{"success":true,"data":[{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2026-0257","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: GlobalProtect Authentication Bypass Vulnerabilities","datePublic":"2026-05-13T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-565","description":"CWE-565 Reliance on Cookies without Validation and Integrity Checking","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-114","descriptions":[{"lang":"en","value":"CAPEC-114 Authentication Abuse"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:palo_alto_networks:pan-os:12.1.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h29:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.17:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.15:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h31:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h30:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h26:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h24:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"12.1.0","changes":[{"at":"12.1.7","status":"unaffected"},{"at":"12.1.4-h6","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","changes":[{"at":"11.2.12","status":"unaffected"},{"at":"11.2.10-h7","status":"unaffected"},{"at":"11.2.7-h14","status":"unaffected"},{"at":"11.2.4-h17","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","changes":[{"at":"11.1.15","status":"unaffected"},{"at":"11.1.13-h5","status":"unaffected"},{"at":"11.1.10-h25","status":"unaffected"},{"at":"11.1.7-h6","status":"unaffected"},{"at":"11.1.6-h32","status":"unaffected"},{"at":"11.1.4-h33","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","changes":[{"at":"10.2.18-h6","status":"unaffected"},{"at":"10.2.16-h7","status":"unaffected"},{"at":"10.2.13-h21","status":"unaffected"},{"at":"10.2.10-h36","status":"unaffected"},{"at":"10.2.7-h34","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"affected","version":"10.2.0","lessThan":"10.2.10-h36","changes":[{"at":"10.2.10-h36","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.7-h13","changes":[{"at":"11.2.7-h13","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.4","versionEndExcluding":"12.1.4-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.0","versionEndExcluding":"11.2.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.10","versionEndExcluding":"11.2.10-h7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.7","versionEndExcluding":"11.2.7-h14"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.4","versionEndExcluding":"11.2.4-h17"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.0","versionEndExcluding":"11.1.15"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.13","versionEndExcluding":"11.1.13-h5"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.10","versionEndExcluding":"11.1.10-h25"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.7","versionEndExcluding":"11.1.7-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.6","versionEndExcluding":"11.1.6-h32"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.4","versionEndExcluding":"11.1.4-h33"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.18","versionEndExcluding":"10.2.18-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.16","versionEndExcluding":"10.2.16-h7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.13","versionEndExcluding":"10.2.13-h21"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h36"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.7","versionEndExcluding":"10.2.7-h34"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:prisma_access:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h36"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:prisma_access:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.7","versionEndExcluding":"11.2.7-h13"}]}]}],"descriptions":[{"lang":"en","value":"Authentication bypass vulnerabilities in the GlobalProtect portal and gateway of Palo Alto Networks PAN-OS® software allows the attacker to bypass security restrictions and establish an unauthorized VPN connection.\n\nPanorama and Cloud NGFW are not impacted by these issues.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Authentication bypass vulnerabilities in the GlobalProtect portal and gateway of Palo Alto Networks PAN-OS® software allows the attacker to bypass security restrictions and establish an unauthorized VPN connection.<br><br>Panorama and Cloud NGFW are not impacted by these issues.</p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2026-0257","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","subConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","subIntegrityImpact":"HIGH","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"AUTOMATIC","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":7.8,"threatSeverity":"MEDIUM","threatScore":4.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:H/SI:H/SA:N/E:U/AU:N/R:A/V:D/RE:M/U:Amber"}}],"configurations":[{"lang":"eng","value":"This issue affects firewalls with GlobalProtect portal or gateway configured when authentication override cookies are enabled and a specific certificate configuration exists. To check if authentication cookies are enabled follow the steps below:\n\nOn the Portal:\n\n1. Navigate to Network > GlobalProtect > Portals in the management interface.\n2. Click on your Portal Name and go to the Agent tab.\n3. Click on your Agent Configuration profile.\n4. Go to the Authentication tab.\n5. Generate cookie for authentication override or Accept cookie for authentication override options are checked.\n\n\nOn the Gateway:\n\n1. Navigate to Network > GlobalProtect > Gateways in the management interface.\n2. Click on your Gateway Name and go to the Agent tab.\n3. Click on your Client Settings profile.\n4. Go to the Authentication Override tab.\n5. Accept cookie for authentication override option is checked.\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>This issue affects firewalls with GlobalProtect portal or gateway configured when authentication override cookies are enabled and a specific certificate configuration exists. To check if authentication cookies are enabled follow the steps below:</p><p>On the Portal:<br><br>1. Navigate to <b>Network</b> &gt; <b>GlobalProtect</b> &gt; <b>Portals</b> in the management interface.<br>2. Click on your <b>Portal Name</b> and go to the <b>Agent</b> tab.<br>3. Click on your <b>Agent Configuration</b> profile.<br>4. Go to the <b>Authentication</b> tab.<br>5. <b>Generate cookie for authentication override</b> or <b>Accept cookie for authentication override</b> options are checked.<br></p>On the Gateway:<br><br>1. Navigate to <b>Network</b> &gt; <b>GlobalProtect</b> &gt; <b>Gateways</b> in the management interface.<br>2. Click on your <b>Gateway Name</b> and go to the <b>Agent</b> tab.<br>3. Click on your <b>Client Settings</b> profile.<br>4. Go to the <b>Authentication Override</b> tab.<br>5. <b>Accept cookie for authentication override</b> option is checked.<p></p>"}]}],"workarounds":[{"lang":"eng","value":"Customers can mitigate the risk of this issue by taking any of the following actions:\n\n\n\n * Use a dedicated certificate for Authentication Override cookies: Generate a new certificate exclusively for authentication override cookies and store it securely. Do not reuse the portal or gateway certificate, and do not share this certificate with other features or users.\n * Disable Authentication Override: Uncheck the Authentication Override options (for generating and accepting cookies) in the GlobalProtect portal and gateway configuration.\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>Customers can mitigate the risk of this issue by taking any of the following actions:</span></p><p></p><ul><li><span><b><span>Use a dedicated certificate for </span>Authentication Override cookies:</b>&nbsp;</span><span>Generate a new certificate exclusively for authentication override cookies and store it securely. Do not reuse the portal or gateway certificate, and do not share this certificate with other features or users.</span></li><li><span><b>Disable Authentication Override:</b></span><span> Uncheck the Authentication Override options (for generating and accepting cookies) in the GlobalProtect portal and gateway configuration.</span></li></ul><p></p>"}]}],"solutions":[{"lang":"eng","value":"VERSION              MINOR VERSION                SUGGESTED SOLUTION\nCloud NGFW All                                    No action needed.\nPAN-OS 12.1          12.1.5 through 12.1.6        Upgrade to 12.1.7 or later.\n                     12.1.2 through 12.1.4-h*     Upgrade to 12.1.4-h6 or 12.1.7 or later.\nPAN-OS 11.2          11.2.11 or later             Upgrade to 11.2.12 or later.\n                     11.2.8 through 11.2.10-h*    Upgrade to 11.2.10-h7 or 11.2.12 or later.\n                     11.2.5 through 11.2.7-h*     Upgrade to 11.2.7-h14 or 11.2.12 or later.\n                     11.2.0 through 11.2.4-h*     Upgrade to 11.2.4-h17 or 11.2.12 or later.\nPAN-OS 11.1          11.1.14 or later             Upgrade to 11.1.15 or later.\n                     11.1.11 through 11.1.13-h*   Upgrade to 11.1.13-h5 or 11.1.15 or later.\n                     11.1.8 through 11.1.10-h*    Upgrade to 11.1.10-h25 or 11.1.15 or later.\n                     11.1.7 through 11.1.7-h*     Upgrade to 11.1.7-h6 or 11.1.15 or later.\n                     11.1.5 through 11.1.6-h*     Upgrade to 11.1.6-h32 or 11.1.15 or later.\n                     11.1.0 through 11.1.4-h*     Upgrade to 11.1.4-h33 or 11.1.15 or later.\nPAN-OS 10.2          10.2.17 through 10.2.18-h*   Upgrade to 10.2.18 or 10.2.18-h6 or later.\n                     10.2.14 through 10.2.16-h*   Upgrade to 10.2.16-h7 or 10.2.18-h6 or later.\n                     10.2.11 through 10.2.13-h*   Upgrade to 10.2.13-h21 or 10.2.18-h6 or later.\n                     10.2.8 through 10.2.10-h*    Upgrade to 10.2.10-h36 or 10.2.18-h6 or later.\n                     10.2.0 through 10.2.7-h*     Upgrade to 10.2.7-h34 or 10.2.18-h6 or later.\nAll older                                         Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\nPrisma Access 10.2   10.2.0 through 10.2.10-h*    Upgrade to 10.2.10-h36 or later.\nPrisma Access 11.2   11.2.0 through 11.2.7-h*     Upgrade to 11.2.7-h13 or later.\n\nNote: With this fix, if the firewall is configured to use an authentication override cookie for the GlobalProtect Portal or Gateway, it will regenerate the cookie using a more secure method. Therefore, GP users will need to re-authenticate after a PAN-OS upgrade, even if a valid cookie is present. This is a one time requirement. Once they re-authenticate after the upgrade, the authentication override cookie and its validity will work as they do today.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>Cloud NGFW All<br></td><td></td><td>No action needed.</td></tr><tr>\n                                <td>PAN-OS 12.1<br></td>\n                                <td>12.1.5 through 12.1.6</td>\n                                <td>Upgrade to 12.1.7 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>12.1.2 through 12.1.4-h*</td>\n                                <td>Upgrade to 12.1.4-h6 or 12.1.7 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 11.2<br></td>\n                                <td>11.2.11 or later</td>\n                                <td>Upgrade to 11.2.12 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.2.8 through 11.2.10-h*</td>\n                                <td>Upgrade to 11.2.10-h7 or 11.2.12 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.2.5 through 11.2.7-h*</td>\n                                <td>Upgrade to 11.2.7-h14 or 11.2.12 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.2.0 through 11.2.4-h*</td>\n                                <td>Upgrade to 11.2.4-h17 or 11.2.12 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 11.1<br></td>\n                                <td>11.1.14 or later</td>\n                                <td>Upgrade to 11.1.15 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.11 through 11.1.13-h*</td>\n                                <td>Upgrade to 11.1.13-h5 or 11.1.15 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.8 through 11.1.10-h*</td>\n                                <td>Upgrade to 11.1.10-h25 or 11.1.15 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.7 through 11.1.7-h*</td>\n                                <td>Upgrade to 11.1.7-h6 or 11.1.15 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.5 through 11.1.6-h*</td>\n                                <td>Upgrade to 11.1.6-h32 or 11.1.15 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.0 through 11.1.4-h*</td>\n                                <td>Upgrade to 11.1.4-h33 or 11.1.15 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 10.2<br></td>\n                                <td>10.2.17 through 10.2.18-h*</td>\n                                <td>Upgrade to 10.2.18 or 10.2.18-h6 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.14 through 10.2.16-h*</td>\n                                <td>Upgrade to 10.2.16-h7 or 10.2.18-h6 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.11 through 10.2.13-h*</td>\n                                <td>Upgrade to 10.2.13-h21 or 10.2.18-h6 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.8 through 10.2.10-h*</td>\n                                <td>Upgrade to 10.2.10-h36 or 10.2.18-h6 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.0 through 10.2.7-h*</td>\n                                <td>Upgrade to 10.2.7-h34 or 10.2.18-h6 or later.</td>\n                            </tr><tr><td>All older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr><tr>\n                                <td>Prisma Access 10.2<br></td>\n                                <td>10.2.0 through 10.2.10-h*</td>\n                                <td>Upgrade to 10.2.10-h36 or later.</td>\n                            </tr><tr>\n                                <td>Prisma Access 11.2<br></td>\n                                <td>11.2.0 through 11.2.7-h*</td>\n                                <td>Upgrade to 11.2.7-h13 or later.<br></td>\n                            </tr></tbody></table><p><b>Note</b>:&nbsp;With this fix, if the firewall is configured to use an authentication override cookie for the GlobalProtect Portal or Gateway, it will regenerate the cookie using a more secure method. Therefore, GP users will need to re-authenticate after a PAN-OS upgrade, even if a valid cookie is present. This is a one time requirement. Once they re-authenticate after the upgrade, the authentication override cookie and its validity will work as they do today.</p>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of these issues.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Palo Alto Networks is not aware of any malicious exploitation of these issues.</p>"}]}],"timeline":[{"time":"2026-05-13T16:00:00.000Z","lang":"en","value":"Initial publication."},{"time":"2026-05-14T19:15:00.000Z","lang":"en","value":"Updated the Fix release timeline for 10.2.16-h7."}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.","type":"other"}],"source":{"discovery":"INTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 12.1.6","PAN-OS 12.1.5","PAN-OS 12.1.4-h3","PAN-OS 12.1.4-h2","PAN-OS 12.1.4","PAN-OS 12.1.3-h3","PAN-OS 12.1.3-h1","PAN-OS 12.1.3","PAN-OS 12.1.2","PAN-OS 11.2.11","PAN-OS 11.2.10-h4","PAN-OS 11.2.10-h3","PAN-OS 11.2.10-h2","PAN-OS 11.2.10-h1","PAN-OS 11.2.10","PAN-OS 11.2.9","PAN-OS 11.2.8","PAN-OS 11.2.7-h11","PAN-OS 11.2.7-h10","PAN-OS 11.2.7-h8","PAN-OS 11.2.7-h7","PAN-OS 11.2.7-h4","PAN-OS 11.2.7-h3","PAN-OS 11.2.7-h2","PAN-OS 11.2.7-h1","PAN-OS 11.2.7","PAN-OS 11.2.6","PAN-OS 11.2.5","PAN-OS 11.2.4-h15","PAN-OS 11.2.4-h14","PAN-OS 11.2.4-h12","PAN-OS 11.2.4-h11","PAN-OS 11.2.4-h10","PAN-OS 11.2.4-h9","PAN-OS 11.2.4-h8","PAN-OS 11.2.4-h7","PAN-OS 11.2.4-h6","PAN-OS 11.2.4-h5","PAN-OS 11.2.4-h4","PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.13-h3","PAN-OS 11.1.13-h2","PAN-OS 11.1.13-h1","PAN-OS 11.1.13","PAN-OS 11.1.12","PAN-OS 11.1.11","PAN-OS 11.1.10-h21","PAN-OS 11.1.10-h12","PAN-OS 11.1.10-h10","PAN-OS 11.1.10-h9","PAN-OS 11.1.10-h7","PAN-OS 11.1.10-h5","PAN-OS 11.1.10-h4","PAN-OS 11.1.10-h1","PAN-OS 11.1.10","PAN-OS 11.1.9","PAN-OS 11.1.8","PAN-OS 11.1.6-h29","PAN-OS 11.1.6-h25","PAN-OS 11.1.6-h23","PAN-OS 11.1.6-h22","PAN-OS 11.1.6-h21","PAN-OS 11.1.6-h20","PAN-OS 11.1.6-h19","PAN-OS 11.1.6-h18","PAN-OS 11.1.6-h17","PAN-OS 11.1.6-h14","PAN-OS 11.1.6-h10","PAN-OS 11.1.6-h7","PAN-OS 11.1.6-h6","PAN-OS 11.1.6-h4","PAN-OS 11.1.6-h3","PAN-OS 11.1.6-h2","PAN-OS 11.1.6-h1","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h27","PAN-OS 11.1.4-h25","PAN-OS 11.1.4-h18","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.18-h1","PAN-OS 10.2.18","PAN-OS 10.2.17","PAN-OS 10.2.16-h6","PAN-OS 10.2.16-h4","PAN-OS 10.2.16-h1","PAN-OS 10.2.16","PAN-OS 10.2.15","PAN-OS 10.2.14-h1","PAN-OS 10.2.14","PAN-OS 10.2.13-h18","PAN-OS 10.2.13-h16","PAN-OS 10.2.13-h15","PAN-OS 10.2.13-h10","PAN-OS 10.2.13-h7","PAN-OS 10.2.13-h5","PAN-OS 10.2.13-h4","PAN-OS 10.2.13-h3","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h6","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h13","PAN-OS 10.2.11-h12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h31","PAN-OS 10.2.10-h30","PAN-OS 10.2.10-h27","PAN-OS 10.2.10-h26","PAN-OS 10.2.10-h23","PAN-OS 10.2.10-h21","PAN-OS 10.2.10-h18","PAN-OS 10.2.10-h17","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h21","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h32","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2026-0258","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Server-Side Request Forgery (SSRF) in IKEv2 Certificate URL Fetching","datePublic":"2026-05-13T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-918","description":"CWE-918 Server-Side Request Forgery (SSRF)","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-664","descriptions":[{"lang":"en","value":"CAPEC-664 Server-Side Request Forgery"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:palo_alto_networks:pan-os:12.1.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h29:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.17:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.15:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h31:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h30:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h26:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h24:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"12.1.0","changes":[{"at":"12.1.4-h5","status":"unaffected"},{"at":"12.1.7","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","changes":[{"at":"11.2.4-h17","status":"unaffected"},{"at":"11.2.7-h13","status":"unaffected"},{"at":"11.2.10-h6","status":"unaffected"},{"at":"11.2.12","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","changes":[{"at":"11.1.4-h33","status":"unaffected"},{"at":"11.1.6-h32","status":"unaffected"},{"at":"11.1.7-h6","status":"unaffected"},{"at":"11.1.10-h25","status":"unaffected"},{"at":"11.1.13-h5","status":"unaffected"},{"at":"11.1.15","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","changes":[{"at":"10.2.7-h34","status":"unaffected"},{"at":"10.2.10-h36","status":"unaffected"},{"at":"10.2.13-h21","status":"unaffected"},{"at":"10.2.16-h7","status":"unaffected"},{"at":"10.2.18-h6","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.4","versionEndExcluding":"12.1.4-h5"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.4","versionEndExcluding":"11.2.4-h17"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.7","versionEndExcluding":"11.2.7-h13"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.10","versionEndExcluding":"11.2.10-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.0","versionEndExcluding":"11.2.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.4","versionEndExcluding":"11.1.4-h33"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.6","versionEndExcluding":"11.1.6-h32"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.7","versionEndExcluding":"11.1.7-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.10","versionEndExcluding":"11.1.10-h25"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.13","versionEndExcluding":"11.1.13-h5"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.0","versionEndExcluding":"11.1.15"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.7","versionEndExcluding":"10.2.7-h34"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h36"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.13","versionEndExcluding":"10.2.13-h21"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.16","versionEndExcluding":"10.2.16-h7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.18","versionEndExcluding":"10.2.18-h6"}]}]}],"descriptions":[{"lang":"en","value":"A server-side request forgery (SSRF) vulnerability in the IKEv2 implementation of Palo Alto Networks PAN-OS® software allows an unauthenticated attacker to cause the firewall to send network requests to unintended destinations or cause a denial of service (DoS) condition.\n\nPanorama, Cloud NGFW and Prisma® Access are not impacted by these vulnerabilities.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>A server-side request forgery (SSRF) vulnerability in the IKEv2 implementation of Palo Alto Networks PAN-OS® software allows an unauthenticated attacker to cause the firewall to send network requests to unintended destinations or cause a denial of service (DoS) condition.</p><p>Panorama, Cloud NGFW and Prisma<span>®</span> Access are not impacted by these vulnerabilities.</p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2026-0258","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"HIGH","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.3,"threatSeverity":"MEDIUM","threatScore":4.8,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:Y/R:U/V:C/RE:H/U:Amber"}}],"configurations":[{"lang":"eng","value":"This issue is applicable only to PAN-OS configurations with a PAN-OS Site-to-Site VPN Gateway with IKEv2 configured.\n\nTo verify if you have Site-to-Site VPN Gateway that is configured with IKEv2 on a device please refer to our documentation (https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGkCAK).","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>This issue is applicable only to PAN-OS configurations with a PAN-OS Site-to-Site VPN Gateway with IKEv2 configured.</p><p>To verify if you have Site-to-Site VPN Gateway that is configured with IKEv2 on a device please&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGkCAK\">refer to our documentation</a>.</p>"}]}],"workarounds":[{"lang":"eng","value":"Customers who do not require IKEv2 VPN can mitigate this issue by removing all IKEv2 VPN gateway configurations.\n\nCustomers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510014 (from Applications and Threats content version 9100-10044).