OS log daemon (logd) on Panorama allows a network based attacker with knowledge of registered firewall devices and access to Panorama management interfaces to execute arbitrary code, bypassing the restricted shell and escalating privileges.\nThis issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13 on Panorama.\nThis issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A format string vulnerability in the PAN-OS log daemon (logd) on Panorama allows a network based attacker with knowledge of registered firewall devices and access to Panorama management interfaces to execute arbitrary code, bypassing the restricted shell and escalating privileges.\nThis issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13 on Panorama.\nThis issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0.0","status":"unaffected","lessThan":"9.0*","versionType":"custom"},{"version":"7.1.0","status":"unaffected","lessThan":"7.1*","versionType":"custom"},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-1979"}],"credits":[{"lang":"en","value":"This issue was discovered by Nicholas Newsom of Palo Alto Networks during an internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-134 Use of Externally-Controlled Format String","cweId":"CWE-134"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-97584"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"This issue affects the management interface of Panorama and is mitigated by following best practices for securing the Panorama management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 8.1 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.","supportingMedia":{"value":"This issue affects the management interface of Panorama and is mitigated by following best practices for securing the Panorama management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 8.1 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.13 and all later PAN-OS 8.1 versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.13 and all later PAN-OS 8.1 versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-03-11T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2020-05-12T16:00:00.000Z","lang":"eng","value":"Updated attack vector, description and acknowledgement."}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-1981","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-03-11T00:00:00","dateReserved":"2020-03-11T00:00:00","dateUpdated":"2020-03-11T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Predictable temporary filename vulnerability allows local privilege escalation","datePublic":"2020-03-11T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-03-11T18:58:14","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A predictable temporary filename vulnerability in PAN-OS allows local privilege escalation.\nThis issue allows a local attacker who bypassed the restricted shell to execute commands as a low privileged user and gain root access on the PAN-OS hardware or virtual appliance.\nThis issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13.\nThis issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A predictable temporary filename vulnerability in PAN-OS allows local privilege escalation.\nThis issue allows a local attacker who bypassed the restricted shell to execute commands as a low privileged user and gain root access on the PAN-OS hardware or virtual appliance.\nThis issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13.\nThis issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"7.1.0","status":"unaffected","lessThan":"7.1*","versionType":"custom"},{"version":"9.0.0","status":"unaffected","lessThan":"9.0*","versionType":"custom"},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-1981"}],"credits":[{"lang":"en","value":"This issue was found during an internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-377 Insecure Temporary File","cweId":"CWE-377"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-103038"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 8.1 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 8.1 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.13 and all later PAN-OS 8.1 versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.13 and all later PAN-OS 8.1 versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-03-11T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-1980","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-03-11T00:00:00","dateReserved":"2020-03-11T00:00:00","dateUpdated":"2020-03-11T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Shell injection vulnerability in PAN-OS CLI allows execution of shell commands","datePublic":"2020-03-11T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-03-11T18:58:17","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A shell command injection vulnerability in the PAN-OS CLI allows a local authenticated user to escape the restricted shell and escalate privileges.\nThis issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13.\nThis issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A shell command injection vulnerability in the PAN-OS CLI allows a local authenticated user to escape the restricted shell and escalate privileges.\nThis issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13.\nThis issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0.0","status":"unaffected","lessThan":"9.0*","versionType":"custom"},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"},{"version":"7.1.0","status":"unaffected","lessThan":"7.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-1980"}],"credits":[{"lang":"en","value":"This issue was discovered during an internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')","cweId":"CWE-77"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-102674"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 8.1 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 8.1 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.13, and all later versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.13, and all later versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-03-11T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-17437","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-12-04T17:00:00.000Z","dateReserved":"2019-12-04T17:00:00.000Z"},"containers":{"cna":{"title":"PAN-OS: Custom-role users may escalate privileges","datePublic":"2019-12-04T17:00:00.000Z","providerMetadata":{"dateUpdated":"2019-12-05T14:11:11","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An improper authentication check in Palo Alto Networks PAN-OS may allow an authenticated low privileged non-superuser custom role user to elevate privileges and become superuser.\nThis issue affects PAN-OS 7.1 versions prior to 7.1.25; 8.0 versions prior to 8.0.20; 8.1 versions prior to 8.1.11; 9.0 versions prior to 9.0.5.\nPAN-OS version 7.0 and prior EOL versions have not been evaluated for this issue.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An improper authentication check in Palo Alto Networks PAN-OS may allow an authenticated low privileged non-superuser custom role user to elevate privileges and become superuser.\nThis issue affects PAN-OS 7.1 versions prior to 7.1.25; 8.0 versions prior to 8.0.20; 8.1 versions prior to 8.1.11; 9.0 versions prior to 9.0.5.\nPAN-OS version 7.0 and prior EOL versions have not been evaluated for this issue.\n</pre>"}]}],"x_affectedList":["PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1","status":"affected","lessThan":"7.1.25","versionType":"custom","changes":[{"at":"7.1.25","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThan":"8.0.20","versionType":"custom","changes":[{"at":"8.0.20","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.11","versionType":"custom","changes":[{"at":"8.1.11","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.5","versionType":"custom","changes":[{"at":"9.0.5","status":"unaffected"}]},{"version":"unspecified","status":"unknown","lessThanOrEqual":"7.0","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-17437"}],"credits":[{"lang":"en","value":"Christophe Schleypen of NCIA / NCIRC"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-280 Improper Handling of Insufficient Permissions or Privileges ","cweId":"CWE-280"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-115697"],"advisory":"PAN-SA-2019-0038","discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This issue only affects devices configured with a low privileged custom role user with any combination of roles or privileges.","supportingMedia":{"value":"This issue only affects devices configured with a low privileged custom role user with any combination of roles or privileges.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Remove any untrusted custom-role users from the device or disable their access until fixes can be applied. Restrict access to the device to only trusted users.","supportingMedia":{"value":"Remove any untrusted custom-role users from the device or disable their access until fixes can be applied. Restrict access to the device to only trusted users.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue has been resolved in 7.1.25, 8.0.20, 8.1.11, 9.0.5 and all subsequent versions.","supportingMedia":{"value":"This issue has been resolved in 7.1.25, 8.0.20, 8.1.11, 9.0.5 and all subsequent versions.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-1582","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-08-21T22:13:00.000Z","dateReserved":"2019-08-21T22:13:00.000Z"},"containers":{"cna":{"title":"Memory Corruption in PAN-OS","datePublic":"2019-08-21T22:13:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:48","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"Palo Alto Networks is aware of a memory corruption vulnerability in PAN-OS. (Ref: # PAN-123700/ CVE-2019-1582).\nSuccessful exploitation of this issue may allow an administrative user to cause arbitrary memory corruption by rekeying the current client interactive session.\nThis issue affects PAN-OS 8.1.9 and earlier, and PAN-OS 9.0.3 and earlier.  PAN-OS 7.1 and 8.0 are NOT affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks is aware of a memory corruption vulnerability in PAN-OS. (Ref: # PAN-123700/ CVE-2019-1582).\nSuccessful exploitation of this issue may allow an administrative user to cause arbitrary memory corruption by rekeying the current client interactive session.\nThis issue affects PAN-OS 8.1.9 and earlier, and PAN-OS 9.0.3 and earlier.  PAN-OS 7.1 and 8.0 are NOT affected.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.9","versionType":"custom","changes":[{"at":"8.1.9-h4","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThanOrEqual":"9.0.3","versionType":"custom","changes":[{"at":"9.0.3-h3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-1582"}],"credits":[{"lang":"en","value":"This issue was discovered by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-123700"],"advisory":"PAN-SA-2019-0023","discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"These issues affect the management interface of PAN-OS and are strongly mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 9.0 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","supportingMedia":{"value":"These issues affect the management interface of PAN-OS and are strongly mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 9.0 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 8.1.9-h4 and later, and PAN-OS 9.0.3-h3 and later.  ","supportingMedia":{"value":"PAN-OS 8.1.9-h4 and later, and PAN-OS 9.0.3-h3 and later.  ","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-1579","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-07-18T20:39:00.000Z","dateReserved":"2019-07-18T20:39:00.000Z"},"containers":{"cna":{"title":"Remote Code Execution in GlobalProtect Portal/Gateway Interface ","datePublic":"2019-07-18T20:39:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:48","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"Palo Alto Networks is aware of the reported remote code execution (RCE) vulnerability in its GlobalProtect portal and GlobalProtect Gateway interface products.  The issue is already addressed in prior maintenance releases.  (Ref: CVE-2019-1579)\nSuccessful exploitation of this issue allows an unauthenticated attacker to execute arbitrary code.  \nThis issue affects PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and  PAN-OS 8.1.2  and earlier releases.  PAN-OS 9.0 is not affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks is aware of the reported remote code execution (RCE) vulnerability in its GlobalProtect portal and GlobalProtect Gateway interface products.  The issue is already addressed in prior maintenance releases.  (Ref: CVE-2019-1579)\nSuccessful exploitation of this issue allows an unauthenticated attacker to execute arbitrary code.  \nThis issue affects PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and  PAN-OS 8.1.2  and earlier releases.  PAN-OS 9.0 is not affected.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.18","versionType":"custom","changes":[{"at":"7.1.19","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.11-h1","versionType":"custom","changes":[{"at":"8.0.12","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.2","versionType":"custom","changes":[{"at":"8.1.3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-1579"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-100913"],"advisory":"PAN-SA-2019-0020","discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"If you have not already upgraded to the available updates listed above and cannot do so now, we recommend that you update to content release 8173, or the latest version, and confirm threat prevention is enabled and enforced on traffic that passes through the GlobalProtect portal and GlobalProtect Gateway interface.  \n\nPlease see the customer advisory for more details here: https://live.paloaltonetworks.com/t5/Customer-Advisories/Action-Recommended-Recent-Security-Advisory-PAN-SA-2019-0020-Ref/ta-p/278505 .  \n\nYou are not affected if you do not have GlobalProtect enabled.\n","supportingMedia":{"value":"If you have not already upgraded to the available updates listed above and cannot do so now, we recommend that you update to content release 8173, or the latest version, and confirm threat prevention is enabled and enforced on traffic that passes through the GlobalProtect portal and GlobalProtect Gateway interface.  \n\nPlease see the customer advisory for more details here: https://live.paloaltonetworks.com/t5/Customer-Advisories/Action-Recommended-Recent-Security-Advisory-PAN-SA-2019-0020-Ref/ta-p/278505 .  \n\nYou are not affected if you do not have GlobalProtect enabled.\n","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.1.19 and later, PAN-OS 8.0.12 and later, and PAN-OS 8.1.3 and later releases.","supportingMedia":{"value":"PAN-OS 7.1.19 and later, PAN-OS 8.0.12 and later, and PAN-OS 8.1.3 and later releases.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-1576","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-07-15T22:15:00.000Z","dateReserved":"2019-07-15T22:15:00.000Z"},"containers":{"cna":{"title":"Command Injection in PAN-OS ","datePublic":"2019-07-15T22:15:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:48","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A command injection vulnerability exists in the Palo Alto Networks PAN-OS Command Line Interface (CLI). (Ref PAN-111872/ CVE-2019-1576)\nSuccessful exploitation of this issue may allow an authenticated attacker to gain access to a remote shell in PAN-OS, and potentially run with the escalated  user’s permissions.\nThis issue affects PAN-OS 9.0.2 and earlier.  PAN-OS 7.1, PAN-OS 8.0 and PAN-OS 8.1 are NOT affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A command injection vulnerability exists in the Palo Alto Networks PAN-OS Command Line Interface (CLI). (Ref PAN-111872/ CVE-2019-1576)\nSuccessful exploitation of this issue may allow an authenticated attacker to gain access to a remote shell in PAN-OS, and potentially run with the escalated  user’s permissions.\nThis issue affects PAN-OS 9.0.2 and earlier.  PAN-OS 7.1, PAN-OS 8.0 and PAN-OS 8.1 are NOT affected.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0","status":"affected","lessThanOrEqual":"9.0.2","versionType":"custom","changes":[{"at":"9.0.3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-1576"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Joe Graham at Rochester Institute of Technology for reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')","cweId":"CWE-77"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-111872"],"advisory":"PAN-SA-2019-0018","discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 9.0.3 and later","supportingMedia":{"value":"PAN-OS 9.0.3 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-1575","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-07-15T22:15:00.000Z","dateReserved":"2019-07-15T22:15:00.000Z"},"containers":{"cna":{"title":"Information Disclosure in PAN-OS Management API Usage","datePublic":"2019-07-15T22:15:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:48","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An Information Disclosure vulnerability exists in PAN-OS Management API usage (Ref # PAN-107239 and PAN-118869 / CVE-2019-1575)\nSuccessful exploitation may allow for an authenticated user with read-only privileges to extract the API key of the device and the username/password from the XML API (in PAN-OS) and possibly escalate privileges granted to them.\nThis issue affects PAN-OS 7.1.23 and earlier, PAN-OS 8.0.18 and earlier, PAN-OS 8.1.8-h4 and earlier, and PAN-OS 9.0.2 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An Information Disclosure vulnerability exists in PAN-OS Management API usage (Ref # PAN-107239 and PAN-118869 / CVE-2019-1575)\nSuccessful exploitation may allow for an authenticated user with read-only privileges to extract the API key of the device and the username/password from the XML API (in PAN-OS) and possibly escalate privileges granted to them.\nThis issue affects PAN-OS 7.1.23 and earlier, PAN-OS 8.0.18 and earlier, PAN-OS 8.1.8-h4 and earlier, and PAN-OS 9.0.2 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.23","versionType":"custom","changes":[{"at":"7.1.24","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.18","versionType":"custom","changes":[{"at":"8.0.19","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.8-h4","versionType":"custom","changes":[{"at":"8.1.8","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThanOrEqual":"9.0.2","versionType":"custom","changes":[{"at":"9.0.2","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-1575"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Bartłomiej Stasiek of ING Tech Poland, Ruben Jacobi of ON2IT Group, Michael E. Davis - University of Arkansas, and Alycia N. Carey - University of Arkansas for reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-200 Information Exposure","cweId":"CWE-200"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-107239","PAN-118869"],"advisory":"PAN-SA-2019-0019","discovery":"USER"},"workarounds":[{"lang":"en","value":"Please see the detailed FAQ here: https://live.paloaltonetworks.com/t5/Customer-Advisories/Palo-Alto-Networks-Security-Advisory-PAN-SA-2019-0019/ta-p/276661.","supportingMedia":{"value":"Please see the detailed FAQ here: https://live.paloaltonetworks.com/t5/Customer-Advisories/Palo-Alto-Networks-Security-Advisory-PAN-SA-2019-0019/ta-p/276661.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.1.24 and later, PAN-OS 8.0.19 and later, PAN-OS 8.1.8-h5 and later, and PAN-OS 9.0.2-h4 and later.  ","supportingMedia":{"value":"PAN-OS 7.1.24 and later, PAN-OS 8.0.19 and later, PAN-OS 8.1.8-h5 and later, and PAN-OS 9.0.2-h4 and later.  ","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-8912","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-07-15T22:15:00.000Z","dateReserved":"2019-07-15T22:15:00.000Z"},"containers":{"cna":{"title":"Privilege Escalation in PAN-OS","datePublic":"2019-07-15T22:15:00.000Z","providerMetadata":{"dateUpdated":"2020-01-21T19:06:20","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"Palo Alto Networks is aware of a use-after-free (UAF) vulnerability in the Linux kernel's sockfs_setattr. (Ref: PAN-113631/ CVE-2019-8912)\nSuccessful exploitation of this issue may allow an unprivileged local user to escalate their privileges on the system.\nThis issue affects PAN-OS 7.1.23 and earlier, PAN-OS 8.0.17 and earlier, PAN-OS 8.1.8 and earlier, and PAN-OS 9.0.2 and earlier. ","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks is aware of a use-after-free (UAF) vulnerability in the Linux kernel's sockfs_setattr. (Ref: PAN-113631/ CVE-2019-8912)\nSuccessful exploitation of this issue may allow an unprivileged local user to escalate their privileges on the system.\nThis issue affects PAN-OS 7.1.23 and earlier, PAN-OS 8.0.17 and earlier, PAN-OS 8.1.8 and earlier, and PAN-OS 9.0.2 and earlier. </pre>"}]}],"x_affectedList":["PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.23","versionType":"custom","changes":[{"at":"7.1.24","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.17","versionType":"custom","changes":[{"at":"8.0.18","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.8","versionType":"custom","changes":[{"at":"8.1.9","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThanOrEqual":"9.0.2","versionType":"custom","changes":[{"at":"9.0.3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-8912"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-416 Use After Free","cweId":"CWE-416"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-113631"],"advisory":"PAN-SA-2019-0017","discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.1.24 and later, PAN-OS 8.0.18 and later, PAN-OS 8.1.9 and later, and PAN-OS 9.0.3 and later.","supportingMedia":{"value":"PAN-OS 7.1.24 and later, PAN-OS 8.0.18 and later, PAN-OS 8.1.9 and later, and PAN-OS 9.0.3 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2019-0013","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-06-27T23:50:00.000Z","dateReserved":"2019-06-27T23:50:00.000Z"},"containers":{"cna":{"title":"Information about TCP SACK Panic Findings in PAN-OS ","datePublic":"2019-06-27T23:50:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"Palo Alto Networks is aware of recent vulnerability disclosures known as TCP SACK Panic vulnerabilities.  (Ref: PAN-119745/ CVE-2019-11477, CVE-2019-11478, CVE-2019-11479)\nSuccessful exploitation of these issues could allow an unprivileged remote user to trigger a kernel panic in systems running the affected software, resulting in a denial of service.\n\nWhile these issues primary affect the PAN-OS Management Plane (MP),  it is possible for MP services to be exposed via Data Plane (DP) interfaces as a result of Service Route or and Interface Management Profile configurations. Examples include Management Profiles permitting HTTP/HTTPS access to the WebGUI, SSH, or response pages.  In these cases, it is possible that malicious traffic could arrive at the MP kernel through the DP interface.  Devices with unrestricted connectivity to the MP, such as internal hosts, may be able to leverage this issue to impact device performance. \n\nPalo Alto Networks is not affected by CVE-2019-5599.\nThis issue affects PAN-OS 7.1.23 and earlier, PAN-OS 8.0.18 and earlier, PAN-OS 8.1.8-h4 and earlier, and PAN-OS 9.0.2-h3 and earlier.  \n\nGlobalProtect Gateway and GlobalProtect portal are NOT affected by these issues.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks is aware of recent vulnerability disclosures known as TCP SACK Panic vulnerabilities.  (Ref: PAN-119745/ CVE-2019-11477, CVE-2019-11478, CVE-2019-11479)\nSuccessful exploitation of these issues could allow an unprivileged remote user to trigger a kernel panic in systems running the affected software, resulting in a denial of service.\n\nWhile these issues primary affect the PAN-OS Management Plane (MP),  it is possible for MP services to be exposed via Data Plane (DP) interfaces as a result of Service Route or and Interface Management Profile configurations. Examples include Management Profiles permitting HTTP/HTTPS access to the WebGUI, SSH, or response pages.  In these cases, it is possible that malicious traffic could arrive at the MP kernel through the DP interface.  Devices with unrestricted connectivity to the MP, such as internal hosts, may be able to leverage this issue to impact device performance. \n\nPalo Alto Networks is not affected by CVE-2019-5599.\nThis issue affects PAN-OS 7.1.23 and earlier, PAN-OS 8.0.18 and earlier, PAN-OS 8.1.8-h4 and earlier, and PAN-OS 9.0.2-h3 and earlier.  \n\nGlobalProtect Gateway and GlobalProtect portal are NOT affected by these issues.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.23","versionType":"custom","changes":[{"at":"7.1.24","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.18","versionType":"custom","changes":[{"at":"8.0.19","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.8-h4","versionType":"custom","changes":[{"at":"8.1.8-h5","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThanOrEqual":"9.0.2-h3","versionType":"custom","changes":[{"at":"9.0.2-h4","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2019-0013"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-190 Integer Overflow or Wraparound","cweId":"CWE-190"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-119745"],"advisory":"PAN-SA-2019-0013","discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"These issues affect the management interface of PAN-OS and are strongly mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 9.0 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","supportingMedia":{"value":"These issues affect the management interface of PAN-OS and are strongly mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 9.0 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.1.24 and later, PAN-OS 8.0.19 and later, PAN-OS 8.1.8-h5 and later, and PAN-OS 9.0.2-h4 and later","supportingMedia":{"value":"PAN-OS 7.1.24 and later, PAN-OS 8.0.19 and later, PAN-OS 8.1.8-h5 and later, and PAN-OS 9.0.2-h4 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-1572","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-03-28T20:05:00.000Z","dateReserved":"2019-03-28T20:05:00.000Z"},"containers":{"cna":{"title":"Authentication Bypass in PAN-OS Management Web Interface","datePublic":"2019-03-28T20:05:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:48","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An Authentication Bypass vulnerability exists in the PAN-OS Management Web Interface.  (Ref # PAN-113675, CVE-2019-1572)\nSuccessful exploitation of this issue may allow an unauthenticated remote user to access php files.\nThis issue affects Only PAN-OS 9.0.0","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An Authentication Bypass vulnerability exists in the PAN-OS Management Web Interface.  (Ref # PAN-113675, CVE-2019-1572)\nSuccessful exploitation of this issue may allow an unauthenticated remote user to access php files.\nThis issue affects Only PAN-OS 9.0.0</pre>"}]}],"x_affectedList":["PAN-OS 9.0.0","PAN-OS 9.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0.0","status":"affected"},{"version":"9.0.1","status":"unaffected","lessThan":"9.0*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-1572"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-287 Improper Authentication","cweId":"CWE-287"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-113675"],"advisory":"PAN-SA-2019-0005","discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the web-based management interface of PAN-OS and is strongly mitigated by following best practices for securing the management interface of PAN-OS. Our best practices guidelines reduce the exposure of the management interface to potential attackers. We recommend that the management interface be isolated and strictly limited only to security administration personnel through either network segmentation or using the IP access control list restriction feature within PAN-OS.  Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","supportingMedia":{"value":"This issue affects the web-based management interface of PAN-OS and is strongly mitigated by following best practices for securing the management interface of PAN-OS. Our best practices guidelines reduce the exposure of the management interface to potential attackers. We recommend that the management interface be isolated and strictly limited only to security administration personnel through either network segmentation or using the IP access control list restriction feature within PAN-OS.  Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 9.0.1 and later","supportingMedia":{"value":"PAN-OS 9.0.1 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2018-14634","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-03-20T21:20:00.000Z","dateReserved":"2019-03-20T21:20:00.000Z"},"containers":{"cna":{"title":"Privilege Escalation in PAN-OS","datePublic":"2019-03-20T21:20:00.000Z","providerMetadata":{"dateUpdated":"2021-07-20T14:06:15","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"descriptions":[{"lang":"en","value":"Palo Alto Networks is aware of an integer overflow vulnerability in the Linux kernel's create_elf_tables() function.  (Ref # PAN-105966, CVE-2018-14634)\nSuccessful exploitation of this issue may allow an unprivileged local user to escalate their privileges on the system.  \n\nTo successfully exploit this vulnerability, an attacker would need local user account to access CLI, as well as, an unrelated vulnerability allowing the local user to execute arbitrary code in a chained attack. This combination would result in the execution of malicious code and achieving complete control of the affected system.\n\nThis issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw. \nThis issue affects This only affects 64bit systems with more than 32 GB of available memory.  \n\nThe affected platform and versions are  PAN-OS 7.1.22 and earlier running on M-500 and WF-500;   PAN-OS 8.0.15 and earlier running on PA-5220, PA-5250, PA-5260, M-500 and WF-500;  and PAN-OS 8.1.6 and earlier running on PA-5220, PA-5250, PA-5260, PA-5280, M-500, M-600 and WF-500.   PAN-OS 9.0 is NOT affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks is aware of an integer overflow vulnerability in the Linux kernel's create_elf_tables() function.  (Ref # PAN-105966, CVE-2018-14634)\nSuccessful exploitation of this issue may allow an unprivileged local user to escalate their privileges on the system.  \n\nTo successfully exploit this vulnerability, an attacker would need local user account to access CLI, as well as, an unrelated vulnerability allowing the local user to execute arbitrary code in a chained attack. This combination would result in the execution of malicious code and achieving complete control of the affected system.\n\nThis issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw. \nThis issue affects This only affects 64bit systems with more than 32 GB of available memory.  \n\nThe affected platform and versions are  PAN-OS 7.1.22 and earlier running on M-500 and WF-500;   PAN-OS 8.0.15 and earlier running on PA-5220, PA-5250, PA-5260, M-500 and WF-500;  and PAN-OS 8.1.6 and earlier running on PA-5220, PA-5250, PA-5260, PA-5280, M-500, M-600 and WF-500.   PAN-OS 9.0 is NOT affected.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.22","versionType":"custom","changes":[{"at":"7.1.23","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.15","versionType":"custom","changes":[{"at":"8.0.16","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.6","versionType":"custom","changes":[{"at":"8.1.7","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2018-14634"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-190 Integer Overflow or Wraparound","cweId":"CWE-190"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-105966"],"advisory":"PAN-SA-2019-0006","discovery":"INTERNAL"},"solutions":[{"lang":"en","value":"PAN-OS 7.1.23 and later, PAN-OS 8.0.16 and later, and PAN-OS 8.1.7 and later. ","supportingMedia":{"value":"PAN-OS 7.1.23 and later, PAN-OS 8.0.16 and later, and PAN-OS 8.1.7 and later. ","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2018-0015","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2018-10-12T02:35:00.000Z","dateReserved":"2018-10-12T02:35:00.000Z"},"containers":{"cna":{"title":"OpenSSL Vulnerabilities in PAN-OS ","datePublic":"2018-10-12T02:35:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"The OpenSSL library has been found to contain vulnerabilities CVE-2018-0732, CVE-2018-0737, and CVE-2018-0739.  Palo Alto Networks software makes use of the vulnerable library and is affected. (Ref # PAN-98504/ CVE-2018-0732, CVE-2018-0737, and CVE-2018-0739)\nThe OpenSSL library in use by PAN-OS is patched on a regular basis for security issues.\nThis issue affects PAN-OS 6.1.20 and earlier, PAN-OS 7.1.20 and earlier, PAN-OS 8.0.13 and earlier, and PAN-OS 8.1.3 and earlier.  WF-500 running WF-500 software versions PAN-OS 6.1.20 and earlier, PAN-OS 7.1.20 and earlier, PAN-OS 8.0.13 and earlier, and PAN-OS 8.1.3 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The OpenSSL library has been found to contain vulnerabilities CVE-2018-0732, CVE-2018-0737, and CVE-2018-0739.  Palo Alto Networks software makes use of the vulnerable library and is affected. (Ref # PAN-98504/ CVE-2018-0732, CVE-2018-0737, and CVE-2018-0739)\nThe OpenSSL library in use by PAN-OS is patched on a regular basis for security issues.\nThis issue affects PAN-OS 6.1.20 and earlier, PAN-OS 7.1.20 and earlier, PAN-OS 8.0.13 and earlier, and PAN-OS 8.1.3 and earlier.  WF-500 running WF-500 software versions PAN-OS 6.1.20 and earlier, PAN-OS 7.1.20 and earlier, PAN-OS 8.0.13 and earlier, and PAN-OS 8.1.3 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 6.1.20","PAN-OS 6.1.19","PAN-OS 6.1.18","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.20","versionType":"custom"},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.20","versionType":"custom","changes":[{"at":"7.1.21","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.13","versionType":"custom","changes":[{"at":"8.0.14","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.3","versionType":"custom","changes":[{"at":"8.1.4","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2018-0015"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-320","cweId":"CWE-320"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-98504"],"advisory":"PAN-SA-2018-0015","discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.1.21 and later, PAN-OS 8.0.14 and later, PAN-OS 8.1.4 and later, WF-500 running WF-500 software version 8.0.14 and later, and WF-500 running WF-500 software version 8.1.4 and later.  PAN-OS 6.1 will NOT have a fix.    For WF-500 software versions 7.1 and earlier, please consult the WildFire Administrator’s Guide for steps to upgrade the software. An online copy of all available documentation can be found here (https://www.paloaltonetworks.com/documentation).","supportingMedia":{"value":"PAN-OS 7.1.21 and later, PAN-OS 8.0.14 and later, PAN-OS 8.1.4 and later, WF-500 running WF-500 software version 8.0.14 and later, and WF-500 running WF-500 software version 8.1.4 and later.  PAN-OS 6.1 will NOT have a fix.    For WF-500 software versions 7.1 and earlier, please consult the WildFire Administrator’s Guide for steps to upgrade the software. An online copy of all available documentation can be found here (https://www.paloaltonetworks.com/documentation).","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2018-5391","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2018-09-19T20:40:00.000Z","dateReserved":"2018-09-19T20:40:00.000Z"},"containers":{"cna":{"title":"Information about FragmentSmack findings","datePublic":"2018-09-19T20:40:00.000Z","providerMetadata":{"dateUpdated":"2020-04-14T12:06:39","orgId":"37e5125f-f79b-445b-8fad-9564f167944b","shortName":"certcc"},"descriptions":[{"lang":"en","value":"Palo Alto Networks is aware of recent vulnerability disclosure, known as FragmentSmack, that affects Linux kernel 3.9 and later. At this time, our findings show that some Palo Alto Networks devices running specific versions of PAN-OS are vulnerable to this disclosure. (CVE-2018-5391). This security advisory will be updated as more information becomes available or if there are changes in the impact of these vulnerabilities.\nA flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. To exploit this vulnerability a remote attacker could send specially crafted packets that trigger time and calculation expensive fragment reassembly algorithms and cause CPU saturation (a denial of service on the system).  This only affects the Management Plane of PAN-OS.\nThis issue affects PAN-OS 6.1.21 and earlier running on PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series, PA-7050.     PAN-OS 7.1.19 and earlier running on PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series, PA-7050 and PA-7080.     PAN-OS 8.0.12 and earlier running on PA-200, PA-220, PA-500, PA-800 Series, PA-3000 Series, PA-5000 Series, PA-5220, PA-5250, PA-5260, PA-7050 and PA-7080.     PAN-OS 8.1.4 and earlier running on PA-200, PA-220, PA-220R, PA-500, PA-800 Series, PA-3000 Series, PA-3200 Series, PA-5000 Series, PA-5220, PA-5250, PA-5260, PA-5280, PA-7050 and PA-7080.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks is aware of recent vulnerability disclosure, known as FragmentSmack, that affects Linux kernel 3.9 and later. At this time, our findings show that some Palo Alto Networks devices running specific versions of PAN-OS are vulnerable to this disclosure. (CVE-2018-5391). This security advisory will be updated as more information becomes available or if there are changes in the impact of these vulnerabilities.\nA flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. To exploit this vulnerability a remote attacker could send specially crafted packets that trigger time and calculation expensive fragment reassembly algorithms and cause CPU saturation (a denial of service on the system).  This only affects the Management Plane of PAN-OS.\nThis issue affects PAN-OS 6.1.21 and earlier running on PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series, PA-7050.     PAN-OS 7.1.19 and earlier running on PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series, PA-7050 and PA-7080.     PAN-OS 8.0.12 and earlier running on PA-200, PA-220, PA-500, PA-800 Series, PA-3000 Series, PA-5000 Series, PA-5220, PA-5250, PA-5260, PA-7050 and PA-7080.     PAN-OS 8.1.4 and earlier running on PA-200, PA-220, PA-220R, PA-500, PA-800 Series, PA-3000 Series, PA-3200 Series, PA-5000 Series, PA-5220, PA-5250, PA-5260, PA-5280, PA-7050 and PA-7080.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 6.1.21","PAN-OS 6.1.20","PAN-OS 6.1.19","PAN-OS 6.1.18","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.21","versionType":"custom","changes":[{"at":"6.1.22","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.19","versionType":"custom","changes":[{"at":"7.1.20","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.12","versionType":"custom","changes":[{"at":"8.0.13","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.4","versionType":"custom","changes":[{"at":"8.1.5","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2018-5391"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-103132"],"advisory":"PAN-SA-2018-0012","discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS. Our best practices guidelines strongly mitigate exposure to this vulnerability and reduce the exposure of the management interface to other potential threats. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/getting-started/best-practices-for-securing-administrative-access.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS. Our best practices guidelines strongly mitigate exposure to this vulnerability and reduce the exposure of the management interface to other potential threats. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/getting-started/best-practices-for-securing-administrative-access.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.1.22, PAN-OS 7.1.20 and later, PAN-OS 8.0.13 and later, and PAN-OS 8.1.5 and later. ","supportingMedia":{"value":"PAN-OS 6.1.22, PAN-OS 7.1.20 and later, PAN-OS 8.0.13 and later, and PAN-OS 8.1.5 and later. ","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2018-8715","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2018-07-20T00:30:00.000Z","dateReserved":"2018-07-20T00:30:00.000Z"},"containers":{"cna":{"title":"Denial of Service in PAN-OS Management Web Interface ","datePublic":"2018-07-20T00:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:47","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"Palo Alto Networks makes use of a 3rd-party component impacted by CVE-2018-8715. This issue has been confirmed to present a risk for denial of service to the PAN-OS Management Web Interface. (Ref # PAN-93089, CVE-2018-8715)\nA specially crafted HTTP POST request with an invalid “If-modified\" header field may cause a NULL dereference and cause a denial of service condition. This vulnerability can be triggered without login or authentication and could result in a crash of the management service.\nThis issue affects PAN-OS 6.1.20 and earlier, PAN-OS 7.1.16 and earlier, PAN-OS 8.0.9 and earlier, and PAN-OS 8.1.0.  Global Protect is NOT affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks makes use of a 3rd-party component impacted by CVE-2018-8715. This issue has been confirmed to present a risk for denial of service to the PAN-OS Management Web Interface. (Ref # PAN-93089, CVE-2018-8715)\nA specially crafted HTTP POST request with an invalid “If-modified\" header field may cause a NULL dereference and cause a denial of service condition. This vulnerability can be triggered without login or authentication and could result in a crash of the management service.\nThis issue affects PAN-OS 6.1.20 and earlier, PAN-OS 7.1.16 and earlier, PAN-OS 8.0.9 and earlier, and PAN-OS 8.1.0.  Global Protect is NOT affected.</pre>"}]}],"x_affectedList":["PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 6.1.20","PAN-OS 6.1.19","PAN-OS 6.1.18","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.20","versionType":"custom","changes":[{"at":"6.1.21","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.16","versionType":"custom","changes":[{"at":"7.1.17","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.9","versionType":"custom","changes":[{"at":"8.0.10","status":"unaffected"}]},{"version":"8.1.1","status":"unaffected","lessThan":"8.