\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Customers who do not require IKEv2 VPN can mitigate this issue by removing all IKEv2 VPN gateway configurations.</p><p>Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510014 (from Applications and Threats content version 9100-10044).<br></p>"}]}],"solutions":[{"lang":"eng","value":"VERSION                                 MINOR VERSION                SUGGESTED SOLUTION\nCloud NGFW                                                           No action needed\nPAN-OS 12.1                             12.1.5 through 12.1.6        Upgrade to 12.1.7 or later.\n                                        12.1.2 through 12.1.4-h*     Upgrade to 12.1.4-h5 or 12.1.7 or later.\nPAN-OS 11.2                             11.2.11 or later             Upgrade to 11.2.12 or later.\n                                        11.2.8 through 11.2.10-h*    Upgrade to 11.2.10-h6 or 11.2.12 or later.\n                                        11.2.5 through 11.2.7-h*     Upgrade to 11.2.7-h13 or 11.2.12 or later.\n                                        11.2.0 through 11.2.4-h*     Upgrade to 11.2.4-h17 or 11.2.12 or later.\nPAN-OS 11.1                             11.1.14 or later             Upgrade to 11.1.15 or later.\n                                        11.1.11 through 11.1.13-h*   Upgrade to 11.1.13-h5 or 11.1.15 or later.\n                                        11.1.8 through 11.1.10-h*    Upgrade to 11.1.10-h25 or 11.1.15 or later.\n                                        11.1.7 through 11.1.7-h*     Upgrade to 11.1.7-h6 or 11.1.15 or later.\n                                        11.1.5 through 11.1.6-h*     Upgrade to 11.1.6-h32 or 11.1.15 or later.\n                                        11.1.0 through 11.1.4-h*     Upgrade to 11.1.4-h33 or 11.1.15 or later.\nPAN-OS 10.2                             10.2.17 through 10.2.18-h*   Upgrade to 10.2.18-h6 or later.\n                                        10.2.14 through 10.2.16-h*   Upgrade to 10.2.16-h7 or 10.2.18-h6 or later.\n                                        10.2.11 through 10.2.13-h*   Upgrade to 10.2.13-h21 or 10.2.18-h6 or later.\n                                        10.2.8 through 10.2.10-h*    Upgrade to 10.2.10-h36 or 10.2.18-h6 or later.\n                                        10.2.0 through 10.2.7-h*     Upgrade to 10.2.7-h34 or 10.2.18-h6 or later\nPrisma Access                                                        No action needed. \nAll older unsupported PAN-OS versions                                Upgrade to a supported fixed version.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version</th><th>Minor Version</th><th>Suggested Solution</th></tr></thead><tbody><tr><td> Cloud NGFW</td><td>&nbsp;</td><td>No action needed</td></tr><tr><td>PAN-OS 12.1</td><td>12.1.5 through 12.1.6</td><td>Upgrade to 12.1.7 or later.</td></tr><tr><td><br></td><td>12.1.2 through 12.1.4-h*</td><td>Upgrade to 12.1.4-h5 or 12.1.7 or later.</td></tr><tr><td>PAN-OS 11.2</td><td>11.2.11 or later</td><td>Upgrade to 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.8 through 11.2.10-h*</td><td>Upgrade to 11.2.10-h6 or 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.5 through 11.2.7-h*</td><td>Upgrade to 11.2.7-h13 or 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.0 through 11.2.4-h*</td><td>Upgrade to 11.2.4-h17 or 11.2.12 or later.</td></tr><tr><td>PAN-OS 11.1</td><td>11.1.14 or later</td><td>Upgrade to 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.11 through 11.1.13-h*</td><td>Upgrade to 11.1.13-h5 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.8 through 11.1.10-h*</td><td>Upgrade to 11.1.10-h25 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.7 through 11.1.7-h*</td><td>Upgrade to 11.1.7-h6 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.5 through 11.1.6-h*</td><td>Upgrade to 11.1.6-h32 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.0 through 11.1.4-h*</td><td>Upgrade to 11.1.4-h33 or 11.1.15 or later.</td></tr><tr><td>PAN-OS 10.2</td><td>10.2.17 through 10.2.18-h*</td><td>Upgrade to 10.2.18-h6 or later.</td></tr><tr><td>&nbsp;</td><td>10.2.14 through 10.2.16-h*</td><td>Upgrade to 10.2.16-h7 or 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.11 through 10.2.13-h*</td><td>Upgrade to 10.2.13-h21 or 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.8 through 10.2.10-h*</td><td>Upgrade to 10.2.10-h36 or 10.2.18-h6 or later.</td></tr><tr><td>&nbsp;</td><td>10.2.0 through 10.2.7-h*</td><td>Upgrade to 10.2.7-h34 or 10.2.18-h6 or later</td></tr><tr><td>Prisma Access&nbsp;</td><td><br></td><td>No action needed.&nbsp;</td></tr><tr><td> All older unsupported PAN-OS versions</td><td>&nbsp;</td><td> Upgrade to a supported fixed version.</td></tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Palo Alto Networks is not aware of any malicious exploitation of this issue.</p>"}]}],"timeline":[{"time":"2026-05-13T16:00:00.000Z","lang":"en","value":"Initial publication."},{"time":"2026-05-14T19:15:00.000Z","lang":"en","value":"Updated the Fix release timeline for 10.2.16-h7."}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.","type":"other"}],"source":{"discovery":"INTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 12.1.6","PAN-OS 12.1.5","PAN-OS 12.1.4-h3","PAN-OS 12.1.4-h2","PAN-OS 12.1.4","PAN-OS 12.1.3-h3","PAN-OS 12.1.3-h1","PAN-OS 12.1.3","PAN-OS 12.1.2","PAN-OS 11.2.11","PAN-OS 11.2.10-h5","PAN-OS 11.2.10-h4","PAN-OS 11.2.10-h3","PAN-OS 11.2.10-h2","PAN-OS 11.2.10-h1","PAN-OS 11.2.10","PAN-OS 11.2.9","PAN-OS 11.2.8","PAN-OS 11.2.7-h12","PAN-OS 11.2.7-h11","PAN-OS 11.2.7-h10","PAN-OS 11.2.7-h8","PAN-OS 11.2.7-h7","PAN-OS 11.2.7-h4","PAN-OS 11.2.7-h3","PAN-OS 11.2.7-h2","PAN-OS 11.2.7-h1","PAN-OS 11.2.7","PAN-OS 11.2.6","PAN-OS 11.2.5","PAN-OS 11.2.4-h15","PAN-OS 11.2.4-h14","PAN-OS 11.2.4-h12","PAN-OS 11.2.4-h11","PAN-OS 11.2.4-h10","PAN-OS 11.2.4-h9","PAN-OS 11.2.4-h8","PAN-OS 11.2.4-h7","PAN-OS 11.2.4-h6","PAN-OS 11.2.4-h5","PAN-OS 11.2.4-h4","PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.14","PAN-OS 11.1.13-h3","PAN-OS 11.1.13-h2","PAN-OS 11.1.13-h1","PAN-OS 11.1.13","PAN-OS 11.1.12","PAN-OS 11.1.11","PAN-OS 11.1.10-h21","PAN-OS 11.1.10-h12","PAN-OS 11.1.10-h10","PAN-OS 11.1.10-h9","PAN-OS 11.1.10-h7","PAN-OS 11.1.10-h5","PAN-OS 11.1.10-h4","PAN-OS 11.1.10-h1","PAN-OS 11.1.10","PAN-OS 11.1.9","PAN-OS 11.1.8","PAN-OS 11.1.6-h29","PAN-OS 11.1.6-h25","PAN-OS 11.1.6-h23","PAN-OS 11.1.6-h22","PAN-OS 11.1.6-h21","PAN-OS 11.1.6-h20","PAN-OS 11.1.6-h19","PAN-OS 11.1.6-h18","PAN-OS 11.1.6-h17","PAN-OS 11.1.6-h14","PAN-OS 11.1.6-h10","PAN-OS 11.1.6-h7","PAN-OS 11.1.6-h6","PAN-OS 11.1.6-h4","PAN-OS 11.1.6-h3","PAN-OS 11.1.6-h2","PAN-OS 11.1.6-h1","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h32","PAN-OS 11.1.4-h27","PAN-OS 11.1.4-h25","PAN-OS 11.1.4-h18","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.18-h5","PAN-OS 10.2.18-h1","PAN-OS 10.2.18","PAN-OS 10.2.17","PAN-OS 10.2.16-h6","PAN-OS 10.2.16-h4","PAN-OS 10.2.16-h1","PAN-OS 10.2.16","PAN-OS 10.2.15","PAN-OS 10.2.14-h1","PAN-OS 10.2.14","PAN-OS 10.2.13-h18","PAN-OS 10.2.13-h16","PAN-OS 10.2.13-h15","PAN-OS 10.2.13-h10","PAN-OS 10.2.13-h7","PAN-OS 10.2.13-h5","PAN-OS 10.2.13-h4","PAN-OS 10.2.13-h3","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h6","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h13","PAN-OS 10.2.11-h12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h31","PAN-OS 10.2.10-h30","PAN-OS 10.2.10-h27","PAN-OS 10.2.10-h26","PAN-OS 10.2.10-h23","PAN-OS 10.2.10-h21","PAN-OS 10.2.10-h18","PAN-OS 10.2.10-h17","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h21","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h32","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2026-0261","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Authenticated Admin Command Injection Vulnerability","datePublic":"2026-05-13T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-88","descriptions":[{"lang":"en","value":"CAPEC-88 OS Command Injection"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:palo_alto_networks:pan-os:12.1.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h29:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.17:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.15:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h31:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h30:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h26:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h24:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"12.1.0","changes":[{"at":"12.1.7","status":"unaffected"},{"at":"12.1.4-h5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","changes":[{"at":"11.2.12","status":"unaffected"},{"at":"11.2.10-h6","status":"unaffected"},{"at":"11.2.7-h13","status":"unaffected"},{"at":"11.2.4-h17","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","changes":[{"at":"11.1.15","status":"unaffected"},{"at":"11.1.13-h5","status":"unaffected"},{"at":"11.1.10-h25","status":"unaffected"},{"at":"11.1.7-h6","status":"unaffected"},{"at":"11.1.6-h32","status":"unaffected"},{"at":"11.1.4-h33","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","changes":[{"at":"10.2.18-h6","status":"unaffected"},{"at":"10.2.16-h7","status":"unaffected"},{"at":"10.2.13-h21","status":"unaffected"},{"at":"10.2.10-h36","status":"unaffected"},{"at":"10.2.7-h34","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.7","versionEndExcluding":"11.2.7-h13"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.0","versionEndExcluding":"11.1.15"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h36"}]}]}],"descriptions":[{"lang":"en","value":"Multiple command injection vulnerabilities in Palo Alto Networks PAN-OS® software enable an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI or Web UI.\n\nThe security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators and by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practice deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431).\n\nThis issue is applicable to PAN-OS software on PA-Series and VM-Series firewalls and on Panorama (virtual and M-Series).\n\nCloud NGFW and Prisma Access® are not impacted by these vulnerabilities.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Multiple command injection vulnerabilities in Palo Alto Networks PAN-OS® software enable an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI or Web UI.</p><p>The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators and by restricting access to the management web interface to only trusted internal IP addresses according to our recommended <a href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">best practice deployment guidelines</a>.</p><p>This issue is applicable to PAN-OS software on PA-Series and VM-Series firewalls and on Panorama (virtual and M-Series).</p><p>Cloud NGFW and Prisma Access® are not impacted by these vulnerabilities.</p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2026-0261","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"The risk is highest when you allow access to the management interface from external IP addresses on the internet."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.6,"threatSeverity":"MEDIUM","threatScore":6.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"You can reduce the risk of exploitation by restricting access to a jump box that is the only system allowed to access the management interface."}],"cvssV4_0":{"version":"4.0","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.4,"threatSeverity":"MEDIUM","threatScore":5.7,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber"}}],"configurations":[{"lang":"eng","value":"No special configuration is required to be affected by this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>No special configuration is required to be affected by this issue.</p>"}]}],"workarounds":[{"lang":"eng","value":"The vast majority of firewalls already follow Palo Alto Networks' and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our best practice deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431). Specifically, you should restrict management interface access to only trusted internal IP addresses.\n\nReview information about how to secure management access to your Palo Alto Networks firewalls:\n\n * Palo Alto Networks LIVEcommunity article: https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\n * Palo Alto Networks official and detailed technical documentation: https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\n\nCustomers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat IDs 510017, 510018 and 510024 and can detect attacks for this vulnerability by enabling Threat IDs 510021, 510025 and 510026 (from Applications and Threats content version 9100-10044 and later). For these Threat IDs to protect against attacks for this vulnerability:\n\n\n\n * Route incoming traffic for the MGT port through a DP port (https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#id59206398-3dab-4b2f-9b4b-7ea500d036ba), e.g., enabling management profile on a DP interface for management access.\n * Replace the Certificate for Inbound Traffic Management (https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#id112f7714-8995-4496-bbf9-781e63dec71c).\n * Decrypt inbound traffic to the management interface (https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#idbbd82587-17a2-42b4-9245-d3714e1e13a2) so the firewall can inspect it (https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#idbbd82587-17a2-42b4-9245-d3714e1e13a2).\n * Enable threat prevention on the inbound traffic to management services.\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>The vast majority of firewalls already follow Palo Alto Networks' and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">best practice deployment guidelines</a>. Specifically, you should restrict management interface access to only trusted internal IP addresses.</p><p>Review information about how to secure management access to your Palo Alto Networks firewalls:</p><ul><li>Palo Alto Networks LIVEcommunity article:&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431</a></li><li>Palo Alto Networks official and detailed technical documentation:&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\">https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices</a></li></ul><p>Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat IDs 510017, 510018 and 510024 and can detect attacks for this vulnerability by enabling Threat IDs 510021, 510025 and 510026 (from Applications and Threats content version 9100-10044 and later). For these Threat IDs to protect against attacks for this vulnerability:</p><p></p><ul><li><a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#id59206398-3dab-4b2f-9b4b-7ea500d036ba\">Route incoming traffic for the MGT port through a DP port</a>, e.g., enabling management profile on a DP interface for management access.</li><li><a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#id112f7714-8995-4496-bbf9-781e63dec71c\">Replace the Certificate for Inbound Traffic Management</a>.</li><li><a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#idbbd82587-17a2-42b4-9245-d3714e1e13a2\">Decrypt inbound traffic to the management interface</a><a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#idbbd82587-17a2-42b4-9245-d3714e1e13a2\"> so the firewall can inspect it</a>.</li><li>Enable threat prevention on the inbound traffic to management services.</li></ul><p></p>"}]}],"solutions":[{"lang":"eng","value":"VERSION           MINOR VERSION                SUGGESTED SOLUTION\nCloud NGFW                                     No action needed.\nPAN-OS 12.1       12.1.5 through 12.1.6        Upgrade to 12.1.7 or later.\n                  12.1.2 through 12.1.4-h*     Upgrade to 12.1.4-h5 or 12.1.7 or later.\nPAN-OS 11.2       11.2.11 or later             Upgrade to 11.2.12 or later.\n                  11.2.8 through 11.2.10-h*    Upgrade to 11.2.10-h6 or 11.2.12 or later.\n                  11.2.5 through 11.2.7-h*     Upgrade to 11.2.7-h13 or 11.2.12 or later.\n                  11.2.0 through 11.2.4-h*     Upgrade to 11.2.4-h17 or 11.2.12 or later.\nPAN-OS 11.1       11.1.14 or later             Upgrade to 11.1.15 or later.\n                  11.1.11 through 11.1.13-h*   Upgrade to 11.1.13-h5 or 11.1.15 or later.\n                  11.1.8 through 11.1.10-h*    Upgrade to 11.1.10-h25 or 11.1.15 or later.\n                  11.1.7 through 11.1.7-h*     Upgrade to 11.1.7-h6 or 11.1.15 or later.\n                  11.1.5 through 11.1.6-h*     Upgrade to 11.1.6-h32 or 11.1.15 or later.\n                  11.1.0 through 11.1.4-h*     Upgrade to 11.1.4-h33 or 11.1.15 or later.\nPAN-OS 10.2       10.2.17 through 10.2.18-h*   Upgrade to 10.2.18-h6 or later.\n                  10.2.14 through 10.2.16-h*   Upgrade to 10.2.16-h7 or 10.2.18-h6 or later.\n                  10.2.11 through 10.2.13-h*   Upgrade to 10.2.13-h21 or 10.2.18-h6 or later.\n                  10.2.8 through 10.2.10-h*    Upgrade to 10.2.10-h36 or 10.2.18-h6 or later.\n                  10.2.0 through 10.2.7-h*     Upgrade to 10.2.7-h34 or 10.2.18-h6 or later.\nAll older                                      Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\nPrisma Access                                  No action needed.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>Cloud NGFW<br></td><td></td><td>No action needed.</td></tr><tr>\n                                <td>PAN-OS 12.1<br></td>\n                                <td>12.1.5 through 12.1.6</td>\n                                <td>Upgrade to 12.1.7 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>12.1.2 through 12.1.4-h*</td>\n                                <td>Upgrade to 12.1.4-h5 or 12.1.7 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 11.2<br></td>\n                                <td>11.2.11 or later</td>\n                                <td>Upgrade to 11.2.12 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.2.8 through 11.2.10-h*</td>\n                                <td>Upgrade to 11.2.10-h6 or 11.2.12 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.2.5 through 11.2.7-h*</td>\n                                <td>Upgrade to 11.2.7-h13 or 11.2.12 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.2.0 through 11.2.4-h*</td>\n                                <td>Upgrade to 11.2.4-h17 or 11.2.12 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 11.1<br></td>\n                                <td>11.1.14 or later</td>\n                                <td>Upgrade to 11.1.15 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.11 through 11.1.13-h*</td>\n                                <td>Upgrade to 11.1.13-h5 or 11.1.15 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.8 through 11.1.10-h*</td>\n                                <td>Upgrade to 11.1.10-h25 or 11.1.15 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.7 through 11.1.7-h*</td>\n                                <td>Upgrade to 11.1.7-h6 or 11.1.15 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.5 through 11.1.6-h*</td>\n                                <td>Upgrade to 11.1.6-h32 or 11.1.15 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.0 through 11.1.4-h*</td>\n                                <td>Upgrade to 11.1.4-h33 or 11.1.15 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 10.2<br></td>\n                                <td>10.2.17 through 10.2.18-h*</td>\n                                <td>Upgrade to 10.2.18-h6 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.14 through 10.2.16-h*</td>\n                                <td>Upgrade to 10.2.16-h7 or 10.2.18-h6 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.11 through 10.2.13-h*</td>\n                                <td>Upgrade to 10.2.13-h21 or 10.2.18-h6 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.8 through 10.2.10-h*</td>\n                                <td>Upgrade to 10.2.10-h36 or 10.2.18-h6 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.0 through 10.2.7-h*</td>\n                                <td>Upgrade to 10.2.7-h34 or 10.2.18-h6 or later.</td>\n                            </tr><tr><td>All older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr><tr><td>Prisma Access<br></td><td></td><td>No action needed.</td></tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of these issues.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Palo Alto Networks is not aware of any malicious exploitation of these issues.</p>"}]}],"timeline":[{"time":"2026-05-13T16:00:00.000Z","lang":"en","value":"Initial publication."},{"time":"2026-05-14T19:15:00.000Z","lang":"en","value":"Updated the Fix release timeline for 10.2.16-h7."}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.","type":"other"}],"source":{"discovery":"INTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 12.1.6","PAN-OS 12.1.5","PAN-OS 12.1.4-h3","PAN-OS 12.1.4-h2","PAN-OS 12.1.4","PAN-OS 12.1.3-h3","PAN-OS 12.1.3-h1","PAN-OS 12.1.3","PAN-OS 12.1.2","PAN-OS 11.2.11","PAN-OS 11.2.10-h4","PAN-OS 11.2.10-h3","PAN-OS 11.2.10-h2","PAN-OS 11.2.10-h1","PAN-OS 11.2.10","PAN-OS 11.2.9","PAN-OS 11.2.8","PAN-OS 11.2.7-h11","PAN-OS 11.2.7-h10","PAN-OS 11.2.7-h8","PAN-OS 11.2.7-h7","PAN-OS 11.2.7-h4","PAN-OS 11.2.7-h3","PAN-OS 11.2.7-h2","PAN-OS 11.2.7-h1","PAN-OS 11.2.7","PAN-OS 11.2.6","PAN-OS 11.2.5","PAN-OS 11.2.4-h15","PAN-OS 11.2.4-h14","PAN-OS 11.2.4-h12","PAN-OS 11.2.4-h11","PAN-OS 11.2.4-h10","PAN-OS 11.2.4-h9","PAN-OS 11.2.4-h8","PAN-OS 11.2.4-h7","PAN-OS 11.2.4-h6","PAN-OS 11.2.4-h5","PAN-OS 11.2.4-h4","PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.13-h3","PAN-OS 11.1.13-h2","PAN-OS 11.1.13-h1","PAN-OS 11.1.13","PAN-OS 11.1.12","PAN-OS 11.1.11","PAN-OS 11.1.10-h21","PAN-OS 11.1.10-h12","PAN-OS 11.1.10-h10","PAN-OS 11.1.10-h9","PAN-OS 11.1.10-h7","PAN-OS 11.1.10-h5","PAN-OS 11.1.10-h4","PAN-OS 11.1.10-h1","PAN-OS 11.1.10","PAN-OS 11.1.9","PAN-OS 11.1.8","PAN-OS 11.1.6-h29","PAN-OS 11.1.6-h25","PAN-OS 11.1.6-h23","PAN-OS 11.1.6-h22","PAN-OS 11.1.6-h21","PAN-OS 11.1.6-h20","PAN-OS 11.1.6-h19","PAN-OS 11.1.6-h18","PAN-OS 11.1.6-h17","PAN-OS 11.1.6-h14","PAN-OS 11.1.6-h10","PAN-OS 11.1.6-h7","PAN-OS 11.1.6-h6","PAN-OS 11.1.6-h4","PAN-OS 11.1.6-h3","PAN-OS 11.1.6-h2","PAN-OS 11.1.6-h1","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h27","PAN-OS 11.1.4-h25","PAN-OS 11.1.4-h18","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.18-h1","PAN-OS 10.2.18","PAN-OS 10.2.17","PAN-OS 10.2.16-h6","PAN-OS 10.2.16-h4","PAN-OS 10.2.16-h1","PAN-OS 10.2.16","PAN-OS 10.2.15","PAN-OS 10.2.14-h1","PAN-OS 10.2.14","PAN-OS 10.2.13-h18","PAN-OS 10.2.13-h16","PAN-OS 10.2.13-h15","PAN-OS 10.2.13-h10","PAN-OS 10.2.13-h7","PAN-OS 10.2.13-h5","PAN-OS 10.2.13-h4","PAN-OS 10.2.13-h3","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h6","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h13","PAN-OS 10.2.11-h12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h31","PAN-OS 10.2.10-h30","PAN-OS 10.2.10-h27","PAN-OS 10.2.10-h26","PAN-OS 10.2.10-h23","PAN-OS 10.2.10-h21","PAN-OS 10.2.10-h18","PAN-OS 10.2.10-h17","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h21","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h32","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2026-0262","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Denial of Service Vulnerabilities in Network Traffic Parsing","datePublic":"2026-05-13T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-754","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-153","descriptions":[{"lang":"en","value":"CAPEC-153 Input Data Manipulation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","platforms":["Azure/AWS"],"versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:palo_alto_networks:pan-os:12.1.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h29:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.17:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.15:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h31:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h30:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h26:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h24:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"12.1.0","changes":[{"at":"12.1.7","status":"unaffected"},{"at":"12.1.4-h5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","changes":[{"at":"11.2.12","status":"unaffected"},{"at":"11.2.10-h6","status":"unaffected"},{"at":"11.2.7-h13","status":"unaffected"},{"at":"11.2.4-h17","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","changes":[{"at":"11.1.15","status":"unaffected"},{"at":"11.1.13-h5","status":"unaffected"},{"at":"11.1.10-h25","status":"unaffected"},{"at":"11.1.7-h6","status":"unaffected"},{"at":"11.1.6-h32","status":"unaffected"},{"at":"11.1.4-h33","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","changes":[{"at":"10.2.18-h6","status":"unaffected"},{"at":"10.2.16-h7","status":"unaffected"},{"at":"10.2.13-h21","status":"unaffected"},{"at":"10.2.10-h36","status":"unaffected"},{"at":"10.2.7-h34","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"affected","version":"10.2.0","lessThan":"10.2.10-h36","changes":[{"at":"10.2.10-h36","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.7-h13","changes":[{"at":"11.2.7-h13","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.4","versionEndExcluding":"12.1.4-h5"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.0","versionEndExcluding":"11.2.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.10","versionEndExcluding":"11.2.10-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.7","versionEndExcluding":"11.2.7-h13"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.4","versionEndExcluding":"11.2.4-h17"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.0","versionEndExcluding":"11.1.15"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.13","versionEndExcluding":"11.1.13-h5"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.10","versionEndExcluding":"11.1.10-h25"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.7","versionEndExcluding":"11.1.7-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.6","versionEndExcluding":"11.1.6-h32"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.4","versionEndExcluding":"11.1.4-h33"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.18","versionEndExcluding":"10.2.18-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.16","versionEndExcluding":"10.2.16-h7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.13","versionEndExcluding":"10.2.13-h21"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h36"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.7","versionEndExcluding":"10.2.7-h34"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:prisma_access:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h36"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:prisma_access:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.7","versionEndExcluding":"11.2.7-h13"}]}]}],"descriptions":[{"lang":"en","value":"Multiple denial of service vulnerabilities in Palo Alto Networks PAN-OS® software allow an unauthenticated attacker with network access to cause a denial of service (DoS) condition by sending specially crafted network traffic to a dataplane interface.\n\nPanorama and Cloud NGFW are not impacted by these vulnerabilities.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Multiple denial of service vulnerabilities in Palo Alto Networks PAN-OS® software allow an unauthenticated attacker with network access to cause a denial of service (DoS) condition by sending specially crafted network traffic to a dataplane interface. <br><br>Panorama and Cloud NGFW are not impacted by these vulnerabilities.</p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2026-0262","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"MEDIUM","threatScore":6.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"eng","value":"No special configuration is required to be affected by this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>No special configuration is required to be affected by this issue.</p>"}]}],"workarounds":[{"lang":"eng","value":"Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat IDs 510011, 510015, 510022 (HTTP traffic only), and 510023 (from Applications and Threats content version 9100-10044 and later).\n\nPlease note that all of the above Threat IDs require SSL Decryption.\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p></p><p>Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat IDs 510011, 510015, 510022 (HTTP traffic only), and 510023 (from Applications and Threats content version 9100-10044 and later).</p><p>Please note that all of the above Threat IDs require SSL Decryption.</p><p></p>"}]}],"solutions":[{"lang":"eng","value":"VERSION                                 MINOR VERSION                SUGGESTED SOLUTION\nCloud NGFW                                                           No action needed\nPAN-OS 12.1                             12.1.5 through 12.1.6        Upgrade to 12.1.7 or later.\n                                        12.1.2 through 12.1.4-h*     Upgrade to 12.1.4-h5 or 12.1.7 or later.\nPAN-OS 11.2                             11.2.11 or later             Upgrade to 11.2.12 or later.\n                                        11.2.8 through 11.2.10-h*    Upgrade to 11.2.10-h6 or 11.2.12 or later.\n                                        11.2.5 through 11.2.7-h*     Upgrade to 11.2.7-h13 or 11.2.12 or later.\n                                        11.2.0 through 11.2.4-h*     Upgrade to 11.2.4-h17 or 11.2.12 or later.\nPAN-OS 11.1                             11.1.14 or later             Upgrade to 11.1.15 or later.\n                                        11.1.11 through 11.1.13-h*   Upgrade to 11.1.13-h5 or 11.1.15 or later.\n                                        11.1.8 through 11.1.10-h*    Upgrade to 11.1.10-h25 or 11.1.15 or later.\n                                        11.1.7 through 11.1.7-h*     Upgrade to 11.1.7-h6 or 11.1.15 or later.\n                                        11.1.5 through 11.1.6-h*     Upgrade to 11.1.6-h32 or 11.1.15 or later.\n                                        11.1.0 through 11.1.4-h*     Upgrade to 11.1.4-h33 or 11.1.15 or later.\nPAN-OS 10.2                             10.2.17 through 10.2.18-h*   Upgrade to 10.2.18-h6 or later.\n                                        10.2.14 through 10.2.16-h*   Upgrade to 10.2.16-h7 or 10.2.18-h6 or later.\n                                        10.2.11 through 10.2.13-h*   Upgrade to 10.2.13-h21 or 10.2.18-h6 or later.\n                                        10.2.8 through 10.2.10-h*    Upgrade to 10.2.10-h36 or 10.2.18-h6 or later.\n                                        10.2.0 through 10.2.7-h*     Upgrade to 10.2.7-h34 or 10.2.18-h6 or later.\nPrisma Access 10.2                      10.2.0 through 10.2.10-h*    Upgrade to 10.2.10-h36 or later.\nPrisma Access 11.2                      11.2.0 through 11.2.7-h*      Upgrade to 11.2.7-h13 or later.\nAll older unsupported PAN-OS versions                                Upgrade to a supported fixed version.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version</th><th>Minor Version</th><th>Suggested Solution</th></tr></thead><tbody><tr><td> Cloud NGFW</td><td>&nbsp;</td><td>No action needed</td></tr><tr><td>PAN-OS 12.1</td><td>12.1.5 through 12.1.6</td><td>Upgrade to 12.1.7 or later.</td></tr><tr><td><br></td><td>12.1.2 through 12.1.4-h*</td><td>Upgrade to 12.1.4-h5 or 12.1.7 or later.</td></tr><tr><td>PAN-OS 11.2</td><td>11.2.11 or later</td><td>Upgrade to 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.8 through 11.2.10-h*</td><td>Upgrade to 11.2.10-h6 or 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.5 through 11.2.7-h*</td><td>Upgrade to 11.2.7-h13 or 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.0 through 11.2.4-h*</td><td>Upgrade to 11.2.4-h17 or 11.2.12 or later.</td></tr><tr><td>PAN-OS 11.1</td><td>11.1.14 or later</td><td>Upgrade to 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.11 through 11.1.13-h*</td><td>Upgrade to 11.1.13-h5 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.8 through 11.1.10-h*</td><td>Upgrade to 11.1.10-h25 or 11.1.15 or later.</td></tr><tr><td><br></td><td><br>11.1.7 through 11.1.7-h*<br></td><td>Upgrade to 11.1.7-h6 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.5 through 11.1.6-h*</td><td>Upgrade to 11.1.6-h32 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.0 through 11.1.4-h*</td><td>Upgrade to 11.1.4-h33 or 11.1.15 or later.</td></tr><tr><td>PAN-OS 10.2</td><td>10.2.17 through 10.2.18-h*</td><td>Upgrade to 10.2.18-h6 or later.</td></tr><tr><td>&nbsp;</td><td>10.2.14 through 10.2.16-h*</td><td>Upgrade to 10.2.16-h7 or 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.11 through 10.2.13-h*</td><td>Upgrade to 10.2.13-h21 or 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.8 through 10.2.10-h*</td><td>Upgrade to 10.2.10-h36 or 10.2.18-h6 or later.</td></tr><tr><td>&nbsp;</td><td>10.2.0 through 10.2.7-h*</td><td>Upgrade to 10.2.7-h34 or 10.2.18-h6 or later.</td></tr><tr><td>Prisma Access 10.2</td><td><span>10.2.0 through 10.2.10-h*</span><br></td><td><span>Upgrade to 10.2.10-h36 or later.</span> <br></td></tr><tr><td>Prisma Access 11.2</td><td>11.2.0 through 11.2.7-h*<br></td><td>&nbsp;Upgrade to 11.2.7-h13 or later.<br></td></tr><tr><td> All older unsupported PAN-OS versions</td><td>&nbsp;</td><td> Upgrade to a supported fixed version.</td></tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of these issues.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Palo Alto Networks is not aware of any malicious exploitation of these issues.</p>"}]}],"timeline":[{"time":"2026-05-13T16:00:00.000Z","lang":"en","value":"Initial publication."},{"time":"2026-05-14T19:00:00.000Z","lang":"en","value":"Updated the Fix release timeline for 10.2.16-h7."}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.","type":"other"}],"source":{"discovery":"INTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 12.1.6","PAN-OS 12.1.5","PAN-OS 12.1.4-h3","PAN-OS 12.1.4-h2","PAN-OS 12.1.4","PAN-OS 12.1.3-h3","PAN-OS 12.1.3-h1","PAN-OS 12.1.3","PAN-OS 12.1.2","PAN-OS 11.2.11","PAN-OS 11.2.10-h5","PAN-OS 11.2.10-h4","PAN-OS 11.2.10-h3","PAN-OS 11.2.10-h2","PAN-OS 11.2.10-h1","PAN-OS 11.2.10","PAN-OS 11.2.9","PAN-OS 11.2.8","PAN-OS 11.2.7-h12","PAN-OS 11.2.7-h11","PAN-OS 11.2.7-h10","PAN-OS 11.2.7-h8","PAN-OS 11.2.7-h7","PAN-OS 11.2.7-h4","PAN-OS 11.2.7-h3","PAN-OS 11.2.7-h2","PAN-OS 11.2.7-h1","PAN-OS 11.2.7","PAN-OS 11.2.6","PAN-OS 11.2.5","PAN-OS 11.2.4-h15","PAN-OS 11.2.4-h14","PAN-OS 11.2.4-h12","PAN-OS 11.2.4-h11","PAN-OS 11.2.4-h10","PAN-OS 11.2.4-h9","PAN-OS 11.2.4-h8","PAN-OS 11.2.4-h7","PAN-OS 11.2.4-h6","PAN-OS 11.2.4-h5","PAN-OS 11.2.4-h4","PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.14","PAN-OS 11.1.13-h3","PAN-OS 11.1.13-h2","PAN-OS 11.1.13-h1","PAN-OS 11.1.13","PAN-OS 11.1.12","PAN-OS 11.1.11","PAN-OS 11.1.10-h21","PAN-OS 11.1.10-h12","PAN-OS 11.1.10-h10","PAN-OS 11.1.10-h9","PAN-OS 11.1.10-h7","PAN-OS 11.1.10-h5","PAN-OS 11.1.10-h4","PAN-OS 11.1.10-h1","PAN-OS 11.1.10","PAN-OS 11.1.9","PAN-OS 11.1.8","PAN-OS 11.1.6-h29","PAN-OS 11.1.6-h25","PAN-OS 11.1.6-h23","PAN-OS 11.1.6-h22","PAN-OS 11.1.6-h21","PAN-OS 11.1.6-h20","PAN-OS 11.1.6-h19","PAN-OS 11.1.6-h18","PAN-OS 11.1.6-h17","PAN-OS 11.1.6-h14","PAN-OS 11.1.6-h10","PAN-OS 11.1.6-h7","PAN-OS 11.1.6-h6","PAN-OS 11.1.6-h4","PAN-OS 11.1.6-h3","PAN-OS 11.1.6-h2","PAN-OS 11.1.6-h1","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h32","PAN-OS 11.1.4-h27","PAN-OS 11.1.4-h25","PAN-OS 11.1.4-h18","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.18-h5","PAN-OS 10.2.18-h1","PAN-OS 10.2.18","PAN-OS 10.2.17","PAN-OS 10.2.16-h6","PAN-OS 10.2.16-h4","PAN-OS 10.2.16-h1","PAN-OS 10.2.16","PAN-OS 10.2.15","PAN-OS 10.2.14-h1","PAN-OS 10.2.14","PAN-OS 10.2.13-h18","PAN-OS 10.2.13-h16","PAN-OS 10.2.13-h15","PAN-OS 10.2.13-h10","PAN-OS 10.2.13-h7","PAN-OS 10.2.13-h5","PAN-OS 10.2.13-h4","PAN-OS 10.2.13-h3","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h6","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h13","PAN-OS 10.2.11-h12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h31","PAN-OS 10.2.10-h30","PAN-OS 10.2.10-h27","PAN-OS 10.2.10-h26","PAN-OS 10.2.10-h23","PAN-OS 10.2.10-h21","PAN-OS 10.2.10-h18","PAN-OS 10.2.10-h17","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h21","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h32","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2026-0263","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing","datePublic":"2026-05-13T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-100","descriptions":[{"lang":"en","value":"CAPEC-100 Overflow Buffers"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:palo_alto_networks:pan-os:12.1.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h29:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"12.1.0","changes":[{"at":"12.1.7","status":"unaffected"},{"at":"12.1.4-h5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","changes":[{"at":"11.2.12","status":"unaffected"},{"at":"11.2.10-h6","status":"unaffected"},{"at":"11.2.7-h13","status":"unaffected"},{"at":"11.2.4-h17","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","changes":[{"at":"11.1.15","status":"unaffected"},{"at":"11.1.13-h5","status":"unaffected"},{"at":"11.1.10-h25","status":"unaffected"},{"at":"11.1.7-h6","status":"unaffected"},{"at":"11.1.6-h32","status":"unaffected"},{"at":"11.1.4-h33","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"10.2.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.4","versionEndExcluding":"12.1.4-h5"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.4","versionEndExcluding":"11.2.4-h17"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.7","versionEndExcluding":"11.2.7-h13"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.10","versionEndExcluding":"11.2.10-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.0","versionEndExcluding":"11.2.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.4","versionEndExcluding":"11.1.4-h33"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.6","versionEndExcluding":"11.1.6-h32"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.7","versionEndExcluding":"11.1.7-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.10","versionEndExcluding":"11.1.10-h25"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.13","versionEndExcluding":"11.1.13-h5"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.0","versionEndExcluding":"11.1.15"}]}]}],"descriptions":[{"lang":"en","value":"A buffer overflow vulnerability in the IKEv2 processing of Palo Alto Networks PAN-OS® software allows an unauthenticated network-based attacker to execute arbitrary code with elevated privileges on the firewall, or cause a denial of service (DoS) condition.\n\n\nPanorama, Cloud NGFW, and Prisma® Access are not impacted by these vulnerabilities.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>A buffer overflow vulnerability in the IKEv2 processing of Palo Alto Networks PAN-OS® software allows an unauthenticated network-based attacker to execute arbitrary code with elevated privileges on the firewall, or cause a denial of service (DoS) condition.<br></p>Panorama, Cloud NGFW, and Prisma<span>®</span> Access are not impacted by these vulnerabilities."}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2026-0263","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"LOW","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"HIGH","providerUrgency":"RED","exploitMaturity":"UNREPORTED","baseSeverity":"CRITICAL","baseScore":9.2,"threatSeverity":"HIGH","threatScore":7.2,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:U/AU:Y/R:U/V:C/RE:H/U:Red"}}],"configurations":[{"lang":"eng","value":"\n\nThis issue requires IKEv2 VPN tunnels that is configured with Post Quantum Cryptography (PQC) ciphers which are not NIST approved.\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p></p>This issue requires IKEv2 VPN tunnels that is configured with Post Quantum Cryptography (PQC) ciphers which are not NIST approved.<p></p>"}]}],"workarounds":[{"lang":"eng","value":"Customers using IKEv2 VPN can mitigate this issue by configuring IKEv2 VPN tunnels only with NIST approved Post Quantum Cryptography (PQC) ciphers.\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p></p><p>Customers using IKEv2 VPN can mitigate this issue by configuring IKEv2 VPN tunnels only with NIST approved Post Quantum Cryptography (PQC) ciphers.</p><p></p>"}]}],"solutions":[{"lang":"eng","value":"VERSION                                 MINOR VERSION                SUGGESTED SOLUTION\nCloud NGFW                                                           No action needed.\nPAN-OS 12.1                             12.1.5 through 12.1.6        Upgrade to 12.1.7 or later.\n                                        12.1.2 through 12.1.4-h*     Upgrade to 12.1.4-h5 or 12.1.7 or later.\nPAN-OS 11.2                             11.2.11 or later             Upgrade to 11.2.12 or later.\n                                        11.2.8 through 11.2.10-h*    Upgrade to 11.2.10-h6 or 11.2.12 or later.\n                                        11.2.5 through 11.2.7-h*     Upgrade to 11.2.7-h13 or 11.2.12 or later.\n                                        11.2.0 through 11.2.4-h*     Upgrade to 11.2.4-h17 or 11.2.12 or later.\nPAN-OS 11.1                             11.1.14 or later             Upgrade to 11.1.15 or later.\n                                        11.1.11 through 11.1.13-h*   Upgrade to 11.1.13-h5 or 11.1.15 or later.\n                                        11.1.8 through 11.1.10-h*    Upgrade to 11.1.10-h25 or 11.1.15 or later.\n                                        11.1.7 through 11.1.7-h*     Upgrade to 11.1.7-h6 or 11.1.15 or later.\n                                        11.1.5 through 11.1.6-h*     Upgrade to 11.1.6-h32 or 11.1.15 or later.\n                                        11.1.0 through 11.1.4-h*     Upgrade to 11.1.4-h33 or 11.1.15 or later.\nPAN-OS 10.2                                                          No action needed.\nPrisma Access                                                        No action needed. \nAll older unsupported PAN-OS versions                                Upgrade to a supported fixed version.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version</th><th>Minor Version</th><th>Suggested Solution</th></tr></thead><tbody><tr><td> Cloud NGFW</td><td>&nbsp;</td><td>No action needed.</td></tr><tr><td>PAN-OS 12.1</td><td>12.1.5 through 12.1.6</td><td>Upgrade to 12.1.7 or later.</td></tr><tr><td><br></td><td>12.1.2 through 12.1.4-h*</td><td>Upgrade to 12.1.4-h5 or 12.1.7 or later.</td></tr><tr><td>PAN-OS 11.2</td><td>11.2.11 or later</td><td>Upgrade to 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.8 through 11.2.10-h*</td><td>Upgrade to 11.2.10-h6 or 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.5 through 11.2.7-h*</td><td>Upgrade to 11.2.7-h13 or 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.0 through 11.2.4-h*</td><td>Upgrade to 11.2.4-h17 or 11.2.12 or later.</td></tr><tr><td>PAN-OS 11.1</td><td>11.1.14 or later</td><td>Upgrade to 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.11 through 11.1.13-h*</td><td>Upgrade to 11.1.13-h5 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.8 through 11.1.10-h*</td><td>Upgrade to 11.1.10-h25 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.7 through 11.1.7-h*</td><td>Upgrade to 11.1.7-h6 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.5 through 11.1.6-h*</td><td>Upgrade to 11.1.6-h32 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.0 through 11.1.4-h*</td><td>Upgrade to 11.1.4-h33 or 11.1.15 or later.</td></tr><tr><td>PAN-OS 10.2</td><td><br></td><td>No action needed.</td></tr><tr><td>Prisma Access&nbsp;</td><td><br></td><td>No action needed.&nbsp;</td></tr><tr><td> All older unsupported PAN-OS versions</td><td>&nbsp;</td><td> Upgrade to a supported fixed version.</td></tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Palo Alto Networks is not aware of any malicious exploitation of this issue.</p>"}]}],"timeline":[{"time":"2026-05-13T16:00:00.000Z","lang":"en","value":"Initial publication."}],"credits":[{"lang":"en","value":"our internal security research teams","type":"other"}],"source":{"discovery":"INTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 12.1.6","PAN-OS 12.1.5","PAN-OS 12.1.4-h3","PAN-OS 12.1.4-h2","PAN-OS 12.1.4","PAN-OS 12.1.3-h3","PAN-OS 12.1.3-h1","PAN-OS 12.1.3","PAN-OS 12.1.2","PAN-OS 11.2.11","PAN-OS 11.2.10-h5","PAN-OS 11.2.10-h4","PAN-OS 11.2.10-h3","PAN-OS 11.2.10-h2","PAN-OS 11.2.10-h1","PAN-OS 11.2.10","PAN-OS 11.2.9","PAN-OS 11.2.8","PAN-OS 11.2.7-h12","PAN-OS 11.2.7-h11","PAN-OS 11.2.7-h10","PAN-OS 11.2.7-h8","PAN-OS 11.2.7-h7","PAN-OS 11.2.7-h4","PAN-OS 11.2.7-h3","PAN-OS 11.2.7-h2","PAN-OS 11.2.7-h1","PAN-OS 11.2.7","PAN-OS 11.2.6","PAN-OS 11.2.5","PAN-OS 11.2.4-h15","PAN-OS 11.2.4-h14","PAN-OS 11.2.4-h12","PAN-OS 11.2.4-h11","PAN-OS 11.2.4-h10","PAN-OS 11.2.4-h9","PAN-OS 11.2.4-h8","PAN-OS 11.2.4-h7","PAN-OS 11.2.4-h6","PAN-OS 11.2.4-h5","PAN-OS 11.2.4-h4","PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.14","PAN-OS 11.1.13-h3","PAN-OS 11.1.13-h2","PAN-OS 11.1.13-h1","PAN-OS 11.1.13","PAN-OS 11.1.12","PAN-OS 11.1.11","PAN-OS 11.1.10-h21","PAN-OS 11.1.10-h12","PAN-OS 11.1.10-h10","PAN-OS 11.1.10-h9","PAN-OS 11.1.10-h7","PAN-OS 11.1.10-h5","PAN-OS 11.1.10-h4","PAN-OS 11.1.10-h1","PAN-OS 11.1.10","PAN-OS 11.1.9","PAN-OS 11.1.8","PAN-OS 11.1.6-h29","PAN-OS 11.1.6-h25","PAN-OS 11.1.6-h23","PAN-OS 11.1.6-h22","PAN-OS 11.1.6-h21","PAN-OS 11.1.6-h20","PAN-OS 11.1.6-h19","PAN-OS 11.1.6-h18","PAN-OS 11.1.6-h17","PAN-OS 11.1.6-h14","PAN-OS 11.1.6-h10","PAN-OS 11.1.6-h7","PAN-OS 11.1.6-h6","PAN-OS 11.1.6-h4","PAN-OS 11.1.6-h3","PAN-OS 11.1.6-h2","PAN-OS 11.1.6-h1","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h32","PAN-OS 11.1.4-h27","PAN-OS 11.1.4-h25","PAN-OS 11.1.4-h18","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2026-0264","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remote Code Execution","datePublic":"2026-05-13T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-122","description":"CWE-122 Heap-based Buffer Overflow","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-100","descriptions":[{"lang":"en","value":"CAPEC-100 Overflow Buffers"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","platforms":["AWS","Azure"],"versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:palo_alto_networks:pan-os:12.1.