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2018-8715"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-287 Improper Authentication","cweId":"CWE-287"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-93089"],"advisory":"PAN-SA-2018-0008","discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the web-based management interface of PAN-OS and is strongly mitigated by following best practices for securing the management interface of PAN-OS.  Our best practices guidelines reduce the exposure of the management interface to potential attackers.  Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/getting-started/best-practices-for-securing-administrative-access.","supportingMedia":{"value":"This issue affects the web-based management interface of PAN-OS and is strongly mitigated by following best practices for securing the management interface of PAN-OS.  Our best practices guidelines reduce the exposure of the management interface to potential attackers.  Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/getting-started/best-practices-for-securing-administrative-access.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.1.21 and later, PAN-OS 7.1.17 and later, PAN-OS 8.0.10 and later, and PAN-OS 8.1.1 and later.   ","supportingMedia":{"value":"PAN-OS 6.1.21 and later, PAN-OS 7.1.17 and later, PAN-OS 8.0.10 and later, and PAN-OS 8.1.1 and later.   ","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2017-15942","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-12-06T00:00:00","dateReserved":"2017-12-06T00:00:00","dateUpdated":"2020-05-18T00:00:00.000000Z"},"containers":{"cna":{"title":"Denial of Service Against GlobalProtect","datePublic":"2017-12-06T00:00:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:45","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists in PAN-OS that could lead to denying access to GlobalProtect portal, GlobalProtect gateway or preventing configuration commits. (Ref # PAN-78127 / CVE-2017-15942)\nPAN-OS contains a vulnerability in GlobalProtect that may allow a non-authenticated third party to mount a Denial of Service attack against the GlobalProtect portal, GlobalProtect gateway or preventing configuration commits. This vulnerability is only available when the GlobalProtect gateway or portal is running.\nThis issue affects PAN-OS 6.1.18 and earlier, PAN-OS 7.0.18 and earlier, PAN-OS 7.1.12 and earlier, PAN-OS 8.0.5 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists in PAN-OS that could lead to denying access to GlobalProtect portal, GlobalProtect gateway or preventing configuration commits. (Ref # PAN-78127 / CVE-2017-15942)\nPAN-OS contains a vulnerability in GlobalProtect that may allow a non-authenticated third party to mount a Denial of Service attack against the GlobalProtect portal, GlobalProtect gateway or preventing configuration commits. This vulnerability is only available when the GlobalProtect gateway or portal is running.\nThis issue affects PAN-OS 6.1.18 and earlier, PAN-OS 7.0.18 and earlier, PAN-OS 7.1.12 and earlier, PAN-OS 8.0.5 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.18","PAN-OS 7.0.17","PAN-OS 7.0.16","PAN-OS 7.0.15","PAN-OS 7.0.14","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.18","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.18","versionType":"custom","changes":[{"at":"6.1.19","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.18","versionType":"custom","changes":[{"at":"7.0.19","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.12","versionType":"custom","changes":[{"at":"7.1.13","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.5","versionType":"custom","changes":[{"at":"8.0.6","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2017-15942"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Craig Stephen and Martin Ferris from Net Consulting for reporting this issue to us."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-399 Resource Management Errors","cweId":"CWE-399"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-78127"],"advisory":"PAN-SA-2017-0025","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This vulnerability is only available when the GlobalProtect gateway or portal is running.","supportingMedia":{"value":"This vulnerability is only available when the GlobalProtect gateway or portal is running.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.1.19 and later, PAN-OS 7.0.19 and later, PAN-OS 7.1.13 and later, PAN-OS 8.0.6 and later","supportingMedia":{"value":"PAN-OS 6.1.19 and later, PAN-OS 7.0.19 and later, PAN-OS 7.1.13 and later, PAN-OS 8.0.6 and later","type":"text/html","base64":false}}],"timeline":[{"time":"2017-12-06T00:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2020-05-18T16:00:00.000Z","lang":"eng","value":"Updated credit statement"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2017-6460","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-07-27T17:15:00.000Z","dateReserved":"2017-07-27T17:15:00.000Z"},"containers":{"cna":{"title":"NTP Vulnerability","datePublic":"2017-07-27T17:15:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:46","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"The Network Time Protocol (NTP) library has been found to contain a vulnerability CVE-2017-6460. Palo Alto Networks software makes use of the vulnerable library and may be affected. This issue only affects the management plane of the firewall. (Ref # PAN-76130 / CVE-2017-6460)\nSuccessful exploitation of this issue requires an attacker to be on the management interface.\nThis issue affects PAN-OS 6.1, PAN-OS 7.0.17 and earlier, PAN-OS 7.1.11 and earlier, PAN-OS 8.0.3 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The Network Time Protocol (NTP) library has been found to contain a vulnerability CVE-2017-6460. Palo Alto Networks software makes use of the vulnerable library and may be affected. This issue only affects the management plane of the firewall. (Ref # PAN-76130 / CVE-2017-6460)\nSuccessful exploitation of this issue requires an attacker to be on the management interface.\nThis issue affects PAN-OS 6.1, PAN-OS 7.0.17 and earlier, PAN-OS 7.1.11 and earlier, PAN-OS 8.0.3 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.17","PAN-OS 7.0.16","PAN-OS 7.0.15","PAN-OS 7.0.14","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.22","PAN-OS 6.1.21","PAN-OS 6.1.20","PAN-OS 6.1.19","PAN-OS 6.1.18","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1.*","status":"affected"},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.11","versionType":"custom","changes":[{"at":"7.1.12","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.3","versionType":"custom","changes":[{"at":"8.0.4","status":"unaffected"}]},{"version":"7.0.18","status":"unaffected","lessThan":"7.0*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2017-6460"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-76130"],"advisory":"PAN-SA-2017-0022","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.\n","supportingMedia":{"value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.\n","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.0.18 or later, PAN-OS 7.1.12 or later, PAN-OS 8.0.4 or later\n","supportingMedia":{"value":"PAN-OS 7.0.18 or later, PAN-OS 7.1.12 or later, PAN-OS 8.0.4 or later\n","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-8610","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-06-07T00:25:00.000Z","dateReserved":"2017-06-07T00:25:00.000Z"},"containers":{"cna":{"title":"OpenSSL Vulnerability ","datePublic":"2017-06-07T00:25:00.000Z","providerMetadata":{"dateUpdated":"2020-10-20T21:14:51","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"descriptions":[{"lang":"en","value":"The OpenSSL library has been found to contain vulnerability CVE-2016-8610. Palo Alto Networks software makes use of the vulnerable library and may be affected. (Ref # PAN-68543 / CVE-2016-8610)\r\nThe OpenSSL library in use by PAN-OS is patched on a regular basis.\nThis issue affects PAN-OS 6.1.17 and earlier, PAN-OS 7.0.15 and earlier, PAN-OS 7.1.10 and earlier\r","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The OpenSSL library has been found to contain vulnerability CVE-2016-8610. Palo Alto Networks software makes use of the vulnerable library and may be affected. (Ref # PAN-68543 / CVE-2016-8610)\r\nThe OpenSSL library in use by PAN-OS is patched on a regular basis.\nThis issue affects PAN-OS 6.1.17 and earlier, PAN-OS 7.0.15 and earlier, PAN-OS 7.1.10 and earlier\r</pre>"}]}],"x_affectedList":["PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.15","PAN-OS 7.0.14","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.17","versionType":"custom","changes":[{"at":"6.1.18","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.15","versionType":"custom","changes":[{"at":"7.0.16","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.10","versionType":"custom","changes":[{"at":"7.1.11","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-8610"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-400 Uncontrolled Resource Consumption","cweId":"CWE-400"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-68543"],"advisory":"PAN-SA-2017-0017","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.1.18 and later, PAN-OS 7.0.16 and later, PAN-OS 7.1.11 and later\r","supportingMedia":{"value":"PAN-OS 6.1.18 and later, PAN-OS 7.0.16 and later, PAN-OS 7.1.11 and later\r","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-4971","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-05-23T03:00:03.000Z","dateReserved":"2017-05-23T03:00:03.000Z"},"containers":{"cna":{"title":"WGET Vulnerability","datePublic":"2017-05-23T03:00:03.000Z","providerMetadata":{"dateUpdated":"2021-04-30T16:06:24","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"descriptions":[{"lang":"en","value":"The wget library has been found to contain a vulnerability (CVE 2016-4971). wget allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource. Palo Alto Networks software makes use of the vulnerable library and may be affected. (Ref # PAN-59677/ CVE 2016-4971)\nSuccessfully exploiting this issue would require an attacker to be authenticated on the Management Interface.\nThis issue affects PAN-OS 6.1.16 and earlier, PAN-OS 7.0.14 and earlier, PAN-OS 7.1.9 and earlier, PAN-OS 8.0","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The wget library has been found to contain a vulnerability (CVE 2016-4971). wget allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource. Palo Alto Networks software makes use of the vulnerable library and may be affected. (Ref # PAN-59677/ CVE 2016-4971)\nSuccessfully exploiting this issue would require an attacker to be authenticated on the Management Interface.\nThis issue affects PAN-OS 6.1.16 and earlier, PAN-OS 7.0.14 and earlier, PAN-OS 7.1.9 and earlier, PAN-OS 8.0</pre>"}]}],"x_affectedList":["PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.14","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.16","versionType":"custom","changes":[{"at":"6.1.17","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.14","versionType":"custom","changes":[{"at":"7.0.15","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.9","versionType":"custom","changes":[{"at":"7.1.10","status":"unaffected"}]},{"version":"8.0.1","status":"unaffected","lessThan":"8.0*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-4971"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-254","cweId":"CWE-254"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-59677","2016-4971"],"advisory":"PAN-SA-2017-0016","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.","supportingMedia":{"value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.1.17 and later, PAN-OS 7.0.15 and later, PAN-OS 7.1.10 and later, PAN-OS 8.0.1 and later","supportingMedia":{"value":"PAN-OS 6.1.17 and later, PAN-OS 7.0.15 and later, PAN-OS 7.1.10 and later, PAN-OS 8.0.1 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2017-3731","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-04-20T18:00:00.000Z","dateReserved":"2017-04-20T18:00:00.000Z"},"containers":{"cna":{"title":"OpenSSL Vulnerability","datePublic":"2017-04-20T18:00:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:45","orgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","shortName":"openssl"},"descriptions":[{"lang":"en","value":"The OpenSSL library has been found to contain vulnerability CVE-2017-3731. Palo Alto Networks software makes use of the vulnerable library and may be affected. (Ref # PAN-73914 / CVE-2017-3731)\nThe OpenSSL library in use by PAN-OS is patched on a regular basis. \nThis issue affects PAN-OS 6.1, PAN-OS 7.0.14 and earlier, PAN-OS 7.1, PAN-OS 8.0\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The OpenSSL library has been found to contain vulnerability CVE-2017-3731. Palo Alto Networks software makes use of the vulnerable library and may be affected. (Ref # PAN-73914 / CVE-2017-3731)\nThe OpenSSL library in use by PAN-OS is patched on a regular basis. \nThis issue affects PAN-OS 6.1, PAN-OS 7.0.14 and earlier, PAN-OS 7.1, PAN-OS 8.0\n</pre>"}]}],"x_affectedList":["PAN-OS 7.0.14","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1","versionType":"custom"},{"version":"7.0.15","status":"unaffected","lessThan":"7.0*","versionType":"custom"},{"version":"7.1.10","status":"unaffected","lessThan":"7.1*","versionType":"custom"},{"version":"8.0.2","status":"unaffected","lessThan":"8.0*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2017-3731"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-125 Out-of-bounds Read","cweId":"CWE-125"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-73914"],"advisory":"PAN-SA-2017-0012","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.0.15 and later; PAN-OS 7.1.10 and later; PAN-OS 8.0.2 and later\n","supportingMedia":{"value":"PAN-OS 7.0.15 and later; PAN-OS 7.1.10 and later; PAN-OS 8.0.2 and later\n","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2017-7218","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-04-10T17:30:01.000Z","dateReserved":"2017-04-10T17:30:01.000Z"},"containers":{"cna":{"title":"Local Privilege Escalation in the Management Web Interface ","datePublic":"2017-04-10T17:30:01.