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h29:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.17:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.15:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h31:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h30:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h26:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h24:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"12.1.0","changes":[{"at":"12.1.4-h5","status":"unaffected"},{"at":"12.1.7","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","changes":[{"at":"11.2.4-h17","status":"unaffected"},{"at":"11.2.7-h13","status":"unaffected"},{"at":"11.2.10-h6","status":"unaffected"},{"at":"11.2.12","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","changes":[{"at":"11.1.4-h33","status":"unaffected"},{"at":"11.1.6-h32","status":"unaffected"},{"at":"11.1.7-h6","status":"unaffected"},{"at":"11.1.10-h25","status":"unaffected"},{"at":"11.1.13-h5","status":"unaffected"},{"at":"11.1.15","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","changes":[{"at":"10.2.7-h34","status":"unaffected"},{"at":"10.2.10-h36","status":"unaffected"},{"at":"10.2.13-h21","status":"unaffected"},{"at":"10.2.16-h7","status":"unaffected"},{"at":"10.2.18-h6","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.4","versionEndExcluding":"12.1.4-h5"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.4","versionEndExcluding":"11.2.4-h17"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.7","versionEndExcluding":"11.2.7-h13"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.10","versionEndExcluding":"11.2.10-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.0","versionEndExcluding":"11.2.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.4","versionEndExcluding":"11.1.4-h33"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.6","versionEndExcluding":"11.1.6-h32"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.7","versionEndExcluding":"11.1.7-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.10","versionEndExcluding":"11.1.10-h25"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.13","versionEndExcluding":"11.1.13-h5"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.0","versionEndExcluding":"11.1.15"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.7","versionEndExcluding":"10.2.7-h34"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h36"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.13","versionEndExcluding":"10.2.13-h21"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.16","versionEndExcluding":"10.2.16-h7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.18","versionEndExcluding":"10.2.18-h6"}]}]}],"descriptions":[{"lang":"en","value":"A buffer overflow vulnerability in the DNS proxy and DNS Server features of Palo Alto Networks PAN-OS® Software allows an unauthenticated attacker with network access to cause a denial of service (DoS) condition (all PAN-OS platforms except Cloud NGFW and Prisma Access) or potentially execute arbitrary code by sending specially crafted network traffic (PA-Series hardware only).\n\n\nPanorama, Cloud NGFW, and Prisma® Access are not impacted by this vulnerability.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>A buffer overflow vulnerability in the DNS proxy and DNS Server features of Palo Alto Networks PAN-OS® Software allows an unauthenticated attacker with network access to cause a denial of service (DoS) condition (all PAN-OS platforms except Cloud NGFW and Prisma Access) or potentially execute arbitrary code by sending specially crafted network traffic (PA-Series hardware only).<br></p><p>Panorama, Cloud NGFW, and Prisma<span>®</span> Access are not impacted by this vulnerability.</p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2026-0264","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"The risk is highest for PA-Series hardware firewalls as there is a potential risk of arbitrary code execution"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"LOW","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"HIGH","providerUrgency":"RED","exploitMaturity":"UNREPORTED","baseSeverity":"CRITICAL","baseScore":9.2,"threatSeverity":"HIGH","threatScore":7.2,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:U/AU:Y/R:U/V:C/RE:H/U:Red"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"The risk is lower for VM-Series firewalls, as the impact is limited to a Denial of Service condition"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"AUTOMATIC","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"MEDIUM","threatScore":6.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:Y/R:A/V:D/RE:M/U:Amber"}}],"configurations":[{"lang":"eng","value":"This issue is applicable only to PAN-OS firewalls if either of the following conditions are true:\n\n 1. DNS Proxy is enabled (Network > DNS Proxy) AND a network interface is attached to DNS Proxy. \n    OR\n    \n 2. The DNS server (Device > Setup > Services) configured on NGFW is a compromised public untrusted IP address.\n    \n    \n\nThe risk is higher if the interface is externally exposed to an untrusted network. Further documentation on configuring DNS Proxy can be found here (https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFcCAK).","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>This issue is applicable only to PAN-OS firewalls if either of the following conditions are true:</p><ol><li>DNS Proxy is enabled (<b>Network &gt; DNS Proxy</b>)&nbsp;<b>AND </b>a network interface is attached to DNS Proxy.&nbsp;<br><b>OR</b><br></li><li>The DNS server (<b>Device</b>&nbsp;&gt;<b> Setup </b>&gt; <b>Services</b>) configured on NGFW is a compromised public untrusted IP address.<br><br></li></ol><p>The risk is higher if the interface is externally exposed to an untrusted network.&nbsp;Further documentation on <a target=\"_blank\" rel=\"nofollow\" href=\"https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFcCAK\">configuring DNS Proxy can be found here</a>.</p>"}]}],"workarounds":[{"lang":"eng","value":"Customers can mitigate the risk of this issue by taking either of the following actions:\n\nAction 1: \n\n * Disassociate DNS Proxy from externally accessible interfaces in order to reduce your attack surface; AND\n * Configure DNS server with a RFC1918 or a public trusted IP address.\n   \n\nOR Action 2:\n\n * Disable the DNS Proxy feature (Network > DNS Proxy) if it is not being used; AND\n * Configure DNS server with a RFC1918 or a public trusted IP address.\n\nCustomers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510027 from Applications and Threats content version 9100-10044 and later.\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"Customers can mitigate the risk of this issue by taking either of the following actions:<br><br>Action 1:&nbsp;<br><ul><li>Disassociate DNS Proxy from externally accessible interfaces in order to reduce your attack surface;&nbsp;<b>AND</b></li><li>Configure DNS server with a RFC1918 or a public trusted IP address.<br></li></ul><b>OR&nbsp;</b>Action 2:<br><ul><li>Disable the DNS Proxy feature (<b>Network</b>&nbsp;&gt; <b>DNS</b>&nbsp;<b>Proxy</b>) if it is not being used;&nbsp;<b>AND</b></li><li>Configure DNS server with a RFC1918 or a public trusted IP address.</li></ul><p>Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510027&nbsp;from&nbsp;Applications and Threats content version 9100-10044 and later.</p><p></p>"}]}],"solutions":[{"lang":"eng","value":"VERSION                                 MINOR VERSION                SUGGESTED SOLUTION\nCloud NGFW                                                           No action needed\nPAN-OS 12.1                             12.1.5 through 12.1.6        Upgrade to 12.1.7 or later.\n                                        12.1.2 through 12.1.4-h*     Upgrade to 12.1.4-h5 or 12.1.7 or later.\nPAN-OS 11.2                             11.2.11 or later             Upgrade to 11.2.12 or later.\n                                        11.2.8 through 11.2.10-h*    Upgrade to 11.2.10-h6 or 11.2.12 or later.\n                                        11.2.5 through 11.2.7-h*     Upgrade to 11.2.7-h13 or 11.2.12 or later.\n                                        11.2.0 through 11.2.4-h*     Upgrade to 11.2.4-h17 or 11.2.12 or later.\nPAN-OS 11.1                             11.1.14 or later             Upgrade to 11.1.15 or later.\n                                        11.1.11 through 11.1.13-h*   Upgrade to 11.1.13-h5 or 11.1.15 or later.\n                                        11.1.8 through 11.1.10-h*    Upgrade to 11.1.10-h25 or 11.1.15 or later.\n                                        11.1.7 through 11.1.7-h*     Upgrade to 11.1.7-h6 or 11.1.15 or later.\n                                        11.1.5 through 11.1.6-h*     Upgrade to 11.1.6-h32 or 11.1.15 or later.\n                                        11.1.0 through 11.1.4-h*     Upgrade to 11.1.4-h33 or 11.1.15 or later.\nPAN-OS 10.2                             10.2.17 through 10.2.18-h*   Upgrade to 10.2.18-h6 or later.\n                                        10.2.14 through 10.2.16-h*   Upgrade to 10.2.16-h7 or 10.2.18-h6 or later.\n                                        10.2.11 through 10.2.13-h*   Upgrade to 10.2.13-h21 or 10.2.18-h6 or later.\n                                        10.2.8 through 10.2.10-h*    Upgrade to 10.2.10-h36 or 10.2.18-h6 or later.\n                                        10.2.0 through 10.2.7-h*     Upgrade to 10.2.7-h34 or 10.2.18-h6 or later.\nPrisma Access                                                        No action needed. \nAll older unsupported PAN-OS versions                                Upgrade to a supported fixed version.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version</th><th>Minor Version</th><th>Suggested Solution</th></tr></thead><tbody><tr><td> Cloud NGFW</td><td>&nbsp;</td><td>No action needed</td></tr><tr><td>PAN-OS 12.1</td><td>12.1.5 through 12.1.6</td><td>Upgrade to 12.1.7 or later.</td></tr><tr><td><br></td><td>12.1.2 through 12.1.4-h*</td><td>Upgrade to 12.1.4-h5 or 12.1.7 or later.</td></tr><tr><td>PAN-OS 11.2</td><td>11.2.11 or later</td><td>Upgrade to 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.8 through 11.2.10-h*</td><td>Upgrade to 11.2.10-h6 or 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.5 through 11.2.7-h*</td><td>Upgrade to 11.2.7-h13 or 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.0 through 11.2.4-h*</td><td>Upgrade to 11.2.4-h17 or 11.2.12 or later.</td></tr><tr><td>PAN-OS 11.1</td><td>11.1.14 or later</td><td>Upgrade to 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.11 through 11.1.13-h*</td><td>Upgrade to 11.1.13-h5 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.8 through 11.1.10-h*</td><td>Upgrade to 11.1.10-h25 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.7 through 11.1.7-h*</td><td>Upgrade to 11.1.7-h6 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.5 through 11.1.6-h*</td><td>Upgrade to 11.1.6-h32 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.0 through 11.1.4-h*</td><td>Upgrade to 11.1.4-h33 or 11.1.15 or later.</td></tr><tr><td>PAN-OS 10.2</td><td>10.2.17 through 10.2.18-h*</td><td>Upgrade to 10.2.18-h6 or later.</td></tr><tr><td>&nbsp;</td><td>10.2.14 through 10.2.16-h*</td><td>Upgrade to 10.2.16-h7 or 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.11 through 10.2.13-h*</td><td>Upgrade to 10.2.13-h21 or 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.8 through 10.2.10-h*</td><td>Upgrade to 10.2.10-h36 or 10.2.18-h6 or later.</td></tr><tr><td>&nbsp;</td><td>10.2.0 through 10.2.7-h*</td><td>Upgrade to 10.2.7-h34 or 10.2.18-h6 or later.</td></tr><tr><td>Prisma Access&nbsp;</td><td><br></td><td>No action needed.&nbsp;</td></tr><tr><td> All older unsupported PAN-OS versions</td><td>&nbsp;</td><td> Upgrade to a supported fixed version.</td></tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Palo Alto Networks is not aware of any malicious exploitation of this issue.</p>"}]}],"timeline":[{"time":"2026-05-13T16:00:00.000Z","lang":"en","value":"Initial Publication."},{"time":"2026-05-14T19:00:00.000Z","lang":"en","value":"Updated the Fix release timeline for 10.2.16-h7."}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks an external reporter and our internal security research teams for discovering and reporting this issue.","type":"other"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 12.1.6","PAN-OS 12.1.5","PAN-OS 12.1.4-h3","PAN-OS 12.1.4-h2","PAN-OS 12.1.4","PAN-OS 12.1.3-h3","PAN-OS 12.1.3-h1","PAN-OS 12.1.3","PAN-OS 12.1.2","PAN-OS 11.2.11","PAN-OS 11.2.10-h4","PAN-OS 11.2.10-h3","PAN-OS 11.2.10-h2","PAN-OS 11.2.10-h1","PAN-OS 11.2.10","PAN-OS 11.2.9","PAN-OS 11.2.8","PAN-OS 11.2.7-h11","PAN-OS 11.2.7-h10","PAN-OS 11.2.7-h8","PAN-OS 11.2.7-h7","PAN-OS 11.2.7-h4","PAN-OS 11.2.7-h3","PAN-OS 11.2.7-h2","PAN-OS 11.2.7-h1","PAN-OS 11.2.7","PAN-OS 11.2.6","PAN-OS 11.2.5","PAN-OS 11.2.4-h15","PAN-OS 11.2.4-h14","PAN-OS 11.2.4-h12","PAN-OS 11.2.4-h11","PAN-OS 11.2.4-h10","PAN-OS 11.2.4-h9","PAN-OS 11.2.4-h8","PAN-OS 11.2.4-h7","PAN-OS 11.2.4-h6","PAN-OS 11.2.4-h5","PAN-OS 11.2.4-h4","PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.13-h3","PAN-OS 11.1.13-h2","PAN-OS 11.1.13-h1","PAN-OS 11.1.13","PAN-OS 11.1.12","PAN-OS 11.1.11","PAN-OS 11.1.10-h21","PAN-OS 11.1.10-h12","PAN-OS 11.1.10-h10","PAN-OS 11.1.10-h9","PAN-OS 11.1.10-h7","PAN-OS 11.1.10-h5","PAN-OS 11.1.10-h4","PAN-OS 11.1.10-h1","PAN-OS 11.1.10","PAN-OS 11.1.9","PAN-OS 11.1.8","PAN-OS 11.1.6-h29","PAN-OS 11.1.6-h25","PAN-OS 11.1.6-h23","PAN-OS 11.1.6-h22","PAN-OS 11.1.6-h21","PAN-OS 11.1.6-h20","PAN-OS 11.1.6-h19","PAN-OS 11.1.6-h18","PAN-OS 11.1.6-h17","PAN-OS 11.1.6-h14","PAN-OS 11.1.6-h10","PAN-OS 11.1.6-h7","PAN-OS 11.1.6-h6","PAN-OS 11.1.6-h4","PAN-OS 11.1.6-h3","PAN-OS 11.1.6-h2","PAN-OS 11.1.6-h1","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h27","PAN-OS 11.1.4-h25","PAN-OS 11.1.4-h18","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.18-h1","PAN-OS 10.2.18","PAN-OS 10.2.17","PAN-OS 10.2.16-h6","PAN-OS 10.2.16-h4","PAN-OS 10.2.16-h1","PAN-OS 10.2.16","PAN-OS 10.2.15","PAN-OS 10.2.14-h1","PAN-OS 10.2.14","PAN-OS 10.2.13-h18","PAN-OS 10.2.13-h16","PAN-OS 10.2.13-h15","PAN-OS 10.2.13-h10","PAN-OS 10.2.13-h7","PAN-OS 10.2.13-h5","PAN-OS 10.2.13-h4","PAN-OS 10.2.13-h3","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h6","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h13","PAN-OS 10.2.11-h12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h31","PAN-OS 10.2.10-h30","PAN-OS 10.2.10-h27","PAN-OS 10.2.10-h26","PAN-OS 10.2.10-h23","PAN-OS 10.2.10-h21","PAN-OS 10.2.10-h18","PAN-OS 10.2.10-h17","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h21","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h32","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2026-0265","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled","datePublic":"2026-05-13T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-347","description":"CWE-347 Improper Verification of Cryptographic Signature","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-115","descriptions":[{"lang":"en","value":"CAPEC-115 Authentication Bypass"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:palo_alto_networks:pan-os:12.1.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h29:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.17:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.15:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h31:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h30:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h26:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h24:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"12.1.0","changes":[{"at":"12.1.4-h5","status":"unaffected"},{"at":"12.1.7","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","changes":[{"at":"11.2.4-h17","status":"unaffected"},{"at":"11.2.7-h13","status":"unaffected"},{"at":"11.2.10-h6","status":"unaffected"},{"at":"11.2.12","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","changes":[{"at":"11.1.4-h33","status":"unaffected"},{"at":"11.1.6-h32","status":"unaffected"},{"at":"11.1.7-h6","status":"unaffected"},{"at":"11.1.10-h25","status":"unaffected"},{"at":"11.1.13-h5","status":"unaffected"},{"at":"11.1.15","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","changes":[{"at":"10.2.7-h34","status":"unaffected"},{"at":"10.2.10-h36","status":"unaffected"},{"at":"10.2.13-h21","status":"unaffected"},{"at":"10.2.16-h7","status":"unaffected"},{"at":"10.2.18-h6","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.4","versionEndExcluding":"12.1.4-h5"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.4","versionEndExcluding":"11.2.4-h17"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.4","versionEndExcluding":"11.1.4-h33"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.4","versionEndExcluding":"10.2.4-h44"}]}]}],"descriptions":[{"lang":"en","value":"An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software enables an unauthenticated attacker with network access to bypass authentication controls when Cloud Authentication Service (CAS) is enabled.\n\nThe risk is higher if CAS is enabled on the management interface and lower when any other login interfaces are used.\n\nThe risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431).\n\nThis issue is applicable to PAN-OS software on PA-Series and VM-Series firewalls and on Panorama (virtual and M-Series).\n\nCloud NGFW and Prisma Access® are not impacted by this vulnerability.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software enables an unauthenticated attacker with network access to bypass authentication controls when Cloud Authentication Service (CAS) is enabled.</p><p>The risk is higher if CAS is enabled on the management interface and lower when any other login interfaces are used.<br><br>The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">best practice deployment guidelines</a>.<br><br>This issue is applicable to PAN-OS software on PA-Series and VM-Series firewalls and on Panorama (virtual and M-Series).<br><br>Cloud NGFW and Prisma Access<b><span>®</span></b> are not impacted by this vulnerability.</p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2026-0265","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"The risk is highest when you allow access to the management interface from external IP addresses on the internet."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"RED","exploitMaturity":"UNREPORTED","baseSeverity":"CRITICAL","baseScore":9.2,"threatSeverity":"HIGH","threatScore":7.2,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Red"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"If you configure restricted access to a jump box that is the only system allowed to access the management interface, you greatly reduce the risk of exploitation because attacks would require privileged access using only those IP addresses."}],"cvssV4_0":{"version":"4.0","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":7.5,"threatSeverity":"MEDIUM","threatScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"If authentication profile with CAS is enabled on any other login based interface, the risk is lower."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","subIntegrityImpact":"HIGH","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":7,"threatSeverity":"LOW","threatScore":2.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber"}}],"configurations":[{"lang":"eng","value":"Customers are impacted if the following conditions are true:\n\n 1. Authentication Profile with CAS is enabled and\n 2. Authentication profile is attached to a login interface.\n\nTo verify if you have CAS enabled, see our documentation on authentication profile in management interface (https://docs.paloaltonetworks.com/ngfw/help/10-2/device/device-authentication-profile/configure-an-authentication-profile). \n\nTo verify if the CAS authentication profile is attached to your configurations in the PAN-OS management interface:\n\n 1. Navigate to Device > Setup > Management > Authentication Settings > Authentication Profile.\n 2. Navigate to Device > User Identification > Authentication Portal Settings.\n 3. Navigate to Network > Gateways > GlobalProtect Gateway Configuration.\n 4. Navigate to Network > Portals > GlobalProtect Portal Configuration.\n\nTo verify if the CAS authentication profile is attached to your configurations in the SCM profile:\n\n 1. Navigate to Configuration > NGFW and Prisma Access in the SCM profile. Go to Identity Services > Authentication > Authentication Profile.  \n 2. Navigate to Device > Device Setup > Authentication and Accounting Settings > Authentication profile, and confirm the attached profile is set to CAS as auth method.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Customers are impacted if the following conditions are true:</p><ol><li>Authentication Profile with CAS is enabled <b>and</b></li><li>Authentication profile is attached to a login interface.</li></ol><p>To verify if you have CAS enabled, see our documentation on <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/ngfw/help/10-2/device/device-authentication-profile/configure-an-authentication-profile\">authentication profile in management interface</a>.&nbsp;</p><p>To verify if the CAS authentication profile is attached to your configurations in the PAN-OS management interface:</p><ol><li>Navigate to <b>Device</b>&nbsp;&gt; <b>Setup</b>&nbsp;&gt; <b>Management</b>&nbsp;&gt; <b>Authentication Settings</b>&nbsp;&gt; <b>Authentication Profile</b>.</li><li>Navigate to <b>Device &gt; User Identification &gt; Authentication Portal Settings</b>.</li><li>Navigate to <b>Network &gt; Gateways &gt; GlobalProtect Gateway Configuration</b>.</li><li>Navigate to <b>Network &gt; Portals &gt; GlobalProtect Portal Configuration</b>.</li></ol><div><p>To verify if the CAS authentication profile is attached to your configurations in the SCM profile:</p><ol><li>Navigate to&nbsp;<b>Configuration &gt; NGFW and Prisma Access</b> in the SCM profile. Go to&nbsp;<b>Identity Services &gt; Authentication &gt; Authentication Profile</b>.&nbsp;&nbsp;</li><li>Navigate to <b>Device &gt; Device Setup &gt; Authentication and Accounting Settings &gt; Authentication profile</b>,  and confirm the attached profile is set to CAS as auth method.</li></ol></div>"}]}],"workarounds":[{"lang":"eng","value":"The vast majority of firewalls already follow Palo Alto Networks' and industry best practices. However, if you haven’t already, we strongly recommend that you secure access to your management interface according to our best practice deployment guidelines. Specifically, you should restrict access to the management interface to only trusted internal IP addresses to prevent external access from the internet.\n\nReview information about how to secure management access to your Palo Alto Networks firewalls:\n\n * Palo Alto Networks LIVEcommunity article: https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\n * Palo Alto Networks official and more detailed technical documentation: https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices \n\nTo temporarily mitigate this issue, customers can disable the Cloud Authentication Service (CAS) by changing the associated authentication profile to SAML, RADIUS, or other supported authentication methods.\n\nCustomers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510008 from Applications and Threats content version 9100-10044 and later. Threat ID 510008 depends on features present in PAN-OS 11.2 and above.\n\nTo ensure the Threat ID provides effective protection against this vulnerability, follow these steps:\n\n * Route incoming traffic for the MGT port through a DP port (https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#id59206398-3dab-4b2f-9b4b-7ea500d036ba), e.g., enabling management profile on a DP interface for management access. \n * Ensure that vulnerability protection security profile is applied to your GlobalProtect interface (https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/ta-p/340184). \n * Replace the default certificate for Inbound Traffic Management (https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#id112f7714-8995-4496-bbf9-781e63dec71c). \n * Decrypt inbound traffic to the management interface so the firewall can inspect it (https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#idbbd82587-17a2-42b4-9245-d3714e1e13a2). \n * Enable Threat Prevention on the inbound traffic to management services.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>The vast majority of firewalls already follow Palo Alto Networks' and industry best practices. However, if you haven’t already, we strongly recommend that you secure access to your management interface according to our best practice deployment guidelines. Specifically, you should restrict access to the management interface to only trusted internal IP addresses to prevent external access from the internet.<br><br>Review information about how to secure management access to your Palo Alto Networks firewalls:</p><ul><li>Palo Alto Networks LIVEcommunity article: <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431</a></li><li>Palo Alto Networks official and more detailed technical documentation: <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\">https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices</a>&nbsp;</li></ul><p>To temporarily mitigate this issue, customers can disable the Cloud Authentication Service (CAS) by changing the associated authentication profile to SAML, RADIUS, or other supported authentication methods.</p><p>Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510008 from Applications and Threats content version 9100-10044 and later. Threat ID 510008 depends on features present in PAN-OS 11.2 and above.</p><span>To ensure the Threat ID provides effective protection against this vulnerability, follow these steps</span>:<br><ul><li><a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#id59206398-3dab-4b2f-9b4b-7ea500d036ba\">Route incoming traffic for the MGT port through a DP port</a>, e.g., enabling management profile on a DP interface for management access.&nbsp;</li><li>Ensure that&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/ta-p/340184\">vulnerability protection security profile is applied to your GlobalProtect interface</a>.&nbsp;</li><li><a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#id112f7714-8995-4496-bbf9-781e63dec71c\">Replace the default certificate for Inbound Traffic Management</a>.&nbsp;</li><li><a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#idbbd82587-17a2-42b4-9245-d3714e1e13a2\">Decrypt inbound traffic to the management interface so the firewall can inspect it</a>.&nbsp;</li><li>Enable Threat Prevention on the inbound traffic to management services.</li></ul>"}]}],"solutions":[{"lang":"eng","value":"VERSION           MINOR VERSION RANGE          SUGGESTED SOLUTION\nCloud NGFW                                     No action needed.\nPAN-OS 12.1       12.1.5 through 12.1.6        Upgrade to 12.1.7 or later.\n                  12.1.2 through 12.1.4-h*     Upgrade to 12.1.4-h5 or 12.1.7 or later.\nPAN-OS 11.2       11.2.11 or later             Upgrade to 11.2.12 or later.\n                  11.2.8 through 11.2.10-h*    Upgrade to 11.2.10-h6 or 11.2.12 or later.\n                  11.2.5 through 11.2.7-h*     Upgrade to 11.2.7-h13 or 11.2.12 or later.\n                  11.2.0 through 11.2.4-h*     Upgrade to 11.2.4-h17 or 11.2.12 or later.\nPAN-OS 11.1       11.1.14 or later             Upgrade to 11.1.15 or later.\n                  11.1.11 through 11.1.13-h*   Upgrade to 11.1.13-h5 or 11.1.15 or later.\n                  11.1.8 through 11.1.10-h*    Upgrade to 11.1.10-h25 or 11.1.15 or later.\n                  11.1.7 through 11.1.7-h*     Upgrade to 11.1.7-h6 or 11.1.15 or later.\n                  11.1.5 through 11.1.6-h*     Upgrade to 11.1.6-h32 or 11.1.15 or later.\n                  11.1.0 through 11.1.4-h*     Upgrade to 11.1.4-h33 or 11.1.15 or later.\nPAN-OS 10.2       10.2.17 through 10.2.18-h*   Upgrade to 10.2.18-h6 or later.\n                  10.2.14 through 10.2.16-h*   Upgrade to 10.2.16-h7 or 10.2.18-h6 or later.\n                  10.2.11 through 10.2.13-h*   Upgrade to 10.2.13-h21 or 10.2.18-h6 or later.\n                  10.2.8 through 10.2.10-h*    Upgrade to 10.2.10-h36 or 10.2.18-h6 or later.\n                  10.2.0 through 10.2.7-h*     Upgrade to 10.2.7-h34 or 10.2.18-h6 or later.\nAll older                                      Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\nPrisma Access                                  No action needed.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version</th><th>Minor Version Range</th><th>Suggested Solution</th></tr></thead><tbody><tr><td>Cloud NGFW</td><td><br></td><td>No action needed.</td></tr><tr><td>PAN-OS 12.1</td><td>12.1.5 through 12.1.6</td><td>Upgrade to 12.1.7 or later.</td></tr><tr><td><br></td><td>12.1.2 through 12.1.4-h*</td><td>Upgrade to 12.1.4-h5 or 12.1.7 or later.</td></tr><tr><td>PAN-OS 11.2</td><td>11.2.11 or later</td><td>Upgrade to 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.8 through 11.2.10-h*</td><td>Upgrade to 11.2.10-h6 or 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.5 through 11.2.7-h*</td><td>Upgrade to 11.2.7-h13 or 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.0 through 11.2.4-h*</td><td>Upgrade to 11.2.4-h17 or 11.2.12 or later.</td></tr><tr><td>PAN-OS 11.1</td><td>11.1.14 or later</td><td>Upgrade to 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.11 through 11.1.13-h*</td><td>Upgrade to 11.1.13-h5 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.8 through 11.1.10-h*</td><td>Upgrade to 11.1.10-h25 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.7 through 11.1.7-h*</td><td>Upgrade to 11.1.7-h6 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.5 through 11.1.6-h*</td><td>Upgrade to 11.1.6-h32 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.0 through 11.1.4-h*</td><td>Upgrade to 11.1.4-h33 or 11.1.15 or later.</td></tr><tr><td>PAN-OS 10.2</td><td>10.2.17 through 10.2.18-h*</td><td>Upgrade to 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.14 through 10.2.16-h*</td><td>Upgrade to 10.2.16-h7 or 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.11 through 10.2.13-h*</td><td>Upgrade to 10.2.13-h21 or 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.8 through 10.2.10-h*</td><td>Upgrade to 10.2.10-h36 or 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.0 through 10.2.7-h*</td><td>Upgrade to 10.2.7-h34 or 10.2.18-h6 or later.</td></tr><tr><td>All older <br>unsupported <br>PAN-OS versions</td><td><br></td><td>Upgrade to a supported fixed version.</td></tr><tr><td>Prisma Access</td><td><br></td><td>No action needed.</td></tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Palo Alto Networks is not aware of any malicious exploitation of this issue.</p>"}]}],"timeline":[{"time":"2026-05-13T16:00:00.000Z","lang":"en","value":"Initial Publication."},{"time":"2026-05-12T19:00:00.000Z","lang":"en","value":"Updated the Fix release timeline for 10.2.16-h7."}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Harsh Jaiswal from Hacktron AI and our internal security research teams for discovering and reporting this issue.","type":"other"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 12.1.6","PAN-OS 12.1.5","PAN-OS 12.1.4-h3","PAN-OS 12.1.4-h2","PAN-OS 12.1.4","PAN-OS 12.1.3-h3","PAN-OS 12.1.3-h1","PAN-OS 12.1.3","PAN-OS 12.1.2","PAN-OS 11.2.11","PAN-OS 11.2.10-h5","PAN-OS 11.2.10-h4","PAN-OS 11.2.10-h3","PAN-OS 11.2.10-h2","PAN-OS 11.2.10-h1","PAN-OS 11.2.10","PAN-OS 11.2.9","PAN-OS 11.2.8","PAN-OS 11.2.7-h12","PAN-OS 11.2.7-h11","PAN-OS 11.2.7-h10","PAN-OS 11.2.7-h8","PAN-OS 11.2.7-h7","PAN-OS 11.2.7-h4","PAN-OS 11.2.7-h3","PAN-OS 11.2.7-h2","PAN-OS 11.2.7-h1","PAN-OS 11.2.7","PAN-OS 11.2.6","PAN-OS 11.2.5","PAN-OS 11.2.4-h15","PAN-OS 11.2.4-h14","PAN-OS 11.2.4-h12","PAN-OS 11.2.4-h11","PAN-OS 11.2.4-h10","PAN-OS 11.2.4-h9","PAN-OS 11.2.4-h8","PAN-OS 11.2.4-h7","PAN-OS 11.2.4-h6","PAN-OS 11.2.4-h5","PAN-OS 11.2.4-h4","PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.14","PAN-OS 11.1.13-h3","PAN-OS 11.1.13-h2","PAN-OS 11.1.13-h1","PAN-OS 11.1.13","PAN-OS 11.1.12","PAN-OS 11.1.11","PAN-OS 11.1.10-h21","PAN-OS 11.1.10-h12","PAN-OS 11.1.10-h10","PAN-OS 11.1.10-h9","PAN-OS 11.1.10-h7","PAN-OS 11.1.10-h5","PAN-OS 11.1.10-h4","PAN-OS 11.1.10-h1","PAN-OS 11.1.10","PAN-OS 11.1.9","PAN-OS 11.1.8","PAN-OS 11.1.6-h29","PAN-OS 11.1.6-h25","PAN-OS 11.1.6-h23","PAN-OS 11.1.6-h22","PAN-OS 11.1.6-h21","PAN-OS 11.1.6-h20","PAN-OS 11.1.6-h19","PAN-OS 11.1.6-h18","PAN-OS 11.1.6-h17","PAN-OS 11.1.6-h14","PAN-OS 11.1.6-h10","PAN-OS 11.1.6-h7","PAN-OS 11.1.6-h6","PAN-OS 11.1.6-h4","PAN-OS 11.1.6-h3","PAN-OS 11.1.6-h2","PAN-OS 11.1.6-h1","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h32","PAN-OS 11.1.4-h27","PAN-OS 11.1.4-h25","PAN-OS 11.1.4-h18","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.18-h5","PAN-OS 10.2.18-h1","PAN-OS 10.2.18","PAN-OS 10.2.17","PAN-OS 10.2.16-h6","PAN-OS 10.2.16-h4","PAN-OS 10.2.16-h1","PAN-OS 10.2.16","PAN-OS 10.2.15","PAN-OS 10.2.14-h1","PAN-OS 10.2.14","PAN-OS 10.2.13-h18","PAN-OS 10.2.13-h16","PAN-OS 10.2.13-h15","PAN-OS 10.2.13-h10","PAN-OS 10.2.13-h7","PAN-OS 10.2.13-h5","PAN-OS 10.2.13-h4","PAN-OS 10.2.13-h3","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h6","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h13","PAN-OS 10.2.11-h12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h31","PAN-OS 10.2.10-h30","PAN-OS 10.2.10-h27","PAN-OS 10.2.10-h26","PAN-OS 10.2.10-h23","PAN-OS 10.2.10-h21","PAN-OS 10.2.10-h18","PAN-OS 10.2.10-h17","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h21","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h32","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2026-0300","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID™ Authentication Portal","datePublic":"2026-05-05T23:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-787","description":"CWE-787: Out-of-bounds Write","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-100","descriptions":[{"lang":"en","value":"CAPEC-100 Overflow Buffers"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:palo_alto_networks:pan-os:12.1.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h29:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.17:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.15:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h31:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h30:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h26:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h24:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"12.1.0","lessThan":"12.1.7","changes":[{"at":"12.1.7","status":"unaffected"},{"at":"12.1.4-h5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.12","changes":[{"at":"11.2.12","status":"unaffected"},{"at":"11.2.10-h6","status":"unaffected"},{"at":"11.2.7-h13","status":"unaffected"},{"at":"11.2.4-h17","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.15","changes":[{"at":"11.1.15","status":"unaffected"},{"at":"11.1.13-h5","status":"unaffected"},{"at":"11.1.10-h25","status":"unaffected"},{"at":"11.1.7-h6","status":"unaffected"},{"at":"11.1.6-h32","status":"unaffected"},{"at":"11.1.4-h33","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.18-h6","changes":[{"at":"10.2.18-h6","status":"unaffected"},{"at":"10.2.16-h7","status":"unaffected"},{"at":"10.2.13-h21","status":"unaffected"},{"at":"10.2.10-h36","status":"unaffected"},{"at":"10.2.7-h34","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.4","versionEndExcluding":"12.1.4-h5"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.4","versionEndExcluding":"11.2.4-h17"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.7","versionEndExcluding":"11.2.7-h13"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.10","versionEndExcluding":"11.2.10-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.0","versionEndExcluding":"11.2.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.4","versionEndExcluding":"11.1.4-h33"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.6","versionEndExcluding":"11.1.6-h32"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.7","versionEndExcluding":"11.1.7-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.10","versionEndExcluding":"11.1.10-h25"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.13","versionEndExcluding":"11.1.13-h5"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.0","versionEndExcluding":"11.1.15"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.7","versionEndExcluding":"10.2.7-h34"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h36"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.13","versionEndExcluding":"10.2.13-h21"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.16","versionEndExcluding":"10.2.16-h7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.18","versionEndExcluding":"10.2.18-h6"}]}]}],"descriptions":[{"lang":"en","value":"A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets.\n\nThe risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal per the best practice guidelines (https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CqbiCAC) by restricting access to only trusted internal IP addresses.\n\nPrisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. <br><br>The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal per the <a target=\"_blank\" rel=\"nofollow\" href=\"https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CqbiCAC\">best practice guidelines</a> by restricting access to only trusted internal IP addresses.<br><br>Prisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability. </p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2026-0300","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"The risk is highest when you configure the User-ID™ Authentication Portal to enable access from the Internet or any untrusted network."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"LOW","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"RED","exploitMaturity":"ATTACKED","baseSeverity":"CRITICAL","baseScore":9.3,"threatSeverity":"CRITICAL","threatScore":9.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:A/AU:Y/R:U/V:C/RE:M/U:Red"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"You can greatly reduce the risk of exploitation by restricting User-ID™ Authentication Portal access to only trusted internal IP addresses and preventing its exposure to the internet."}],"cvssV4_0":{"version":"4.0","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"LOW","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"RED","exploitMaturity":"ATTACKED","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"HIGH","threatScore":8.7,"vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:A/AU:Y/R:U/V:C/RE:M/U:Red"}}],"configurations":[{"lang":"eng","value":"This issue is applicable only to PA-Series and VM-Series firewalls that are configured to use User-ID™ Authentication Portal.\n\nCustomers are impacted if both of the following conditions are true:\n\n\n * User-ID™ Authentication Portal configured in the User-ID™ Authentication Portal Settings page. You can verify the configuration by going to Device > User Identification > Authentication Portal Settings -> Enable Authentication Portal (applies to both transparent and redirect modes) and\n * An interface management profile with response page enabled and attached to any L3 interface in any zone where untrusted/internet traffic can ingress. You can verify the configuration by going to Network > Interface > Select the interface > Advanced Tab > Create Management Interface Profile.\n   \n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>This issue is applicable only to PA-Series and VM-Series firewalls that are configured to use User-ID™ Authentication Portal.<br><br>Customers are impacted if both of the following conditions are true:<br></p><ul><li>User-ID™ Authentication Portal configured in the User-ID™ Authentication Portal Settings page.  You can verify the configuration by going to Device &gt; User Identification &gt; Authentication Portal Settings -&gt; Enable Authentication Portal (applies to both transparent and redirect modes) <b>and</b></li><li>An interface management profile with response page enabled and attached to any L3 interface in any zone where untrusted/internet traffic can ingress.  You can verify the configuration by going to Network &gt; Interface &gt; Select the interface &gt; Advanced Tab &gt; Create Management Interface Profile.<br></li></ul><p></p>"}]}],"workarounds":[{"lang":"eng","value":"Customers can mitigate the risk of this issue by taking either of the following actions:\n\n * Restrict User-ID™ Authentication Portal access to only trusted zones and in addition, disable Response Pages in the Interface Management Profile attached to every L3 interface in any zone where untrusted/internet traffic can ingress. Keep Response Pages enabled only on interfaces in trust/internal zones where legitimate users' browsers ingress. Refer to Step 6 of the following Live Community article (https://live.paloaltonetworks.com/t5/general-articles/why-it-s-essential-to-secure-your-management-interface/ta-p/1001286) and Knowledgebase article (https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CqbiCAC) for steps to restrict access.\n   \n * Disable User-ID™ Authentication Portal if not required.\n   \n\nCustomers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510019 from Applications and Threats content version 9097-10022. Decoder capabilities necessitate PAN-OS 11.1 or a later version for Threat ID support.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"Customers can mitigate the risk of this issue by taking either of the following actions:<br><ul><li>Restrict User-ID™ Authentication Portal access to only trusted zones and in addition, disable Response Pages in the Interface Management Profile attached to every L3 interface in any zone where untrusted/internet traffic can ingress. Keep Response Pages enabled only on interfaces in trust/internal zones where legitimate users' browsers ingress. Refer to Step 6 of the following <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/general-articles/why-it-s-essential-to-secure-your-management-interface/ta-p/1001286\">Live Community article</a> and <a target=\"_blank\" rel=\"nofollow\" href=\"https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CqbiCAC\">Knowledgebase article</a> for steps to restrict access.<br></li><li>Disable User-ID™ Authentication Portal if not required.<br></li></ul>Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID&nbsp;510019 from Applications and Threats content version 9097-10022. Decoder capabilities necessitate PAN-OS 11.1 or a later version for Threat ID support."}]}],"solutions":[{"lang":"eng","value":"VERSION           MINOR VERSION                SUGGESTED SOLUTION\nCloud NGFW                                     No action needed.\nPAN-OS 12.1       12.1.5 through 12.1.6        Upgrade to 12.1.7 or later.\n                  12.1.2 through 12.1.4-h*     Upgrade to 12.1.4-h5 or 12.1.7 or later.\nPAN-OS 11.2       11.2.11 or later             Upgrade to 11.2.12 or later.\n                  11.2.8 through 11.2.10-h*    Upgrade to 11.2.10-h6 or 11.2.12 or later.\n                  11.2.5 through 11.2.7-h*     Upgrade to 11.2.7-h13 or 11.2.12 or later.\n                  11.2.0 through 11.2.4-h*     Upgrade to 11.2.4-h17 or 11.2.12 or later.\nPAN-OS 11.1       11.1.14 or later             Upgrade to 11.1.15 or later.\n                  11.1.11 through 11.1.13-h*   Upgrade to 11.1.13-h5 or 11.1.15 or later.\n                  11.1.8 through 11.1.10-h*    Upgrade to 11.1.10-h25 or 11.1.15 or later.\n                  11.1.7 through 11.1.7-h*     Upgrade to 11.1.7-h6 or 11.1.15 or later.\n                  11.1.5 through 11.1.6-h*     Upgrade to 11.1.6-h32 or 11.1.15 or later.\n                  11.1.0 through 11.1.4-h*     Upgrade to 11.1.4-h33 or 11.1.15 or later.\nPAN-OS 10.2       10.2.17 through 10.2.18-h*   Upgrade to 10.2.18-h6 or later.\n                  10.2.14 through 10.2.16-h*   Upgrade to 10.2.16-h7 or 10.2.18-h6 or later.\n                  10.2.11 through 10.2.13-h*   Upgrade to 10.2.13-h21 or 10.2.18-h6 or later.\n                  10.2.8 through 10.2.10-h*    Upgrade to 10.2.10-h36 or 10.2.18-h6 or later.\n                  10.2.0 through 10.2.7-h*     Upgrade to 10.2.7-h34 or 10.2.18-h6 or later.\nAll older                                      Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\nPrisma Access                                  No action needed.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version</th><th>Minor Version</th><th>Suggested Solution</th></tr></thead><tbody><tr><td>Cloud NGFW</td><td><br></td><td>No action needed.