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:46","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists in the Management Web Interface that could allow for local privilege escalation. The Management Web Interface does not properly validate specific request parameters which can potentially allow executing code with higher privileges.  (Ref # PAN-70426/ CVE-2017-7218)\nSuccessfully exploiting this issue would require an attacker to be authenticated.\nThis issue affects PAN-OS 7.1.8 and earlier\r","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists in the Management Web Interface that could allow for local privilege escalation. The Management Web Interface does not properly validate specific request parameters which can potentially allow executing code with higher privileges.  (Ref # PAN-70426/ CVE-2017-7218)\nSuccessfully exploiting this issue would require an attacker to be authenticated.\nThis issue affects PAN-OS 7.1.8 and earlier\r</pre>"}]}],"x_affectedList":["PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.8","versionType":"custom","changes":[{"at":"7.1.9","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2017-7218"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Christophe Schleypen from NATO Communications and Information Agency for reporting this issue to us.  \r"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-70426"],"advisory":"PAN-SA-2017-0009","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.","supportingMedia":{"value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.1.9 and later","supportingMedia":{"value":"PAN-OS 7.1.9 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-5195","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-02-21T19:30:00.000Z","dateReserved":"2017-02-21T19:30:00.000Z"},"containers":{"cna":{"title":"Kernel Vulnerability ","datePublic":"2017-02-21T19:30:00.000Z","providerMetadata":{"dateUpdated":"2022-08-15T11:06:10","orgId":"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28","shortName":"Chrome"},"descriptions":[{"lang":"en","value":"A vulnerability exists in the kernel of PAN-OS that may result in an elevation of privilege. This issue is publicly known as Dirty COW (ref # PAN-68074 / CVE-2016-5195).\nPAN-OS may be impacted by the Dirty COW (CVE-2016-5195) attack. A race condition was found in the way the Linux kernel's memory subsystem handles the copy-on-write breakage of private read-only memory mappings.  An attacker would first require access to a shell on the device before they could use this exploit. Shell access is significantly restricted on the device. The Command Line Interface (CLI) is not shell access and therefore this issue cannot be exploited by the CLI.\nThis issue affects PAN-OS 5.1, PAN-OS 6.0, PAN-OS 6.1, PAN-OS 7.0.13, PAN-OS 7.1.7 and earlier\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists in the kernel of PAN-OS that may result in an elevation of privilege. This issue is publicly known as Dirty COW (ref # PAN-68074 / CVE-2016-5195).\nPAN-OS may be impacted by the Dirty COW (CVE-2016-5195) attack. A race condition was found in the way the Linux kernel's memory subsystem handles the copy-on-write breakage of private read-only memory mappings.  An attacker would first require access to a shell on the device before they could use this exploit. Shell access is significantly restricted on the device. The Command Line Interface (CLI) is not shell access and therefore this issue cannot be exploited by the CLI.\nThis issue affects PAN-OS 5.1, PAN-OS 6.0, PAN-OS 6.1, PAN-OS 7.0.13, PAN-OS 7.1.7 and earlier\n</pre>"}]}],"x_affectedList":["PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.22","PAN-OS 6.1.21","PAN-OS 6.1.20","PAN-OS 6.1.19","PAN-OS 6.1.18","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.15","PAN-OS 6.0.14","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.1.*","status":"affected"},{"version":"6.0.*","status":"affected"},{"version":"6.1.*","status":"affected"},{"version":"7.0.14","status":"unaffected","lessThan":"7.0*","versionType":"custom"},{"version":"7.1.8","status":"unaffected","lessThan":"7.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-5195"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')","cweId":"CWE-362"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-68074"],"advisory":"PAN-SA-2017-0003","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.\n","supportingMedia":{"value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.\n","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":" PAN-OS 7.0.14 and later, PAN-OS 7.1.8 and later\n","supportingMedia":{"value":" PAN-OS 7.0.14 and later, PAN-OS 7.1.8 and later\n","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-9151","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-11-17T17:00:00.000Z","dateReserved":"2016-11-17T17:00:00.000Z"},"containers":{"cna":{"title":"Local Privilege Escalation","datePublic":"2016-11-17T17:00:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:45","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"Palo Alto Networks firewalls do not properly validate certain environment variables which can potentially allow executing code with higher privileges (Ref # PAN-61104/100499/CVE-2016-9151)\r\nA potential attacker with local shell access could manipulate arbitrary environment variables which could result in a process running with higher privileges.\r\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.14 and earlier; PAN-OS 7.0.10 and earlier; PAN-OS 7.1.5 and earlier\r","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks firewalls do not properly validate certain environment variables which can potentially allow executing code with higher privileges (Ref # PAN-61104/100499/CVE-2016-9151)\r\nA potential attacker with local shell access could manipulate arbitrary environment variables which could result in a process running with higher privileges.\r\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.14 and earlier; PAN-OS 7.0.10 and earlier; PAN-OS 7.1.5 and earlier\r</pre>"}]}],"x_affectedList":["PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.14","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.19","versionType":"custom","changes":[{"at":"5.0.20","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.12","versionType":"custom","changes":[{"at":"5.1.13","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.14","versionType":"custom","changes":[{"at":"6.0.15","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.14","versionType":"custom","changes":[{"at":"6.1.15","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.10","versionType":"custom","changes":[{"at":"7.0.11","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.5","versionType":"custom","changes":[{"at":"7.1.6","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-9151"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Tavis Ormandy from the Google Security Team for reporting this issue to us."}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-264","cweId":"CWE-264"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-61104","100499"],"advisory":"PAN-SA-2016-0034","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Exploitation of this privilege escalation is restricted to local users. Potential attackers would have to first obtain a shell on the device before they could attempt to escalate privileges through this vulnerability. ","supportingMedia":{"value":"Exploitation of this privilege escalation is restricted to local users. Potential attackers would have to first obtain a shell on the device before they could attempt to escalate privileges through this vulnerability. ","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.15 and later; PAN-OS 7.0.11 and later; PAN-OS 7.1.6 and later\r","supportingMedia":{"value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.15 and later; PAN-OS 7.0.11 and later; PAN-OS 7.1.6 and later\r","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2016-0029","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-10-18T18:31:00.000Z","dateReserved":"2016-10-18T18:31:00.000Z"},"containers":{"cna":{"title":"Insecure Server Configuration","datePublic":"2016-10-18T18:31:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"An incorrect Web management server configuration was identified in PAN-OS. (Ref # PAN-52038/86767).\nThis post-authentication issue affects the management interface of the device, where an incorrect configuration could lead to JavaScript execution.\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.7 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An incorrect Web management server configuration was identified in PAN-OS. (Ref # PAN-52038/86767).\nThis post-authentication issue affects the management interface of the device, where an incorrect configuration could lead to JavaScript execution.\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.7 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.14","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.19","versionType":"custom","changes":[{"at":"5.0.20","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.12","versionType":"custom","changes":[{"at":"5.1.13","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.14","versionType":"custom","changes":[{"at":"6.0.15","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.12","versionType":"custom","changes":[{"at":"6.1.13","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.7","versionType":"custom","changes":[{"at":"7.0.8","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2016-0029"}],"credits":[{"lang":"en","value":"ringzero"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Insecure Server Configuration"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-52038","86767"],"advisory":"PAN-SA-2016-0029","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue is available only to authenticated users on the web interface. Palo Alto Networks recommends implementing best practices, only allowing management access to a restricted set of IP address, and dedicating management of the device to the management interface only.","supportingMedia":{"value":"This issue is available only to authenticated users on the web interface. Palo Alto Networks recommends implementing best practices, only allowing management access to a restricted set of IP address, and dedicating management of the device to the management interface only.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.8 and later","supportingMedia":{"value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.8 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2016-0028","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-10-18T18:30:00.000Z","dateReserved":"2016-10-18T18:30:00.000Z"},"containers":{"cna":{"title":"OpenSSL Vulnerabilities","datePublic":"2016-10-18T18:30:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"The OpenSSL library has been found to contain several vulnerabilities CVE-2015-4000, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1792, CVE-2015-1791, CVE-2014-8176. Palo Alto Networks software makes use of the vulnerable library. (Ref # PAN-48954/81411)\nThe OpenSSL library in use by PAN-OS is patched on a regular basis. Severities of the CVEs listed under the summary section range from low to moderate but have not been shown to be exploitable at the time of this advisory.\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.13 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.7 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The OpenSSL library has been found to contain several vulnerabilities CVE-2015-4000, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1792, CVE-2015-1791, CVE-2014-8176. Palo Alto Networks software makes use of the vulnerable library. (Ref # PAN-48954/81411)\nThe OpenSSL library in use by PAN-OS is patched on a regular basis. Severities of the CVEs listed under the summary section range from low to moderate but have not been shown to be exploitable at the time of this advisory.\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.13 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.7 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.19","versionType":"custom","changes":[{"at":"5.0.20","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.12","versionType":"custom","changes":[{"at":"5.1.13","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.13","versionType":"custom","changes":[{"at":"6.0.14","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.12","versionType":"custom","changes":[{"at":"6.1.13","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.7","versionType":"custom","changes":[{"at":"7.0.8","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2016-0028"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-48954","81411"],"advisory":"PAN-SA-2016-0028","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.14 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.8 and later","supportingMedia":{"value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.14 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.8 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2016-0025","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-10-04T01:00:00.000Z","dateReserved":"2016-10-04T01:00:00.000Z"},"containers":{"cna":{"title":"Kernel Vulnerabilities","datePublic":"2016-10-04T01:00:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"The kernel in use by the Management Plane of PAN-OS is vulnerable to CVE-2015-5364 and CVE-2015-5366.\n (Ref # PAN-52379/87408)\nThe CVSS Score of CVE-2015-5364 is 7.8, High; while the CVSS Score of CVE-2015-5366 is 5.0, Medium. Those could lead to a Denial of Service attack.\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.14 and earlier; PAN-OS 7.0.10 and earlier; PAN-OS 7.1.4 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The kernel in use by the Management Plane of PAN-OS is vulnerable to CVE-2015-5364 and CVE-2015-5366.\n (Ref # PAN-52379/87408)\nThe CVSS Score of CVE-2015-5364 is 7.8, High; while the CVSS Score of CVE-2015-5366 is 5.0, Medium. Those could lead to a Denial of Service attack.