</td></tr><tr><td>PAN-OS 12.1</td><td>12.1.5 through 12.1.6</td><td>Upgrade to 12.1.7 or later.</td></tr><tr><td><br></td><td>12.1.2 through 12.1.4-h*</td><td>Upgrade to 12.1.4-h5 or 12.1.7 or later.</td></tr><tr><td>PAN-OS 11.2</td><td>11.2.11 or later</td><td>Upgrade to 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.8 through 11.2.10-h*</td><td>Upgrade to 11.2.10-h6 or 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.5 through 11.2.7-h*</td><td>Upgrade to 11.2.7-h13 or 11.2.12 or later.</td></tr><tr><td><br></td><td>11.2.0 through 11.2.4-h*</td><td>Upgrade to 11.2.4-h17 or 11.2.12 or later.</td></tr><tr><td>PAN-OS 11.1</td><td>11.1.14 or later</td><td>Upgrade to 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.11 through 11.1.13-h*</td><td>Upgrade to 11.1.13-h5 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.8 through 11.1.10-h*</td><td>Upgrade to 11.1.10-h25 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.7 through 11.1.7-h*</td><td>Upgrade to 11.1.7-h6 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.5 through 11.1.6-h*</td><td>Upgrade to 11.1.6-h32 or 11.1.15 or later.</td></tr><tr><td><br></td><td>11.1.0 through 11.1.4-h*</td><td>Upgrade to 11.1.4-h33 or 11.1.15 or later.</td></tr><tr><td>PAN-OS 10.2</td><td>10.2.17 through 10.2.18-h*</td><td>Upgrade to 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.14 through 10.2.16-h*</td><td>Upgrade to 10.2.16-h7 or 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.11 through 10.2.13-h*</td><td>Upgrade to 10.2.13-h21 or 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.8 through 10.2.10-h*</td><td>Upgrade to 10.2.10-h36 or 10.2.18-h6 or later.</td></tr><tr><td><br></td><td>10.2.0 through 10.2.7-h*</td><td>Upgrade to 10.2.7-h34 or 10.2.18-h6 or later.</td></tr><tr><td>All older <br>unsupported <br>PAN-OS versions</td><td><br></td><td>Upgrade to a supported fixed version.</td></tr><tr><td>Prisma Access</td><td><br></td><td>No action needed.</td></tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Limited exploitation has been observed targeting Palo Alto Networks User-ID™ Authentication Portals that are exposed to untrusted IP addresses and/or the public internet. Customers following standard security best practices, such as restricting sensitive portals to trusted internal networks are at a greatly reduced risk.","supportingMedia":[{"type":"text/html","base64":false,"value":"Limited exploitation has been observed targeting Palo Alto Networks User-ID™ Authentication Portals that are exposed to untrusted IP addresses and/or the public internet. Customers following standard security best practices, such as restricting sensitive portals to trusted internal networks are at a greatly reduced risk."}]}],"timeline":[{"time":"2026-05-13T16:00:00.000Z","lang":"en","value":"Updated the release timeline and Solution table."},{"time":"2026-05-07T02:10:00.000Z","lang":"en","value":"Updated Acknowledgments."},{"time":"2026-05-06T17:27:00.000Z","lang":"en","value":"Updated with Threat Prevention ID and clarified the Required Configuration section."},{"time":"2026-05-05T23:00:00.000Z","lang":"en","value":"Initial publication."},{"time":"2026-05-14T19:15:00.000Z","lang":"en","value":"Updated the Fix release timeline for 10.2.16-h7."}],"credits":[{"lang":"en","value":"Palo Alto Networks is grateful to our Deep Product Security Research Team for discovering the issue, and we also appreciate the threat research and intelligence support provided by Unit 42 and Xpanse ILI.","type":"other"}],"source":{"discovery":"USER"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 12.1.6","PAN-OS 12.1.5","PAN-OS 12.1.4-h3","PAN-OS 12.1.4-h2","PAN-OS 12.1.4","PAN-OS 12.1.3-h3","PAN-OS 12.1.3-h1","PAN-OS 12.1.3","PAN-OS 12.1.2","PAN-OS 11.2.11","PAN-OS 11.2.10-h5","PAN-OS 11.2.10-h4","PAN-OS 11.2.10-h3","PAN-OS 11.2.10-h2","PAN-OS 11.2.10-h1","PAN-OS 11.2.10","PAN-OS 11.2.9","PAN-OS 11.2.8","PAN-OS 11.2.7-h12","PAN-OS 11.2.7-h11","PAN-OS 11.2.7-h10","PAN-OS 11.2.7-h8","PAN-OS 11.2.7-h7","PAN-OS 11.2.7-h4","PAN-OS 11.2.7-h3","PAN-OS 11.2.7-h2","PAN-OS 11.2.7-h1","PAN-OS 11.2.7","PAN-OS 11.2.6","PAN-OS 11.2.5","PAN-OS 11.2.4-h15","PAN-OS 11.2.4-h14","PAN-OS 11.2.4-h12","PAN-OS 11.2.4-h11","PAN-OS 11.2.4-h10","PAN-OS 11.2.4-h9","PAN-OS 11.2.4-h8","PAN-OS 11.2.4-h7","PAN-OS 11.2.4-h6","PAN-OS 11.2.4-h5","PAN-OS 11.2.4-h4","PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.14","PAN-OS 11.1.13-h3","PAN-OS 11.1.13-h2","PAN-OS 11.1.13-h1","PAN-OS 11.1.13","PAN-OS 11.1.12","PAN-OS 11.1.11","PAN-OS 11.1.10-h21","PAN-OS 11.1.10-h12","PAN-OS 11.1.10-h10","PAN-OS 11.1.10-h9","PAN-OS 11.1.10-h7","PAN-OS 11.1.10-h5","PAN-OS 11.1.10-h4","PAN-OS 11.1.10-h1","PAN-OS 11.1.10","PAN-OS 11.1.9","PAN-OS 11.1.8","PAN-OS 11.1.6-h29","PAN-OS 11.1.6-h25","PAN-OS 11.1.6-h23","PAN-OS 11.1.6-h22","PAN-OS 11.1.6-h21","PAN-OS 11.1.6-h20","PAN-OS 11.1.6-h19","PAN-OS 11.1.6-h18","PAN-OS 11.1.6-h17","PAN-OS 11.1.6-h14","PAN-OS 11.1.6-h10","PAN-OS 11.1.6-h7","PAN-OS 11.1.6-h6","PAN-OS 11.1.6-h4","PAN-OS 11.1.6-h3","PAN-OS 11.1.6-h2","PAN-OS 11.1.6-h1","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h32","PAN-OS 11.1.4-h27","PAN-OS 11.1.4-h25","PAN-OS 11.1.4-h18","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.18-h5","PAN-OS 10.2.18-h1","PAN-OS 10.2.18","PAN-OS 10.2.17","PAN-OS 10.2.16-h6","PAN-OS 10.2.16-h4","PAN-OS 10.2.16-h1","PAN-OS 10.2.16","PAN-OS 10.2.15","PAN-OS 10.2.14-h1","PAN-OS 10.2.14","PAN-OS 10.2.13-h18","PAN-OS 10.2.13-h16","PAN-OS 10.2.13-h15","PAN-OS 10.2.13-h10","PAN-OS 10.2.13-h7","PAN-OS 10.2.13-h5","PAN-OS 10.2.13-h4","PAN-OS 10.2.13-h3","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h6","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h13","PAN-OS 10.2.11-h12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h31","PAN-OS 10.2.10-h30","PAN-OS 10.2.10-h27","PAN-OS 10.2.10-h26","PAN-OS 10.2.10-h23","PAN-OS 10.2.10-h21","PAN-OS 10.2.10-h18","PAN-OS 10.2.10-h17","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h21","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h32","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2026-0227","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":" PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway and Portal","datePublic":"2026-01-14T17:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-754","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-210","descriptions":[{"lang":"en","value":"CAPEC-210 Abuse Existing Functionality"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:palo_alto_networks:pan-os:12.1.3:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.3:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:12.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.18:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.17:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.15:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h26:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h24:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h32:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h31:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h30:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h29:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h28:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h27:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h26:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h25:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h24:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"12.1.0","changes":[{"at":"12.1.4","status":"unaffected"},{"at":"12.1.3-h3","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","changes":[{"at":"11.2.10-h2","status":"unaffected"},{"at":"11.2.7-h8","status":"unaffected"},{"at":"11.2.4-h15","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","changes":[{"at":"11.1.13","status":"unaffected"},{"at":"11.1.10-h9","status":"unaffected"},{"at":"11.1.6-h23","status":"unaffected"},{"at":"11.1.4-h27","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","changes":[{"at":"10.2.18-h1","status":"unaffected"},{"at":"10.2.16-h6","status":"unaffected"},{"at":"10.2.13-h18","status":"unaffected"},{"at":"10.2.10-h31","status":"unaffected"},{"at":"10.2.7-h32","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.1.0","changes":[{"at":"10.1.14-h20","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"affected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"affected","version":"11.2","changes":[{"at":"11.2.7-h8","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2","changes":[{"at":"10.2.10-h29","status":"unaffected"},{"at":"10.2.4-h43","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.0","versionEndExcluding":"12.1.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"12.1.3","versionEndExcluding":"12.1.3-h3"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.10","versionEndExcluding":"11.2.10-h2"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.7","versionEndExcluding":"11.2.7-h8"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.4","versionEndExcluding":"11.2.4-h15"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.0","versionEndExcluding":"11.1.13"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.10","versionEndExcluding":"11.1.10-h9"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.6","versionEndExcluding":"11.1.6-h23"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.4","versionEndExcluding":"11.1.4-h27"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.18","versionEndExcluding":"10.2.18-h1"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.16","versionEndExcluding":"10.2.16-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.13","versionEndExcluding":"10.2.13-h18"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h31"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.7","versionEndExcluding":"10.2.7-h32"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.1.14","versionEndExcluding":"10.1.14-h20"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:prisma_access:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.7","versionEndExcluding":"11.2.7-h8"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:prisma_access:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h29"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:prisma_access:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.4","versionEndExcluding":"10.2.4-h43"}]}]}],"descriptions":[{"lang":"en","value":"A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode.","supportingMedia":[{"type":"text/html","base64":false,"value":"A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode."}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2026-0227","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"POC","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"HIGH","threatScore":7.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/AU:Y/R:U/V:D/RE:M/U:Amber"}}],"configurations":[{"lang":"eng","value":"This issue is applicable only to PAN-OS NGFW or Prisma Access configurations with an enabled GlobalProtect gateway or portal.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is applicable only to PAN-OS NGFW or Prisma Access configurations with an enabled GlobalProtect gateway or portal."}]}],"workarounds":[{"lang":"eng","value":"No known workarounds exist for this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"No known workarounds exist for this issue."}]}],"solutions":[{"lang":"eng","value":"VERSION              MINOR VERSION             SUGGESTED SOLUTION\nCloud NGFW All                                 No action needed.\nPAN-OS 12.1          12.1.2 through 12.1.3     Upgrade to 12.1.4 or later.\nPAN-OS 11.2          11.2.8 through 11.2.10    Upgrade to 11.2.10-h2 or later.\n                     11.2.5 through 11.2.7     Upgrade to 11.2.7-h8 or 11.2.10-h2 or later.\n                     11.2.0 through 11.2.4     Upgrade to 11.2.4-h15 or 11.2.10-h2 or later.\nPAN-OS 11.1          11.1.11 through 11.1.12   Upgrade to 11.1.13 or later.\n                     11.1.7 through 11.1.10    Upgrade to 11.1.10-h9 or 11.1.13 later.\n                     11.1.5 through 11.1.6     Upgrade to 11.1.6-h23 or 11.1.13 or later.\n                     11.1.0 through 11.1.4     Upgrade to 11.1.4-h27 or 11.1.13 or later.\nPAN-OS 10.2          10.2.17 through 10.2.18   Upgrade to 10.2.18-h1 or later.\n                     10.2.14 through 10.2.16   Upgrade to 10.2.16-h6 or 10.2.18-h1 or later.\n                     10.2.11 through 10.2.13   Upgrade to 10.2.13-h18 or 10.2.18-h1 or later.\n                     10.2.8 through 10.2.10    Upgrade to 10.2.10-h31 or 10.2.18-h1 or later.\n                     10.2.0 through 10.2.7     Upgrade to 10.2.7-h32 or 10.2.18-h1 or later.\n PAN-OS 10.1          10.1.0 through 10.1.14   Upgrade to 10.1.14-h20 or later. \nAll older                                      Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\nPrisma Access 11.2   11.2.0 through 11.2.7     Upgrade to 11.2.7-h8 or later.*\nPrisma Access 10.2   10.2.0 through 10.2.10    Upgrade to 10.2.10-h29 or later.*\n\n\n* See the note under Product Status for information regarding Prisma Access upgrades.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>Cloud NGFW All<br></td><td></td><td>No action needed.</td></tr><tr><td>PAN-OS 12.1<br></td><td>12.1.2 through 12.1.3</td><td>Upgrade to 12.1.4 or later.</td></tr><tr><td>PAN-OS 11.2<br></td><td>11.2.8 through 11.2.10</td><td>Upgrade to 11.2.10-h2 or later.</td></tr><tr><td></td><td>11.2.5 through 11.2.7</td><td>Upgrade to 11.2.7-h8 or 11.2.10-h2 or later.</td></tr><tr><td></td><td>11.2.0 through 11.2.4</td><td>Upgrade to 11.2.4-h15 or 11.2.10-h2 or later.</td></tr><tr><td>PAN-OS 11.1<br></td><td>11.1.11 through 11.1.12</td><td>Upgrade to 11.1.13 or later.</td></tr><tr><td></td><td>11.1.7 through 11.1.10</td><td>Upgrade to 11.1.10-h9 or 11.1.13 later.</td></tr><tr><td></td><td>11.1.5 through 11.1.6</td><td>Upgrade to 11.1.6-h23 or 11.1.13 or later.</td></tr><tr><td></td><td>11.1.0 through 11.1.4</td><td>Upgrade to 11.1.4-h27 or 11.1.13 or later.</td></tr><tr><td>PAN-OS 10.2<br></td><td>10.2.17 through 10.2.18</td><td>Upgrade to 10.2.18-h1 or later.</td></tr><tr><td></td><td>10.2.14 through 10.2.16</td><td>Upgrade to 10.2.16-h6 or 10.2.18-h1 or later.</td></tr><tr><td></td><td>10.2.11 through 10.2.13</td><td>Upgrade to 10.2.13-h18 or 10.2.18-h1 or later.</td></tr><tr><td></td><td>10.2.8 through 10.2.10</td><td>Upgrade to 10.2.10-h31 or 10.2.18-h1 or later.</td></tr><tr><td></td><td>10.2.0 through 10.2.7</td><td>Upgrade to 10.2.7-h32 or 10.2.18-h1 or later.</td></tr><tr><td>&nbsp;PAN-OS 10.1</td><td>&nbsp;10.1.0 through 10.1.14</td><td>Upgrade to 10.1.14-h20 or later.&nbsp;</td></tr><tr><td>All older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr><tr><td>Prisma Access 11.2<br></td><td>11.2.0 through 11.2.7</td><td>Upgrade to 11.2.7-h8 or later.*</td></tr><tr><td>Prisma Access 10.2<br></td><td>10.2.0 through 10.2.10</td><td>Upgrade to 10.2.10-h29 or later.*</td></tr></tbody></table><br>* See the note under Product Status for information regarding Prisma Access upgrades."}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<span>Palo Alto Networks is not aware of any malicious exploitation of this issue.</span>"}]}],"timeline":[{"time":"2026-01-16T18:15:00.000Z","lang":"en","value":"Added 10.2.4-h43 to Prisma Access Fix Versions."},{"time":"2026-01-14T18:15:00.000Z","lang":"en","value":"Changed recommended fix version from 11.2.4-h14 to 11.2.4-h15."},{"time":"2026-01-14T17:00:00.000Z","lang":"en","value":"Initial Publication"},{"time":"2026-01-30T23:30:00.000Z","lang":"en","value":"Fixed a broken link and updated the Solutions table. "},{"time":"2026-02-07T01:45:00.000Z","lang":"en","value":"Modified the comment about Prisma Access versions to reflect that all instances have been upgraded. "},{"time":"2026-02-09T17:30:00.000Z","lang":"en","value":"Updated recommended fix version for the 10.2.10 hotfix branch to 10.2.10-h31. "}],"credits":[{"lang":"en","value":"an external reporter","type":"finder"}],"source":{"discovery":"USER"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 12.1.3-h1","PAN-OS 12.1.3","PAN-OS 12.1.2","PAN-OS 11.2.10-h1","PAN-OS 11.2.10","PAN-OS 11.2.9","PAN-OS 11.2.8","PAN-OS 11.2.7-h7","PAN-OS 11.2.7-h4","PAN-OS 11.2.7-h3","PAN-OS 11.2.7-h2","PAN-OS 11.2.7-h1","PAN-OS 11.2.7","PAN-OS 11.2.6","PAN-OS 11.2.5","PAN-OS 11.2.4-h14","PAN-OS 11.2.4-h12","PAN-OS 11.2.4-h11","PAN-OS 11.2.4-h10","PAN-OS 11.2.4-h9","PAN-OS 11.2.4-h8","PAN-OS 11.2.4-h7","PAN-OS 11.2.4-h6","PAN-OS 11.2.4-h5","PAN-OS 11.2.4-h4","PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.12","PAN-OS 11.1.11","PAN-OS 11.1.10-h7","PAN-OS 11.1.10-h5","PAN-OS 11.1.10-h4","PAN-OS 11.1.10-h1","PAN-OS 11.1.10","PAN-OS 11.1.9","PAN-OS 11.1.8","PAN-OS 11.1.6-h22","PAN-OS 11.1.6-h21","PAN-OS 11.1.6-h20","PAN-OS 11.1.6-h19","PAN-OS 11.1.6-h18","PAN-OS 11.1.6-h17","PAN-OS 11.1.6-h14","PAN-OS 11.1.6-h10","PAN-OS 11.1.6-h7","PAN-OS 11.1.6-h6","PAN-OS 11.1.6-h4","PAN-OS 11.1.6-h3","PAN-OS 11.1.6-h2","PAN-OS 11.1.6-h1","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h25","PAN-OS 11.1.4-h18","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.18","PAN-OS 10.2.17","PAN-OS 10.2.16-h4","PAN-OS 10.2.16-h1","PAN-OS 10.2.16","PAN-OS 10.2.15","PAN-OS 10.2.14-h1","PAN-OS 10.2.14","PAN-OS 10.2.13-h16","PAN-OS 10.2.13-h15","PAN-OS 10.2.13-h10","PAN-OS 10.2.13-h7","PAN-OS 10.2.13-h5","PAN-OS 10.2.13-h4","PAN-OS 10.2.13-h3","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h6","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h13","PAN-OS 10.2.11-h12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h27","PAN-OS 10.2.10-h26","PAN-OS 10.2.10-h23","PAN-OS 10.2.10-h21","PAN-OS 10.2.10-h18","PAN-OS 10.2.10-h17","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h21","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h19","PAN-OS 10.1.14-h16","PAN-OS 10.1.14-h15","PAN-OS 10.1.14-h14","PAN-OS 10.1.14-h13","PAN-OS 10.1.14-h11","PAN-OS 10.1.14-h10","PAN-OS 10.1.14-h9","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-4619","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Packets","datePublic":"2025-11-12T17:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-754","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-129","descriptions":[{"lang":"en","value":"CAPEC-129: Pointer Manipulation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:-:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:-:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*"],"versions":[{"status":"unaffected","version":"12.1.0","versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.5","changes":[{"at":"11.2.5","status":"unaffected"},{"at":"11.2.4-h4","status":"unaffected"},{"at":"11.2.3-h6","status":"unaffected"},{"at":"11.2.2-h2","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.7","changes":[{"at":"11.1.7","status":"unaffected"},{"at":"11.1.6-h1","status":"unaffected"},{"at":"11.1.4-h13","status":"unaffected"},{"at":"11.1.4-h4","status":"affected"},{"at":"11.1.3-h2","status":"affected"},{"at":"11.1.2-h18","status":"unaffected"},{"at":"11.1.2-h9","status":"affected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.14","changes":[{"at":"10.2.14","status":"unaffected"},{"at":"10.2.13-h3","status":"unaffected"},{"at":"10.2.12-h6","status":"unaffected"},{"at":"10.2.11-h12","status":"unaffected"},{"at":"10.2.10-h14","status":"unaffected"},{"at":"10.2.10-h2","status":"affected"},{"at":"10.2.9-h21","status":"unaffected"},{"at":"10.2.9-h6","status":"affected"},{"at":"10.2.8-h21","status":"unaffected"},{"at":"10.2.8-h10","status":"affected"},{"at":"10.2.7-h24","status":"unaffected"},{"at":"10.2.7-h11","status":"affected"},{"at":"10.2.4-h25","status":"affected"}],"versionType":"custom"},{"status":"unaffected","version":"10.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","platforms":["PAN-OS"],"versions":[{"status":"affected","version":"10.2.0","lessThan":"10.2.10-h14","changes":[{"at":"11.2.4-h4","status":"unaffected"},{"at":"10.2.10-h14","status":"unaffected"},{"at":"10.2.4-h25","status":"affected"}],"versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.0","versionEndExcluding":"11.2.5"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.4","versionEndExcluding":"11.2.4-h4"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.3","versionEndExcluding":"11.2.3-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.2","versionEndExcluding":"11.2.2-h2"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.0","versionEndExcluding":"11.1.7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.6","versionEndExcluding":"11.1.6-h1"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.4","versionEndExcluding":"11.1.4-h13"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.4","versionEndExcluding":"11.1.4-h4"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.3","versionEndExcluding":"11.1.3-h2"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.2","versionEndExcluding":"11.1.2-h18"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.2","versionEndExcluding":"11.1.2-h9"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.0","versionEndExcluding":"10.2.14"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.13","versionEndExcluding":"10.2.13-h3"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.12","versionEndExcluding":"10.2.12-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.11","versionEndExcluding":"10.2.11-h12"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h14"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h2"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.9","versionEndExcluding":"10.2.9-h21"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.9","versionEndExcluding":"10.2.9-h6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.8","versionEndExcluding":"10.2.8-h21"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.8","versionEndExcluding":"10.2.8-h10"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.7","versionEndExcluding":"10.2.7-h24"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.7","versionEndExcluding":"10.2.7-h11"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:prisma_access:*:*:*:*:*:PAN-OS:*:*","versionStartIncluding":"11.2.4","versionEndExcluding":"11.2.4-h4"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:prisma_access:*:*:*:*:*:PAN-OS:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h14"}]}]}],"descriptions":[{"lang":"en","value":"A denial-of-service (DoS) vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to reboot a firewall by sending a specially crafted packet through the dataplane. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode.\n\nThis issue is applicable to the PAN-OS software versions listed below on PA-Series firewalls, VM-Series firewalls, and Prisma® Access software. This issue does not affect Cloud NGFW.