\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.14 and earlier; PAN-OS 7.0.10 and earlier; PAN-OS 7.1.4 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.14","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.19","versionType":"custom","changes":[{"at":"5.0.20","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.12","versionType":"custom","changes":[{"at":"5.1.13","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.14","versionType":"custom","changes":[{"at":"6.0.15","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.14","versionType":"custom","changes":[{"at":"6.1.15","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.10","versionType":"custom","changes":[{"at":"7.0.11","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.4","versionType":"custom","changes":[{"at":"7.1.5","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2016-0025"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-399","cweId":"CWE-399"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-52379","87408"],"advisory":"PAN-SA-2016-0025","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.15 and later; PAN-OS 7.0.11 and later; PAN-OS 7.1.5 and later\n","supportingMedia":{"value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.15 and later; PAN-OS 7.0.11 and later; PAN-OS 7.1.5 and later\n","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2015-7547","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-08-15T19:00:00.000Z","dateReserved":"2016-08-15T19:00:00.000Z"},"containers":{"cna":{"title":"Glibc DNS Resolver Vulnerability","datePublic":"2016-08-15T19:00:00.000Z","providerMetadata":{"dateUpdated":"2022-06-20T18:06:34","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"descriptions":[{"lang":"en","value":"A vulnerability in the GNU libc (glibc) DNS resolver allows remote code execution (CVE-2015-7547). However, this issue can be exploited only from a DNS server that is under the control of an attacker. (Ref # 91886).\nThis glibc issue is only exploitable by an attacker controlling the DNS server configured for the device. Furthermore, the attacker must overcome additional anti-exploitation mitigations, such as ASLR, to mount a successful attack.\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.7 and earlier; PAN-OS 7.1.3 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability in the GNU libc (glibc) DNS resolver allows remote code execution (CVE-2015-7547). However, this issue can be exploited only from a DNS server that is under the control of an attacker. (Ref # 91886).\nThis glibc issue is only exploitable by an attacker controlling the DNS server configured for the device. Furthermore, the attacker must overcome additional anti-exploitation mitigations, such as ASLR, to mount a successful attack.\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.7 and earlier; PAN-OS 7.1.3 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.14","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.19","versionType":"custom","changes":[{"at":"5.0.20","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.12","versionType":"custom","changes":[{"at":"5.1.13","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.14","versionType":"custom","changes":[{"at":"6.0.15","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.12","versionType":"custom","changes":[{"at":"6.1.13","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.7","versionType":"custom","changes":[{"at":"7.0.8","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.3","versionType":"custom","changes":[{"at":"7.1.4","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2015-7547"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["91886"],"advisory":"PAN-SA-2016-0021","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This vulnerability can affect PAN-OS software only when the device is configured with a DNS server that is under the control of an attacker. Palo Alto Networks discourages configuring the device with untrusted DNS servers.","supportingMedia":{"value":"This vulnerability can affect PAN-OS software only when the device is configured with a DNS server that is under the control of an attacker. Palo Alto Networks discourages configuring the device with untrusted DNS servers.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.8 and later; PAN-OS 7.1.4 and later","supportingMedia":{"value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.8 and later; PAN-OS 7.1.4 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2016-0020","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-08-15T18:30:00.000Z","dateReserved":"2016-08-15T18:30:00.000Z"},"containers":{"cna":{"title":"OpenSSL Vulnerabilities","datePublic":"2016-08-15T18:30:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"The OpenSSL library has been found to contain several vulnerabilities CVE-2014-8176, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-1792, CVE-2015-1794, CVE-2015-3195, CVE-2015-4000, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2176, CVE-2016-2842. Palo Alto Networks software makes use of the vulnerable library. (Ref # 95622).\nThe OpenSSL library in use by PAN-OS is patched on a regular basis. Severities of the CVEs listed under the summary section range from low to high but, have not been shown to be exploitable at the time of this advisory.\nThis issue affects PAN-OS 5.0.X; PAN-OS-5.1.X; PAN-OS 6.0.13 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.8 and earlier; PAN-OS 7.1.3 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The OpenSSL library has been found to contain several vulnerabilities CVE-2014-8176, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-1792, CVE-2015-1794, CVE-2015-3195, CVE-2015-4000, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2176, CVE-2016-2842. Palo Alto Networks software makes use of the vulnerable library. (Ref # 95622).\nThe OpenSSL library in use by PAN-OS is patched on a regular basis. Severities of the CVEs listed under the summary section range from low to high but, have not been shown to be exploitable at the time of this advisory.\nThis issue affects PAN-OS 5.0.X; PAN-OS-5.1.X; PAN-OS 6.0.13 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.8 and earlier; PAN-OS 7.1.3 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.13","versionType":"custom","changes":[{"at":"6.0.14","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.12","versionType":"custom","changes":[{"at":"6.1.13","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.8","versionType":"custom","changes":[{"at":"7.0.9","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.3","versionType":"custom","changes":[{"at":"7.1.4","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2016-0020"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["95622"],"advisory":"PAN-SA-2016-0020","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.0.14 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.9 and later; PAN-OS 7.1.4 and later","supportingMedia":{"value":"PAN-OS 6.0.14 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.9 and later; PAN-OS 7.1.4 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2016-0019","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-08-15T18:00:00.000Z","dateReserved":"2016-08-15T18:00:00.000Z"},"containers":{"cna":{"title":"NTP Vulnerabilities","datePublic":"2016-08-15T18:00:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"The open source ntp project has been found to contain several vulnerabilities (CVE-2015-8158, CVE-2015-8138, CVE-2015-7979, CVE-2015-7978, CVE-2015-7977, CVE-2015-7976, CVE-2015-7975, CVE-2015-7974, CVE-2015-7973, all released in January 2016). Palo Alto...\nAlso Palo Alto Networks make use of the affected version of ntp, no exploitation condition are known at the time of this advisory\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.1 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.8 and earlier; PAN-OS 7.1.3 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The open source ntp project has been found to contain several vulnerabilities (CVE-2015-8158, CVE-2015-8138, CVE-2015-7979, CVE-2015-7978, CVE-2015-7977, CVE-2015-7976, CVE-2015-7975, CVE-2015-7974, CVE-2015-7973, all released in January 2016). Palo Alto...\nAlso Palo Alto Networks make use of the affected version of ntp, no exploitation condition are known at the time of this advisory\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.1 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.8 and earlier; PAN-OS 7.1.3 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.19","versionType":"custom","changes":[{"at":"5.0.20","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.12","versionType":"custom","changes":[{"at":"5.1.13","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.1","versionType":"custom","changes":[{"at":"6.0.15","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.12","versionType":"custom","changes":[{"at":"6.1.13","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.8","versionType":"custom","changes":[{"at":"7.0.9","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.3","versionType":"custom","changes":[{"at":"7.1.4","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2016-0019"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-400 Uncontrolled Resource Consumption","cweId":"CWE-400"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["92106"],"advisory":"PAN-SA-2016-0019","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.9 and later; PAN-OS 7.1.4 and later","supportingMedia":{"value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.9 and later; PAN-OS 7.1.4 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2016-0016","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-07-15T00:00:00.000Z","dateReserved":"2016-07-15T00:00:00.000Z"},"containers":{"cna":{"title":"Web Interface Privilege Escalation","datePublic":"2016-07-15T00:00:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"Palo Alto Networks Panorama administrators have the ability to assign predefined permissions to users created on PAN-OS. A read-only user with CLI access could elevate web interface privileges. (Ref. 88191)\nA user could elevate privileges by impersonating another user with higher permissions.\nThis issue affects PAN-OS 5.0.18 and earlier; PAN-OS 5.1.11 and earlier; PAN-OS 6.0.13 and earlier; PAN-OS 6.1.10 and earlier; PAN-OS 7.0.4 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks Panorama administrators have the ability to assign predefined permissions to users created on PAN-OS. A read-only user with CLI access could elevate web interface privileges. (Ref. 88191)\nA user could elevate privileges by impersonating another user with higher permissions.\nThis issue affects PAN-OS 5.0.18 and earlier; PAN-OS 5.1.11 and earlier; PAN-OS 6.0.13 and earlier; PAN-OS 6.1.10 and earlier; PAN-OS 7.0.4 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.18","versionType":"custom","changes":[{"at":"5.0.19","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.11","versionType":"custom","changes":[{"at":"5.1.12","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.13","versionType":"custom","changes":[{"at":"6.0.14","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.10","versionType":"custom","changes":[{"at":"6.1.11","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.4","versionType":"custom","changes":[{"at":"7.0.5","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2016-0016"}],"credits":[{"lang":"en","value":"John Perry, the Boeing Company"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Web Interface Privilege Escalation"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["88191"],"advisory":"PAN-SA-2016-0016","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Customers running versions of Panorama affected by this issue could create a custom admin role that does not allow CLI access and to avoid any privilege escalation. Firewalls running PAN-OS are not affected by this issue.","supportingMedia":{"value":"Customers running versions of Panorama affected by this issue could create a custom admin role that does not allow CLI access and to avoid any privilege escalation. Firewalls running PAN-OS are not affected by this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.19 and later; PAN-OS 5.1.12 and later; PAN-OS 6.0.14 and later; PAN-OS 6.1.11 and later; PAN-OS 7.0.5 and later","supportingMedia":{"value":"PAN-OS 5.0.19 and later; PAN-OS 5.1.12 and later; PAN-OS 6.0.14 and later; PAN-OS 6.1.11 and later; PAN-OS 7.0.5 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-1712","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-07-13T18:30:00.000Z","dateReserved":"2016-07-13T18:30:00.000Z"},"containers":{"cna":{"title":"Local privilege escalation","datePublic":"2016-07-13T18:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:44","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"Palo Alto Networks firewalls do not properly sanitize the root_reboot local invocation which can potentially allow executing code with higher privileges (Ref. 92293) (CVE-2016-1712).\nExploitation of this privilege escalation is restricted to local users. Potential attackers would have to first obtain a shell on the device before they could attempt to escalate privileges through this vulnerability.\nThis issue affects PAN-OS 5.0.18 and earlier; PAN-OS 5.1.11 and earlier; PAN-OS 6.0.13 and earlier; PAN-OS 6.1.11 and earlier; PAN-OS 7.0.7 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks firewalls do not properly sanitize the root_reboot local invocation which can potentially allow executing code with higher privileges (Ref. 92293) (CVE-2016-1712).\nExploitation of this privilege escalation is restricted to local users. Potential attackers would have to first obtain a shell on the device before they could attempt to escalate privileges through this vulnerability.\nThis issue affects PAN-OS 5.0.18 and earlier; PAN-OS 5.1.11 and earlier; PAN-OS 6.0.13 and earlier; PAN-OS 6.1.11 and earlier; PAN-OS 7.0.7 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.18","versionType":"custom","changes":[{"at":"5.0.19","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.11","versionType":"custom","changes":[{"at":"5.1.12","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.13","versionType":"custom","changes":[{"at":"6.0.14","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.11","versionType":"custom","changes":[{"at":"6.1.12","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.7","versionType":"custom","changes":[{"at":"7.0.8","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-1712"}],"credits":[{"lang":"en","value":"Kasif Dekel, CheckPoint Security Team"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["92293"],"advisory":"PAN-SA-2016-0012","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.19 and later; PAN-OS 5.1.12 and later; PAN-OS 6.0.14 and later; PAN-OS 6.1.12 and later; PAN-OS 7.0.8 and later","supportingMedia":{"value":"PAN-OS 5.0.19 and later; PAN-OS 5.1.12 and later; PAN-OS 6.0.14 and later; PAN-OS 6.1.12 and later; PAN-OS 7.0.8 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2016-0011","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-07-12T17:30:00.000Z","dateReserved":"2016-07-12T17:30:00.000Z"},"containers":{"cna":{"title":"OpenSSH vulnerabilities","datePublic":"2016-07-12T17:30:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"OpenSSH contains two vulnerabilities (CVE-2016-0777 and CVE-2016-0778) affecting the SSH client roaming feature when connecting to a malicious server. Exploitation of this issue can leak portions of memory from the SSH client process. (Ref # 90508)\nThe Palo Alto Networks firewall outbound SSH client offers only the user/password authentication scheme and, therefore, does not expose a potential SSH private key.\nThis issue affects PAN-OS 7.0.9 and earlier; PAN-OS 7.1.2 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>OpenSSH contains two vulnerabilities (CVE-2016-0777 and CVE-2016-0778) affecting the SSH client roaming feature when connecting to a malicious server. Exploitation of this issue can leak portions of memory from the SSH client process. (Ref # 90508)\nThe Palo Alto Networks firewall outbound SSH client offers only the user/password authentication scheme and, therefore, does not expose a potential SSH private key.\nThis issue affects PAN-OS 7.0.9 and earlier; PAN-OS 7.1.2 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.9","versionType":"custom","changes":[{"at":"7.0.10","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.2","versionType":"custom","changes":[{"at":"7.1.3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2016-0011"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["90508"],"advisory":"PAN-SA-2016-0011","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"These vulnerabilities affect PAN-OS only when initiating a connection to a malicious server. Palo Alto Networks discourages establishing SSH sessions to unknown or untrusted servers.","supportingMedia":{"value":"These vulnerabilities affect PAN-OS only when initiating a connection to a malicious server. Palo Alto Networks discourages establishing SSH sessions to unknown or untrusted servers.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.0.10 and later; PAN-OS 7.1.3 and later","supportingMedia":{"value":"PAN-OS 7.0.10 and later; PAN-OS 7.1.3 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-3656","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-02-24T18:30:00.000Z","dateReserved":"2016-02-24T18:30:00.000Z"},"containers":{"cna":{"title":"Unauthenticated Stack Exhaustion in GlobalProtect/SSL VPN Web Interface","datePublic":"2016-02-24T18:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:44","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"When a PAN-OS device is configured as a GlobalProtect web portal, a specially crafted request to the portal could result in a crash of the service.  (Ref. #89750) (CVE-2016-3656)\nThis issue can be exploited remotely by an attacker with network access to the GlobalProtect portal in order to cause a denial-of-service (DoS) via a service crash.\nThis issue affects PAN-OS releases 5.0.17 and prior; 6.0.12 and prior; 6.1.9 and prior; 7.0.5 and prior","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>When a PAN-OS device is configured as a GlobalProtect web portal, a specially crafted request to the portal could result in a crash of the service.  (Ref. #89750) (CVE-2016-3656)\nThis issue can be exploited remotely by an attacker with network access to the GlobalProtect portal in order to cause a denial-of-service (DoS) via a service crash.\nThis issue affects PAN-OS releases 5.0.17 and prior; 6.0.12 and prior; 6.1.9 and prior; 7.0.5 and prior</pre>"}]}],"x_affectedList":["PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.17","versionType":"custom","changes":[{"at":"5.0.18","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.12","versionType":"custom","changes":[{"at":"6.0.13","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.9","versionType":"custom","changes":[{"at":"6.1.10","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.5","versionType":"custom","changes":[{"at":"7.0.5H2","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-3656"}],"credits":[{"lang":"en","value":"Felix Wilhelm, ERNW Research"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["89750"],"advisory":"PAN-SA-2016-0004","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Emergency content update 563 contains an IPS signature (#38903) that can be used as an interim mitigation to protect PAN-OS devices until the device software is upgraded.  Note that signatures 38903 must be applied to a firewall rule securing traffic destined for the GlobalProtect portal.  The GlobalProtect portal should only be present once per installation, limiting the organization’s exposure to this issue. This issue can be further mitigated by disabling the affected optional “login page” in the GlobalProtect portal configuration, and distribution of the client side software may be performed through alternative means such as GPO or network share while the PAN-OS patch is applied.","supportingMedia":{"value":"Emergency content update 563 contains an IPS signature (#38903) that can be used as an interim mitigation to protect PAN-OS devices until the device software is upgraded.  Note that signatures 38903 must be applied to a firewall rule securing traffic destined for the GlobalProtect portal.  The GlobalProtect portal should only be present once per installation, limiting the organization’s exposure to this issue. This issue can be further mitigated by disabling the affected optional “login page” in the GlobalProtect portal configuration, and distribution of the client side software may be performed through alternative means such as GPO or network share while the PAN-OS patch is applied.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS releases 5.0.18 and newer; 6.0.13 and newer; 6.1.10 and newer; 7.0.5H2 and newer","supportingMedia":{"value":"PAN-OS releases 5.0.18 and newer; 6.0.13 and newer; 6.1.10 and newer; 7.0.5H2 and newer","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-3654","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-02-24T18:30:00.000Z","dateReserved":"2016-02-24T18:30:00.000Z"},"containers":{"cna":{"title":"Command Injection in Command Line Interface","datePublic":"2016-02-24T18:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:44","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"Palo Alto Networks firewalls implement a command line interface for interactive configuration through a serial interface or a remote SSH session. An issue was identified that can cause incorrect parsing of a specific SSH command parameter, leading to arbitrary command execution on the OS level. This vulnerability requires successful authentication but can be used to execute OS commands with root privileges if the logged on user has administrative privileges. (Ref #89706) (CVE-2016-3654)\nThis vulnerability is exploitable only by authenticated administrators that are granted access to the device management CLI.\nThis issue affects PAN-OS releases 5.0.17 and prior; 5.1.10 and prior; 6.0.12 and prior; 6.1.9 and prior; 7.0.5 and prior","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks firewalls implement a command line interface for interactive configuration through a serial interface or a remote SSH session. An issue was identified that can cause incorrect parsing of a specific SSH command parameter, leading to arbitrary command execution on the OS level. This vulnerability requires successful authentication but can be used to execute OS commands with root privileges if the logged on user has administrative privileges. (Ref #89706) (CVE-2016-3654)\nThis vulnerability is exploitable only by authenticated administrators that are granted access to the device management CLI.\nThis issue affects PAN-OS releases 5.0.17 and prior; 5.1.10 and prior; 6.0.12 and prior; 6.1.9 and prior; 7.0.5 and prior</pre>"}]}],"x_affectedList":["PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.17","versionType":"custom","changes":[{"at":"5.0.18","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.10","versionType":"custom","changes":[{"at":"5.1.11","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.12","versionType":"custom","changes":[{"at":"6.0.13","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.9","versionType":"custom","changes":[{"at":"6.1.10","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.5","versionType":"custom","changes":[{"at":"7.0.5H2","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-3654"}],"credits":[{"lang":"en","value":"Felix Wilhelm, ERNW Research"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["89706"],"advisory":"PAN-SA-2016-0002","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue only affects authenticated device users and Panorama users with CLI access enabled. Deployments making use of Role-Based Access Control (RBAC) do not offer CLI access by default. As a best practice, CLI access should be carefully considered, and granted only when necessary to privileged administrators.","supportingMedia":{"value":"This issue only affects authenticated device users and Panorama users with CLI access enabled. Deployments making use of Role-Based Access Control (RBAC) do not offer CLI access by default. As a best practice, CLI access should be carefully considered, and granted only when necessary to privileged administrators.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS releases 5.0.18 and newer; 5.1.11 and newer; 6.0.13 and newer; 6.1.10 and newer; 7.0.5H2 and newer","supportingMedia":{"value":"PAN-OS releases 5.0.18 and newer; 5.1.11 and newer; 6.0.13 and newer; 6.1.10 and newer; 7.0.5H2 and newer","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2014-0224","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2014-06-09T07:00:00.000Z","dateReserved":"2014-06-09T07:00:00.000Z"},"containers":{"cna":{"title":"OpenSSL Man-in-the-middle vulnerability","datePublic":"2014-06-09T07:00:00.000Z","providerMetadata":{"dateUpdated":"2021-11-05T16:47:29","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"descriptions":[{"lang":"en","value":"The Palo Alto Networks product security engineering team has completed analysis of our products' exposure to the vulnerabilities described in the OpenSSL Security Advisory dated June 5th, 2014.  Of the 7 CVEs highlighted in the advisory, only CVE-2014-0224 is relevant to our software.  The remaining vulnerabilities to not apply because we do not use or support use of Datagram Transport Layer Security (DTLS), nor do we use anonymous Elliptic curve Diffie-Hellman (ECDH) on our software clients.  Our exposure to CVE-2014-0224 is limited because both client and server must be vulnerable.  While our client-side is vulnerable, the server-side is not.  This limits exposure to potential man-in-the-middle (MITM) attacks only to sessions our software initiates with servers outside of our control that are running a vulnerable version of OpenSSL (OpenSSL 1.0.1 and 1.0.2-beta1).  As such, services that may be vulnerable to MITM depending on customer configuration include: firewall services using SSL configured to use a proxy running a vulnerable OpenSSL server, syslog over SSL to a syslog server running a  vulnerable OpenSSL server, and the User-ID agent connecting to a directory server running a vulnerable OpenSSL server.  GlobalProtect is not vulnerable because our portal and gateway servers are not vulnerable.\n\nIn response to these issues, Palo Alto Networks is including a patch to the OpenSSL software used across our products with the next scheduled maintenance release for all supported versions of PAN-OS / Panorama, User-ID agent, and GlobalProtect.  Users can mitigate their exposure by ensuring that any servers described above are not running vulnerable versions of OpenSSL (1.0.1 and 1.0.2-beta1).  If customers have any further questions related to product exposure to this OpenSSL security advisory, they can contact support.\nThis issue requires an attacker to be able to act as a man-in-the-middle to certain firewall services, such as syslog, User-ID agent, or services between PAN-OS / Panorama and a proxy.  The issue further requires that the servers that PAN-OS / Panorama initiates connections with to perform these services are also vulnerable to CVE-2014-0224.\n\nGlobalProtect VPN is not vulnerable, as the PAN-OS Portal and Gateway servers are not vulnerable.\nThis issue affects All versions of PAN-OS / Panorama.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The Palo Alto Networks product security engineering team has completed analysis of our products' exposure to the vulnerabilities described in the OpenSSL Security Advisory dated June 5th, 2014.  Of the 7 CVEs highlighted in the advisory, only CVE-2014-0224 is relevant to our software.  The remaining vulnerabilities to not apply because we do not use or support use of Datagram Transport Layer Security (DTLS), nor do we use anonymous Elliptic curve Diffie-Hellman (ECDH) on our software clients.  Our exposure to CVE-2014-0224 is limited because both client and server must be vulnerable.  While our client-side is vulnerable, the server-side is not.  This limits exposure to potential man-in-the-middle (MITM) attacks only to sessions our software initiates with servers outside of our control that are running a vulnerable version of OpenSSL (OpenSSL 1.0.1 and 1.0.2-beta1).  As such, services that may be vulnerable to MITM depending on customer configuration include: firewall services using SSL configured to use a proxy running a vulnerable OpenSSL server, syslog over SSL to a syslog server running a  vulnerable OpenSSL server, and the User-ID agent connecting to a directory server running a vulnerable OpenSSL server.  