\n\nWe have successfully completed the Prisma Access upgrade for all customers, with the exception of those facing issues such as conflicting maintenance windows. Remaining customers will be promptly scheduled for an upgrade through our standard upgrade process.","supportingMedia":[{"type":"text/html","base64":false,"value":"A denial-of-service (DoS) vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to reboot a firewall by sending a specially crafted packet through the dataplane. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode.<br><br>This issue is applicable to the PAN-OS software versions listed below on PA-Series firewalls, VM-Series firewalls, and Prisma® Access software. This issue does not affect Cloud NGFW.<br><br>​​We have successfully completed the Prisma Access upgrade for all customers, with the exception of those facing issues such as conflicting maintenance windows.  Remaining customers will be promptly scheduled for an upgrade through our standard upgrade process."}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-4619","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"MEDIUM","threatScore":6.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:Y/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"eng","value":"This issue is only applicable to firewalls where URL proxy or any decrypt-policy is configured.\n\nWhen any decrypt policy is configured, this issue may be encountered regardless of whether traffic matches explicit decrypt, explicit no-decrypt, or none of the decryption policies.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is only applicable to firewalls where URL&nbsp;proxy or any decrypt-policy is configured.<br><br>When any decrypt policy is configured, this issue may be encountered regardless of whether traffic matches explicit decrypt, explicit no-decrypt, or none of the decryption policies."}]}],"workarounds":[{"lang":"eng","value":"No known workarounds exist for this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"No known workarounds exist for this issue."}]}],"solutions":[{"lang":"eng","value":"VERSION                     MINOR VERSION            SUGGESTED SOLUTION\nCloud NGFW                                           No action needed.\nPAN-OS 12.1                                          No action needed.\nPAN-OS 11.2                 11.2.0 through 11.2.4    Upgrade to 11.2.4-h4 or 11.2.5 or later.\n                            11.2.0 through 11.2.3    Upgrade to 11.2.3-h6 or 11.2.5 or later.\n                            11.2.0 through 11.2.2    Upgrade to 11.2.2-h2 or 11.2.5 or later.\nPAN-OS 11.1                 11.1.0 through 11.1.6    Upgrade to 11.1.6-h1 or 11.1.7 or later.\n                            11.1.0 through 11.1.4    Upgrade to 11.1.4-h13 or 11.1.7 or later.\n                            11.1.0 through 11.1.3    Remain on a version older than 11.1.3-h2 or upgrade to\n                                                     11.1.4-h13 or 11.1.7 or later.\n                            11.1.0 through 11.1.2    Upgrade to 11.1.2-h18 or 11.1.7 or later.\nPAN-OS 10.2                 10.2.0 through 10.2.13   Upgrade to 10.2.13-h3 or 10.2.14 or later.\n                            10.2.0 through 10.2.12   Upgrade to 10.2.12-h6 or 10.2.14 or later.\n                            10.2.0 through 10.2.11   Upgrade to 10.2.11-h12 or 10.2.14 or later.\n                            10.2.0 through 10.2.10   Upgrade to 10.2.10-h14 or 10.2.14 or later.\n                            10.2.0 through 10.2.9    Upgrade to 10.2.9-h21 or 10.2.14 or later.\n                            10.2.0 through 10.2.8    Upgrade to 10.2.8-h21 or 10.2.14 or later.\n                            10.2.0 through 10.2.7    Upgrade to 10.2.7-h24 or 10.2.14 or later.\n                            10.2.0 through 10.2.4    Remain on a version older than 10.2.4-h25\nPAN-OS 10.1                                          No action needed.\nAll older                                            Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\n Prisma Access  on PAN-OS   11.2.0 through 11.2.4    Upgrade to 11.2.4-h4 or later\n                            10.2.0 through 10.2.10   Upgrade to 10.2.10-h14 or 11.2.4-h4 or later.\n                            10.2.0 through 10.2.4    Remain on a version older than 10.2.4-h25.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>Cloud NGFW<br></td><td></td><td>No action needed.</td></tr><tr><td>PAN-OS 12.1<br></td><td></td><td>No action needed.</td></tr><tr>\n                                <td>PAN-OS 11.2<br></td>\n                                <td>11.2.0 through 11.2.4</td>\n                                <td>Upgrade to 11.2.4-h4 or 11.2.5 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.2.0 through 11.2.3</td>\n                                <td>Upgrade to 11.2.3-h6 or 11.2.5 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.2.0 through 11.2.2</td>\n                                <td>Upgrade to 11.2.2-h2 or 11.2.5 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 11.1<br></td>\n                                <td>11.1.0 through 11.1.6</td>\n                                <td>Upgrade to 11.1.6-h1 or 11.1.7 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.0 through 11.1.4</td>\n                                <td>Upgrade to 11.1.4-h13 or 11.1.7 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.0 through 11.1.3</td>\n                                <td>Remain on a version older than 11.1.3-h2 or upgrade to 11.1.4-h13 or 11.1.7 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.0 through 11.1.2</td>\n                                <td>Upgrade to 11.1.2-h18 or 11.1.7 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 10.2<br></td>\n                                <td>10.2.0 through 10.2.13</td>\n                                <td>Upgrade to 10.2.13-h3 or 10.2.14 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.0 through 10.2.12</td>\n                                <td>Upgrade to 10.2.12-h6 or 10.2.14 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.0 through 10.2.11</td>\n                                <td>Upgrade to 10.2.11-h12 or 10.2.14 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.0 through 10.2.10</td>\n                                <td>Upgrade to 10.2.10-h14 or 10.2.14 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.0 through 10.2.9</td>\n                                <td>Upgrade to 10.2.9-h21 or 10.2.14 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.0 through 10.2.8</td>\n                                <td>Upgrade to 10.2.8-h21 or 10.2.14 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.0 through 10.2.7</td>\n                                <td>Upgrade to 10.2.7-h24 or 10.2.14 or later.</td>\n                            </tr><tr>\n                                <td></td>\n                                <td>10.2.0 through 10.2.4</td>\n                                <td>Remain on a version older than 10.2.4-h25<br></td>\n                            </tr><tr><td>PAN-OS 10.1<br></td><td></td><td>No action needed.</td></tr><tr><td>All older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr><tr><td>&nbsp;Prisma Access&nbsp; on PAN-OS</td><td>11.2.0 through 11.2.4</td><td>Upgrade to 11.2.4-h4&nbsp;or later</td></tr><tr>\n                                    <td><br></td>\n                                    <td>10.2.0 through 10.2.10</td>\n                                    <td>Upgrade to 10.2.10-h14 or 11.2.4-h4 or later.</td>\n                                </tr><tr>\n                                    <td></td>\n                                    <td>10.2.0 through 10.2.4</td>\n                                    <td>Remain on a version older than 10.2.4-h25.</td>\n                                </tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-11-12T17:00:00.000Z","lang":"en","value":"Initial publication"}],"source":{"defect":["PAN-247099"],"discovery":"USER"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h1","PAN-OS 11.2.2","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-4615","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Improper Neutralization of Input in the Management Web Interface","datePublic":"2025-10-08T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-83","description":"CWE-83 Improper Neutralization of Script in Attributes in a Web Page","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-165","descriptions":[{"lang":"en","value":"CAPEC-165 File Manipulation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"status":"unaffected","version":"12.1.0","versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.8","changes":[{"at":"11.2.8","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","changes":[{"at":"11.1.10-h7","status":"unaffected"},{"at":"11.1.6-h21","status":"unaffected"},{"at":"11.1.4-h27","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.17","changes":[{"at":"10.2.17","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.0","versionEndExcluding":"11.2.8"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.10","versionEndExcluding":"11.1.10-h7"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.6","versionEndExcluding":"11.1.6-h21"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.4","versionEndExcluding":"11.1.4-h27"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.0","versionEndExcluding":"10.2.17"}]}]}],"descriptions":[{"lang":"en","value":"An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and execute arbitrary commands.\n\nThe security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators.\n\nCloud NGFW and Prisma® Access are not affected by this vulnerability.\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and execute arbitrary commands.</span></p><p><span>The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators.</span></p><p><span>Cloud NGFW and Prisma® Access are not affected by this vulnerability.</span></p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVEN-2025-4615","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"You can greatly reduce the risk of exploitation by restricting access to a jump box that is the only system allowed to access the management interface. This will ensure that attacks can succeed only if they obtain privileged access through those specified IP addresses. We recommend remediating this vulnerability in your next scheduled maintenance cycle."}],"cvssV4_0":{"version":"4.0","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"POC","baseSeverity":"MEDIUM","baseScore":6.9,"threatSeverity":"MEDIUM","threatScore":5.4,"vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/AU:N/R:U/V:D/RE:M/U:Amber"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"The risk is highest when you allow access to the management interface from external IP addresses on the internet. Our recommendation is to remediate as soon as possible."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"POC","baseSeverity":"HIGH","baseScore":7,"threatSeverity":"MEDIUM","threatScore":5.5,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/AU:N/R:U/V:D/RE:M/U:Amber"}}],"workarounds":[{"lang":"eng","value":"No known workarounds exist for this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"No known workarounds exist for this issue."}]}],"solutions":[{"lang":"eng","value":"VERSION             MINOR VERSION            SUGGESTED SOLUTION\nCloud NGFW All                               No action needed.\nPAN-OS 12.1                                  No action needed.\nPAN-OS 11.2         11.2.0 through 11.2.7    Upgrade to 11.2.8 or later.\nPAN-OS 11.1         11.1.0 through 11.1.4    Upgrade to 11.1.4-h27 or 11.1.6-h21 or 11.1.10-h7 or later.\n                    11.1.4 through 11.1.6    Upgrade to 11.1.6-h21 or 11.1.10-h7 or later.\n                    11.1.8 through 11.1.10   Upgrade to 11.1.10-h7 or later.\nPAN-OS 10.2         10.2.0 through 10.2.16   Upgrade to 10.2.17 or later.\nAll older                                    Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\nPrisma Access All                            No action needed.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>Cloud NGFW All<br></td><td></td><td>No action needed.</td></tr><tr><td>PAN-OS 12.1<br></td><td></td><td>No action needed.</td></tr><tr>\n                                <td>PAN-OS 11.2<br></td>\n                                <td>11.2.0 through 11.2.7</td>\n                                <td>Upgrade to 11.2.8 or later.</td>\n                            </tr><tr><td>PAN-OS 11.1</td><td>11.1.0 through 11.1.4</td><td>Upgrade to&nbsp;<span>11.1.4-h27 or 11.1.6-h21 or 11.1.10-h7 or later.</span></td></tr><tr>\n                                <td><br></td>\n                                <td>11.1.4 through 11.1.6</td>\n                                <td>Upgrade to 11.1.6-h21 or 11.1.10-h7 or later.<br></td>\n                            </tr><tr>\n                                <td></td>\n                                <td>11.1.8 through 11.1.10</td>\n                                <td>Upgrade to 11.1.10-h7 or later.<br></td>\n                            </tr><tr>\n                                <td>PAN-OS 10.2<br></td>\n                                <td>10.2.0 through 10.2.16</td>\n                                <td>Upgrade to 10.2.17 or later.</td>\n                            </tr><tr><td>All older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr><tr><td>Prisma Access All<br></td><td></td><td>No action needed.</td></tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-12-19T21:55:00.000Z","lang":"en","value":"Updated fix version for 11.1.0."},{"time":"2025-11-11T19:15:00.000Z","lang":"en","value":"Updated Fixed Software Versions"},{"time":"2025-10-08T16:00:00.000Z","lang":"en","value":"Initial Publication"},{"time":"2026-04-01T00:15:00.000Z","lang":"en","value":"Updated exploit maturity"}],"credits":[{"lang":"en","value":"Visa Inc.","type":"finder"}],"source":{"defect":["PAN-292159","PAN-271221"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.7-h10","PAN-OS 11.2.7-h8","PAN-OS 11.2.7-h7","PAN-OS 11.2.7-h4","PAN-OS 11.2.7-h3","PAN-OS 11.2.7-h2","PAN-OS 11.2.7-h1","PAN-OS 11.2.7","PAN-OS 11.2.6","PAN-OS 11.2.5","PAN-OS 11.2.4-h15","PAN-OS 11.2.4-h14","PAN-OS 11.2.4-h12","PAN-OS 11.2.4-h11","PAN-OS 11.2.4-h10","PAN-OS 11.2.4-h9","PAN-OS 11.2.4-h8","PAN-OS 11.2.4-h7","PAN-OS 11.2.4-h6","PAN-OS 11.2.4-h5","PAN-OS 11.2.4-h4","PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.10-h5","PAN-OS 11.1.10-h4","PAN-OS 11.1.10-h1","PAN-OS 11.1.10","PAN-OS 11.1.9","PAN-OS 11.1.8","PAN-OS 11.1.6-h20","PAN-OS 11.1.6-h19","PAN-OS 11.1.6-h18","PAN-OS 11.1.6-h17","PAN-OS 11.1.6-h14","PAN-OS 11.1.6-h10","PAN-OS 11.1.6-h7","PAN-OS 11.1.6-h6","PAN-OS 11.1.6-h4","PAN-OS 11.1.6-h3","PAN-OS 11.1.6-h2","PAN-OS 11.1.6-h1","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h25","PAN-OS 11.1.4-h18","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.16-h6","PAN-OS 10.2.16-h4","PAN-OS 10.2.16-h1","PAN-OS 10.2.16","PAN-OS 10.2.15","PAN-OS 10.2.14-h1","PAN-OS 10.2.14","PAN-OS 10.2.13-h18","PAN-OS 10.2.13-h16","PAN-OS 10.2.13-h15","PAN-OS 10.2.13-h10","PAN-OS 10.2.13-h7","PAN-OS 10.2.13-h5","PAN-OS 10.2.13-h4","PAN-OS 10.2.13-h3","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h6","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h13","PAN-OS 10.2.11-h12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h31","PAN-OS 10.2.10-h30","PAN-OS 10.2.10-h27","PAN-OS 10.2.10-h26","PAN-OS 10.2.10-h23","PAN-OS 10.2.10-h21","PAN-OS 10.2.10-h18","PAN-OS 10.2.10-h17","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h21","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h32","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-4231","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Authenticated Admin Command Injection Vulnerability in the Management Web Interface","datePublic":"2025-06-11T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-77","description":"CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-233","descriptions":[{"lang":"en","value":"CAPEC-233 Privilege Escalation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected","cpes":[]},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:palo_alto_networks:pan-os:11.0.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.0.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.0.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"unaffected","version":"11.2.0","versionType":"custom"},{"status":"unaffected","version":"11.1.0","versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.3","changes":[{"at":"11.0.3","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.8","changes":[{"at":"10.2.8","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected","cpes":[]}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"11.0.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*","versionStartIncluding":"10.2.0","versionEndExcluding":"10.2.8"}]}]}],"descriptions":[{"lang":"en","value":"A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user.\n\nThe attacker must have network access to the management web interface and successfully authenticate to exploit this issue.\n\nCloud NGFW and Prisma Access are not impacted by this vulnerability.","supportingMedia":[{"type":"text/html","base64":false,"value":"A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user.<br><br>The attacker must have network access to the management web interface and successfully authenticate to exploit this issue.<br><br>Cloud NGFW and Prisma Access are not impacted by this vulnerability."}]}],"references":[{"url":"https://","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"The risk is highest when you allow access to the management interface from external IP addresses on the internet."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.6,"threatSeverity":"MEDIUM","threatScore":6.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"You can greatly reduce the risk of exploitation by restricting access to a jump box that is the only system allowed to access the management interface. This will ensure that attacks can succeed only if they obtain privileged access through those specified IP addresses."}],"cvssV4_0":{"version":"4.0","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":7.1,"threatSeverity":"MEDIUM","threatScore":4,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"The risk is greatest if you allow access to the management web interface from the internet or from any untrusted network either:\n\n 1. Directly; or\n\n 2. Through a dataplane interface that includes a management interface profile.\n\nYou greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management web interface.\n\nUse the following steps to identify your recently detected devices in our internet scans.\n\n 1. To find any assets that require remediation, visit the Assets section of the Customer Support Portal:https://support.paloaltonetworks.com (https://support.paloaltonetworks.com/) and then select Products → Assets → All Assets → Remediation Required).\n\n 2. Review the list of your assets that we discovered in our scans to have an internet-facing management interface. We tagged these assets with ‘PAN-SA-2024-0015’ and a last seen timestamp (in UTC). If you do not see any such assets listed, then our scan did not find any devices associated with your account in the past three days that have an internet-facing management interface.\n    \n\nGlobalProtect™ portals and gateways are not vulnerable to this issue. However, if you configure a management profile on interfaces with GlobalProtect portals or gateways, then you are exposing the firewall to attacks through the management web interface (typically accessible on port 4443).\n\n\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>The risk is greatest if you allow access to the management web interface from the internet or from any untrusted network either:</p><ol><li><p>Directly; or</p></li><li><p>Through a dataplane interface that includes a management interface profile.</p></li></ol><p>You greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management web interface.</p><p>Use the following steps to identify your recently detected devices in our internet scans.</p><ol><li><p>To find any assets that require remediation, visit the Assets section of the Customer Support Portal:<a target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/\">https://support.paloaltonetworks.com</a>&nbsp;and then select Products → Assets → All Assets → Remediation Required).</p></li><li><p>Review the list of your assets that we discovered in our scans to have an internet-facing management interface. We tagged these assets with ‘PAN-SA-2024-0015’ and a last seen timestamp (in UTC). If you do not see any such assets listed, then our scan did not find any devices associated with your account in the past three days that have an internet-facing management interface.<br></p></li></ol><div><p>GlobalProtect™ portals and gateways are not vulnerable to this issue. However, if you configure a management profile on interfaces with GlobalProtect portals or gateways, then you are exposing the firewall to attacks through the management web interface (typically accessible on port 4443).</p></div><b><p></p></b><p></p>"}]}],"workarounds":[{"lang":"en","value":"Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our critical deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431). Specifically, you should restrict management interface access to only trusted internal IP addresses.\n\nReview more information about how to secure management access to your Palo Alto Networks firewalls in these documents:\n\n * Palo Alto Networks LIVEcommunity article: https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\n\n * Palo Alto Networks official and detailed technical documentation: https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><b>Recommended mitigation</b>—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">critical deployment guidelines</a>. Specifically, you should restrict management interface access to only trusted internal IP addresses.</p><p>Review more information about how to secure management access to your Palo Alto Networks firewalls in these documents:</p><ul><li><p>Palo Alto Networks LIVEcommunity article: <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431</a></p></li></ul><ul><li><p>Palo Alto Networks official and detailed technical documentation: <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\">https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices</a></p></li></ul>"}]}],"solutions":[{"lang":"en","value":"VERSION           MINOR VERSION           SUGGESTED SOLUTION\nPAN-OS 11.2                               No action needed.\nPAN-OS 11.1                               No action needed.\nPAN-OS 11.0*      11.0.0 through 11.0.2   Upgrade to 11.0.3 or later.\nPAN-OS 10.2       10.2.0 through 10.2.7   Upgrade to 10.2.8 or later.\nPAN-OS 10.1                               Upgrade to 10.2.8 or 11.0.3 or later.