GlobalProtect is not vulnerable because our portal and gateway servers are not vulnerable.\n\nIn response to these issues, Palo Alto Networks is including a patch to the OpenSSL software used across our products with the next scheduled maintenance release for all supported versions of PAN-OS / Panorama, User-ID agent, and GlobalProtect.  Users can mitigate their exposure by ensuring that any servers described above are not running vulnerable versions of OpenSSL (1.0.1 and 1.0.2-beta1).  If customers have any further questions related to product exposure to this OpenSSL security advisory, they can contact support.\nThis issue requires an attacker to be able to act as a man-in-the-middle to certain firewall services, such as syslog, User-ID agent, or services between PAN-OS / Panorama and a proxy.  The issue further requires that the servers that PAN-OS / Panorama initiates connections with to perform these services are also vulnerable to CVE-2014-0224.\n\nGlobalProtect VPN is not vulnerable, as the PAN-OS Portal and Gateway servers are not vulnerable.\nThis issue affects All versions of PAN-OS / Panorama.</pre>"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.0.4","status":"unaffected","lessThan":"6.0*","versionType":"custom"},{"version":"5.1.9","status":"unaffected","lessThan":"5.1*","versionType":"custom"},{"version":"5.0.14.","status":"unaffected","lessThan":"5.0*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2014-0224"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-310","cweId":"CWE-310"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"PAN-SA-2014-0003","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Services running over SSL from PAN-OS / Panorama to 3rd party servers (i.e. syslog server, directory services server) are only vulnerable to a possible MITM attack if the server is also vulnerable to CVE-2014-0224.  Ensure that the 3rd party service's server is not running a vulnerable version of OpenSSL (1.0.1 and 1.0.2-beta1).","supportingMedia":{"value":"Services running over SSL from PAN-OS / Panorama to 3rd party servers (i.e. syslog server, directory services server) are only vulnerable to a possible MITM attack if the server is also vulnerable to CVE-2014-0224.  Ensure that the 3rd party service's server is not running a vulnerable version of OpenSSL (1.0.1 and 1.0.2-beta1).","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.0.4; PAN-OS 5.1.9; PAN-OS 5.0.14.","supportingMedia":{"value":"PAN-OS 6.0.4; PAN-OS 5.1.9; PAN-OS 5.0.14.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6602","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #30122)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.3 and earlier; PAN-OS 3.1.9 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #30122)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.3 and earlier; PAN-OS 3.1.9 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 4.0","PAN-OS 3.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.3","versionType":"custom","changes":[{"at":"4.0.4","status":"unaffected"}]},{"version":"3.1","status":"affected","lessThanOrEqual":"3.1.9","versionType":"custom","changes":[{"at":"3.1.10","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6602"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["30122"],"advisory":"PAN-SA-2012-0013","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.0.4 and later; PAN-OS 3.1.10 and later.","supportingMedia":{"value":"PAN-OS 4.0.4 and later; PAN-OS 3.1.10 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6594","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #34299)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.  The attacker must still be an authenticated administrator of the device.\nThis issue affects PAN-OS 4.1.0 and earlier; PAN-OS 4.0.7 and earlier; PAN-OS 3.1.10 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #34299)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.  The attacker must still be an authenticated administrator of the device.\nThis issue affects PAN-OS 4.1.0 and earlier; PAN-OS 4.0.7 and earlier; PAN-OS 3.1.10 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 4.1","PAN-OS 4.0","PAN-OS 3.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.1","status":"affected","lessThanOrEqual":"4.1.0","versionType":"custom","changes":[{"at":"4.1.1","status":"unaffected"}]},{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.7","versionType":"custom","changes":[{"at":"4.0.8","status":"unaffected"}]},{"version":"3.1","status":"affected","lessThanOrEqual":"3.1.10","versionType":"custom","changes":[{"at":"3.1.11","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6594"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["34299"],"advisory":"PAN-SA-2012-0005","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.1.1 and later; PAN-OS 4.0.8 and later; PAN-OS 3.1.11 and later.","supportingMedia":{"value":"PAN-OS 4.1.1 and later; PAN-OS 4.0.8 and later; PAN-OS 3.1.11 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6595","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #34595)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.  The attacker must still be an authenticated administrator of the device.\nThis issue affects PAN-OS 4.1.1 and earlier; PAN-OS 4.0.8 and earlier;  PAN-OS 3.0.x is not affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #34595)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.  The attacker must still be an authenticated administrator of the device.\nThis issue affects PAN-OS 4.1.1 and earlier; PAN-OS 4.0.8 and earlier;  PAN-OS 3.0.x is not affected.</pre>"}]}],"x_affectedList":["PAN-OS 4.1","PAN-OS 4.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.1","status":"affected","lessThanOrEqual":"4.1.1","versionType":"custom","changes":[{"at":"4.1.2","status":"unaffected"}]},{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.8","versionType":"custom","changes":[{"at":"4.0.9","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6595"}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"HIGH","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","baseSeverity":"HIGH","baseScore":8.4,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["34595"],"advisory":"PAN-SA-2012-0006","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.1.2 and later. PAN-OS 4.0.9 and later.","supportingMedia":{"value":"PAN-OS 4.1.2 and later. PAN-OS 4.0.9 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6605","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can execute arbitrary code as root using the device management command line interface.  (Ref #34896)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.8 and earlier; PAN-OS 3.1.10 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can execute arbitrary code as root using the device management command line interface.  (Ref #34896)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.8 and earlier; PAN-OS 3.1.10 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 4.0","PAN-OS 3.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.8","versionType":"custom","changes":[{"at":"4.0.9","status":"unaffected"}]},{"version":"3.1","status":"affected","lessThanOrEqual":"3.1.10","versionType":"custom","changes":[{"at":"3.1.10","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6605"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["34896"],"advisory":"PAN-SA-2012-0016","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.0.9 and later; PAN-OS 3.1.10 and later.","supportingMedia":{"value":"PAN-OS 4.0.9 and later; PAN-OS 3.1.10 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6601","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an unauthenticated user can execute arbitrary code as root on the device.  (Ref #36983)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.1.3 and earlier; PAN-OS 4.0.9 and earlier; PAN-OS 3.1.11 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an unauthenticated user can execute arbitrary code as root on the device.  (Ref #36983)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.1.3 and earlier; PAN-OS 4.0.9 and earlier; PAN-OS 3.1.11 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 4.1","PAN-OS 4.0","PAN-OS 3.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.1","status":"affected","lessThanOrEqual":"4.1.3","versionType":"custom","changes":[{"at":"4.1.4","status":"unaffected"}]},{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.9","versionType":"custom","changes":[{"at":"4.0.10","status":"unaffected"}]},{"version":"3.1","status":"affected","lessThanOrEqual":"3.1.11","versionType":"custom","changes":[{"at":"3.1.12","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6601"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["36983"],"advisory":"PAN-SA-2012-0012","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.1.4 and later; PAN-OS 4.0.10 and later; PAN-OS 3.1.12 and later.","supportingMedia":{"value":"PAN-OS 4.1.4 and later; PAN-OS 4.0.10 and later; PAN-OS 3.1.12 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6604","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can execute arbitrary code as root using the device management command line interface.  (Ref #35249)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.8 and earlier; PAN-OS 3.1.10 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can execute arbitrary code as root using the device management command line interface.  (Ref #35249)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.8 and earlier; PAN-OS 3.1.10 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 4.0","PAN-OS 3.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.8","versionType":"custom","changes":[{"at":"4.0.9","status":"unaffected"}]},{"version":"3.1","status":"affected","lessThanOrEqual":"3.1.10","versionType":"custom","changes":[{"at":"3.1.10","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6604"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["35249"],"advisory":"PAN-SA-2012-0015","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.0.9 and later; PAN-OS 3.1.10 and later.","supportingMedia":{"value":"PAN-OS 4.0.9 and later; PAN-OS 3.1.10 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6599","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #33476)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.1.0 and earlier; PAN-OS 4.0.7 and earlier; PAN-OS 3.0.x is not affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #33476)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.1.0 and earlier; PAN-OS 4.0.7 and earlier; PAN-OS 3.0.x is not affected.</pre>"}]}],"x_affectedList":["PAN-OS 4.1","PAN-OS 4.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.1","status":"affected","lessThanOrEqual":"4.1.0","versionType":"custom","changes":[{"at":"4.1.1","status":"unaffected"}]},{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.7","versionType":"custom","changes":[{"at":"4.0.8","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6599"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["33476"],"advisory":"PAN-SA-2012-0010","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.1.1 and later; PAN-OS 4.0.8 and later.","supportingMedia":{"value":"PAN-OS 4.1.1 and later; PAN-OS 4.0.8 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6598","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #33080)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.7 and earlier;  PAN-OS 3.0.x is not affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #33080)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.7 and earlier;  PAN-OS 3.0.x is not affected.</pre>"}]}],"x_affectedList":["PAN-OS 4.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.7","versionType":"custom","changes":[{"at":"4.0.8","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6598"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["33080"],"advisory":"PAN-SA-2012-0009","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.0.8 and later.","supportingMedia":{"value":"PAN-OS 4.0.8 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6600","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #34502)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.1.1 and earlier; PAN-OS 4.0.8 and earlier; PAN-OS 3.0.x is not affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #34502)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.1.1 and earlier; PAN-OS 4.0.8 and earlier; PAN-OS 3.0.x is not affected.</pre>"}]}],"x_affectedList":["PAN-OS 4.1","PAN-OS 4.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.1","status":"affected","lessThanOrEqual":"4.1.1","versionType":"custom","changes":[{"at":"4.1.2","status":"unaffected"}]},{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.8","versionType":"custom","changes":[{"at":"4.0.9","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6600"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["34502"],"advisory":"PAN-SA-2012-0011","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.1.2 and later; PAN-OS 4.0.9 and later.","supportingMedia":{"value":"PAN-OS 4.1.2 and later; PAN-OS 4.0.9 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6591","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #31116)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.  The attacker must still be an authenticated administrator of the device.\nThis issue affects PAN-OS 4.0.4 and earlier; PAN-OS 3.1.9 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #31116)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.  The attacker must still be an authenticated administrator of the device.\nThis issue affects PAN-OS 4.0.4 and earlier; PAN-OS 3.1.9 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 4.0","PAN-OS 3.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.4","versionType":"custom","changes":[{"at":"4.0.5","status":"unaffected"}]},{"version":"3.1","status":"affected","lessThanOrEqual":"3.1.9","versionType":"custom","changes":[{"at":"3.1.10","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6591"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["31116"],"advisory":"PAN-SA-2012-0002","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.0.5 and later; PAN-OS 3.1.10 and later.","supportingMedia":{"value":"PAN-OS 4.0.5 and later; PAN-OS 3.1.10 and later.","type":"text/html","base64":false}}],"timeline":[]}}}]}