\nAll older                                 Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\n\n\n*PAN-OS 11.0 has reached EoL. We listed it here for completeness because a patch for PAN-OS 11.0 was released before it reached EoL. If you are still using any vulnerable EoL versions, we strongly recommend that you upgrade to a supported fixed PAN-OS version.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>PAN-OS 11.2<br></td><td></td><td>No action needed.</td></tr><tr><td>PAN-OS 11.1<br></td><td></td><td>No action needed.</td></tr><tr>\n                                <td>PAN-OS 11.0*<br></td>\n                                <td>11.0.0 through 11.0.2</td>\n                                <td>Upgrade to 11.0.3 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 10.2<br></td>\n                                <td>10.2.0 through 10.2.7</td>\n                                <td>Upgrade to 10.2.8 or later.</td>\n                            </tr><tr><td>PAN-OS 10.1</td><td></td><td>Upgrade to 10.2.8 or 11.0.3 or later.</td></tr><tr><td>All older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr></tbody></table><br><p>*PAN-OS 11.0 has reached EoL. We listed it here for completeness because a patch for PAN-OS 11.0 was released before it reached EoL. If you are still using any vulnerable EoL versions, we strongly recommend that you upgrade to a supported fixed PAN-OS version.</p>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-06-11T16:00:00.000Z","lang":"en","value":"Initial Publication"}],"credits":[{"lang":"en","value":"spcnvdr","type":"finder"}],"source":{"defect":["PAN-215223"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.0.2-h5","PAN-OS 11.0.2-h4","PAN-OS 11.0.2-h3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h5","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h4","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h14","PAN-OS 10.1.14-h13","PAN-OS 10.1.14-h11","PAN-OS 10.1.14-h10","PAN-OS 10.1.14-h9","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-4230","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Authenticated Admin Command Injection Vulnerability Through CLI","datePublic":"2025-06-11T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-248","descriptions":[{"lang":"en","value":"CAPEC-248 Command Injection"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h26:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h23:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h21:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h18:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h17:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h14:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h13:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h11:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h10:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h9:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h8:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h7:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h6:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h5:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h4:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h3:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h2:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h1:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:-:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:palo_alto_networks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"11.2.0","lessThan":"11.2.6","changes":[{"at":"11.2.6","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.6-h14","changes":[{"at":"11.1.10","status":"unaffected"},{"at":"11.1.6-h14","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.10-h27","changes":[{"at":"10.2.10-h27","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.1.0","lessThan":"10.1.14-h15","changes":[{"at":"10.1.14-h15","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.2.0","versionEndExcluding":"11.2.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.6","versionEndExcluding":"11.1.6-h14"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.0","versionEndExcluding":"11.1.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.2.10","versionEndExcluding":"10.2.10-h27"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.1.14","versionEndExcluding":"10.1.14-h15"}]}]}],"descriptions":[{"lang":"en","value":"A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI.\n\nThe security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators.\n\nCloud NGFW and Prisma® Access are not affected by this vulnerability.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI.</span></p><span>The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators. </span><b><span><br></span><span><br></span></b><span>Cloud NGFW and Prisma® Access are not affected by this vulnerability.</span>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-4230","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.4,"threatSeverity":"MEDIUM","threatScore":5.7,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/R:U/V:D/U:Amber"}}],"configurations":[{"lang":"en","value":"No special configuration is required to be affected by this issue.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<span>No special configuration is required to be affected by this issue.</span>"}]}],"workarounds":[{"lang":"en","value":"No workaround or mitigation is available.","supportingMedia":[{"type":"text/html","base64":false,"value":"No workaround or mitigation is available."}]}],"solutions":[{"lang":"eng","value":"VERSION             MINOR VERSION            SUGGESTED SOLUTION\nCloud NGFW All                               No action needed.\nPAN-OS 11.2         11.2.0 through 11.2.5    Upgrade to 11.2.6 or later.\nPAN-OS 11.1         11.1.0 through 11.1.6    Upgrade to 11.1.6-h14 or 11.1.10 or later.\nPAN-OS 10.2         10.2.0 through 10.2.10   Upgrade to 10.2.10-h27 or later.\nPAN-OS 10.1         10.1.0 through 10.1.14   Upgrade to 10.1.14-h15 or later.\nAll older                                    Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\nPrisma Access All                            No action needed.","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>Cloud NGFW All<br></td><td></td><td>No action needed.</td></tr><tr>\n                                <td>PAN-OS 11.2<br></td>\n                                <td>11.2.0 through 11.2.5</td>\n                                <td>Upgrade to 11.2.6 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 11.1<br></td>\n                                <td>11.1.0 through 11.1.6</td>\n                                <td>Upgrade to 11.1.6-h14 or 11.1.10 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 10.2<br></td>\n                                <td>10.2.0 through 10.2.10</td>\n                                <td>Upgrade to 10.2.10-h27 or later.</td>\n                            </tr><tr>\n                                <td>PAN-OS 10.1<br></td>\n                                <td>10.1.0 through 10.1.14</td>\n                                <td>Upgrade to 10.1.14-h15 or later.</td>\n                            </tr><tr><td>All older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr><tr><td>Prisma Access All<br></td><td></td><td>No action needed.</td></tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-06-30T20:30:00.000Z","lang":"en","value":"Updated fix version for 11.1.0."},{"time":"2025-06-24T17:30:00.000Z","lang":"en","value":"Updated fix version."},{"time":"2025-06-11T16:00:00.000Z","lang":"en","value":"Initial Publication"}],"credits":[{"lang":"en","value":"Visa Inc.","type":"finder"}],"source":{"defect":["PAN-271215"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.5","PAN-OS 11.2.4-h12","PAN-OS 11.2.4-h11","PAN-OS 11.2.4-h10","PAN-OS 11.2.4-h9","PAN-OS 11.2.4-h8","PAN-OS 11.2.4-h7","PAN-OS 11.2.4-h6","PAN-OS 11.2.4-h5","PAN-OS 11.2.4-h4","PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.9","PAN-OS 11.1.8","PAN-OS 11.1.6-h10","PAN-OS 11.1.6-h7","PAN-OS 11.1.6-h6","PAN-OS 11.1.6-h4","PAN-OS 11.1.6-h3","PAN-OS 11.1.6-h2","PAN-OS 11.1.6-h1","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h25","PAN-OS 11.1.4-h18","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.10-h26","PAN-OS 10.2.10-h23","PAN-OS 10.2.10-h21","PAN-OS 10.2.10-h18","PAN-OS 10.2.10-h17","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h21","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h14","PAN-OS 10.1.14-h13","PAN-OS 10.1.14-h11","PAN-OS 10.1.14-h10","PAN-OS 10.1.14-h9","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-0130","assignerOrgId":"00000000-0000-4000-9000-000000000000","assignerShortName":"palo_alto","dateUpdated":"2024-10-14T00:00:00.000Z","serial":1,"dateReserved":"2024-10-09T07:00:00.000Z","datePublished":"2024-10-09T07:00:00.000Z","state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000","shortName":"palo_alto","dateUpdated":"2024-10-09T17:05:00.000Z"},"title":"PAN-OS: Firewall Denial-of-Service (DoS) in the Web-Proxy Feature via a Burst of Maliciously Crafted Packets","datePublic":"2025-05-14T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-754","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-583","descriptions":[{"lang":"en","value":"CAPEC-583 Disabling Network Hardware"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"11.2.0","lessThan":"11.2.5","changes":[{"at":"11.2.5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.6-h1","changes":[{"at":"11.1.6-h1","status":"unaffected"},{"at":"11.1.7-h2","status":"unaffected"},{"at":"11.1.8","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"10.2.0","versionType":"custom"},{"status":"unaffected","version":"10.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled allows an unauthenticated attacker to send a burst of maliciously crafted packets that causes the firewall to become unresponsive and eventually reboot. Repeated successful attempts to trigger this condition will cause the firewall to enter maintenance mode.\n\nThis issue does not affect Cloud NGFW or Prisma Access.","supportingMedia":[{"type":"text/html","base64":true,"value":"<p>A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled allows an unauthenticated attacker to send a burst of maliciously crafted packets that causes the firewall to become unresponsive and eventually reboot. Repeated successful attempts to trigger this condition will cause the firewall to enter maintenance mode.</p><p>This issue does not affect Cloud NGFW or Prisma Access.</p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-0130","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"LOW","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.2,"threatSeverity":"MEDIUM","threatScore":4.6,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:Y/R:U/V:C/RE:L/U:Amber"}}],"configurations":[{"lang":"en","value":"This issue only affects PAN-OS firewalls that have the web proxy feature enabled. This feature is only available on PAN-OS 11.0 and above. Additionally a license is required to use the web proxy feature.\nTo verify if you have configured web proxy on your PAN-OS device, see our documentation regarding the web proxy feature (https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-new-features/networking-features/web-proxy).","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue only affects PAN-OS firewalls that have the web proxy feature enabled. This feature is only available on PAN-OS 11.0 and above. Additionally a license is required to use the web proxy feature.<br>To verify if you have configured web proxy on your PAN-OS device, see our <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-new-features/networking-features/web-proxy\">documentation regarding the web proxy feature</a>."}]}],"workarounds":[{"lang":"en","value":"If you are not using the web proxy feature, you can disable it to mitigate this issue. For more information regarding the web proxy feature, see our documentation regarding the web proxy feature (https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-new-features/networking-features/web-proxy).","supportingMedia":[{"type":"text/html","base64":false,"value":"If you are not using the web proxy feature, you can disable it to mitigate this issue. For more information regarding the web proxy feature, see our <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-new-features/networking-features/web-proxy\">documentation regarding the web proxy feature</a>."}]}],"solutions":[{"lang":"eng","value":"VERSION             MINOR VERSION           SUGGESTED SOLUTION\nPAN-OS 11.2         11.2.0 through 11.2.4   Upgrade to 11.2.5 or later.\nPAN-OS 11.1         11.1.0 through 11.1.7   Upgrade to 11.1.7-h2 or 11.1.8 or later.\n                    11.1.0 through 11.1.6   Upgrade to 11.1.6-h1 or 11.1.8 or later.\nPAN-OS 11.0 (EoL)                           Upgrade to a supported fixed version.\nPAN-OS 10.2                                 No action needed.\nPAN-OS 10.1                                 No action needed.\nAll other                                   Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>PAN-OS 11.2<br></td><td>11.2.0 through 11.2.4</td><td>Upgrade to 11.2.5 or later.<br></td></tr><tr><td>PAN-OS 11.1</td><td>11.1.0 through 11.1.7<br></td><td>Upgrade to 11.1.7-h2 or 11.1.8 or later.</td></tr><tr><td>&nbsp;</td><td>11.1.0 through 11.1.6</td><td>Upgrade to 11.1.6-h1 or 11.1.8 or later.</td></tr><tr><td>PAN-OS 11.0 (EoL)<br></td><td><br></td><td>Upgrade to a supported fixed version.<br></td></tr><tr><td>PAN-OS 10.2<br></td><td></td><td>No action needed.</td></tr><tr><td>PAN-OS 10.1<br></td><td></td><td>No action needed.</td></tr><tr><td>All other<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-05-14T16:00:00.000Z","lang":"eng","value":"Initial publication"}],"credits":[{"lang":"en","value":"Jari Pietila of Palo Alto Networks","type":"finder"}],"source":{"defect":["PAN-273308"],"discovery":"INTERNAL"},"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"x_affectedList":["PAN-OS 11.2.4-h12","PAN-OS 11.2.4-h11","PAN-OS 11.2.4-h10","PAN-OS 11.2.4-h9","PAN-OS 11.2.4-h8","PAN-OS 11.2.4-h7","PAN-OS 11.2.4-h6","PAN-OS 11.2.4-h5","PAN-OS 11.2.4-h4","PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h18","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-0127","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Authenticated Admin Command Injection Vulnerability in PAN-OS VM-Series","datePublic":"2025-04-09T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-248","descriptions":[{"lang":"en","value":"CAPEC-248 Command Injection"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","platforms":["VM-Series"],"cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"unaffected","version":"11.2.0","versionType":"custom"},{"status":"unaffected","version":"11.1.0","versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.4","changes":[{"at":"11.0.4","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.9","changes":[{"at":"10.2.9","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.1.0","lessThan":"10.1.14-h13","changes":[{"at":"10.1.14-h13","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. This issue is only applicable to PAN-OS VM-Series. This issue does not affect firewalls that are already deployed.\n\nCloud NGFW and Prisma® Access are not affected by this vulnerability.","supportingMedia":[{"type":"text/html","base64":false,"value":"A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. This issue is only applicable to PAN-OS VM-Series. This issue does not affect firewalls that are already deployed.<b><br><br></b>Cloud NGFW and Prisma® Access are not affected by this vulnerability."}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-0127","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":7.1,"threatSeverity":"MEDIUM","threatScore":4,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"No special configuration is required to be affected by this issue.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"No special configuration is required to be affected by this issue."}]}],"workarounds":[{"lang":"en","value":"No workaround or mitigation is available.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"No workaround or mitigation is available."}]}],"solutions":[{"lang":"eng","value":"\n\n\nVERSION                                       MINOR VERSION            SUGGESTED SOLUTION\nPAN-OS 11.2 on VM-Series                                               No action needed\nPAN-OS 11.1 on VM-Series                                               No action needed\nPAN-OS 11.0 on VM-Series                      11.0.0 through 11.0.3    Upgrade to 11.0.4 or later\nPAN-OS 10.2 on VM-Series                      10.2.0 through 10.2.8    Upgrade to 10.2.9 or later\nPAN-OS 10.1 on VM-Series                      10.1.0 through 10.1.14   Upgrade to 10.1.14-h13 or later\nPAN-OS on non VM-Series platforms                                      No action needed\nAll other older unsupported PAN-OS versions                            Upgrade to a supported fixed version\n\n\nPAN-OS 11.0 is EoL. We listed it in this section for completeness because we added a patch for PAN-OS 11.0 before it reached EoL. If you are running PAN-OS 11.0 in any of your firewalls, we strongly recommend that you upgrade from this EoL vulnerable version to a fixed version.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<div><br></div><table class=\"tbl\"><thead><tr><th>Version</th><th>Minor Version</th><th>Suggested Solution</th></tr></thead><tbody><tr><td>PAN-OS 11.2 on VM-Series<br></td><td><br></td><td>No action needed<br></td></tr><tr><td>PAN-OS 11.1&nbsp;on VM-Series<br></td><td><br></td><td>No action needed<br></td></tr><tr><td>PAN-OS 11.0&nbsp;on VM-Series<br></td><td>11.0.0 through 11.0.3<br></td><td>Upgrade to 11.0.4 or later<br></td></tr><tr><td>PAN-OS 10.2&nbsp;on VM-Series<br></td><td>10.2.0 through 10.2.8<br></td><td>Upgrade to 10.2.9 or later<br></td></tr><tr><td>PAN-OS 10.1&nbsp;on VM-Series<br></td><td>10.1.0 through 10.1.14<br></td><td>Upgrade to 10.1.14-h13 or later<br></td></tr><tr><td>PAN-OS on non VM-Series platforms</td><td><br></td><td>No action needed</td></tr><tr><td>All other older unsupported PAN-OS versions<br></td><td><br></td><td>Upgrade to a supported fixed version<br></td></tr></tbody></table><b><br></b>PAN-OS 11.0 is EoL. We listed it in this section for completeness because we added a patch for PAN-OS 11.0 before it reached EoL. If you are running PAN-OS 11.0 in any of your firewalls, we strongly recommend that you upgrade from this EoL vulnerable version to a fixed version."}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-04-09T16:00:00.000Z","lang":"en","value":"Initial Publication"}],"credits":[{"lang":"en","value":"Pavel Raunou","type":"finder"}],"source":{"defect":["PAN-225690"],"discovery":"INTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.0.3-h13","PAN-OS 11.0.3-h12","PAN-OS 11.0.3-h11","PAN-OS 11.0.3-h10","PAN-OS 11.0.3-h9","PAN-OS 11.0.3-h8","PAN-OS 11.0.3-h7","PAN-OS 11.0.3-h6","PAN-OS 11.0.3-h5","PAN-OS 11.0.3-h4","PAN-OS 11.0.3-h3","PAN-OS 11.0.3-h2","PAN-OS 11.0.3-h1","PAN-OS 11.0.3","PAN-OS 11.0.2-h5","PAN-OS 11.0.2-h4","PAN-OS 11.0.2-h3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h5","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h4","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h11","PAN-OS 10.1.14-h10","PAN-OS 10.1.14-h9","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-0128","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Firewall Denial of Service (DoS) Using a Specially Crafted Packet","datePublic":"2025-04-09T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-754","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-153","descriptions":[{"lang":"en","value":"CAPEC-153 Input Data Manipulation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","platforms":["PAN-OS"],"versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h32:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h31:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h30:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h29:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h28:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h27:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h26:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h25:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h24:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h23:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h22:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h21:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"11.2.0","lessThan":"11.2.3","changes":[{"at":"11.2.3","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.5","changes":[{"at":"11.1.5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.6","changes":[{"at":"11.0.6","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.10-h17","changes":[{"at":"10.2.10-h17","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.1.0","lessThan":"10.1.14-h11","changes":[{"at":"10.1.14-h11","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","platforms":["PAN-OS"],"versions":[{"status":"affected","version":"10.2.0","lessThan":"10.2.4-h36","changes":[{"at":"10.2.10-h16","status":"unaffected"},{"at":"10.2.4-h36","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.4-h5","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A denial-of-service (DoS) vulnerability in the Simple Certificate Enrollment Protocol (SCEP) authentication feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode.\n\nCloud NGFW is not affected by this vulnerability. Prisma® Access software is proactively patched and protected from this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>A denial-of-service (DoS) vulnerability in the Simple Certificate Enrollment Protocol (SCEP) authentication feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode.<br><br>Cloud NGFW is not affected by this vulnerability. Prisma® Access software is proactively patched and protected from this issue.</p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-0128","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"A user sends a malicious crafted packet through the firewall, which processes a malicious packet that causes this issue."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"MEDIUM","threatScore":6.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:Y/R:U/V:C/RE:M/U:Amber"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"For Prisma Access, this issue can only be initiated by authenticated end users that use a maliciously crafted packet."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"LOW","subAvailabilityImpact":"LOW","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"MEDIUM","baseScore":5.3,"threatSeverity":"LOW","threatScore":1.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:U/AU:Y/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"NOTE: You do not need to have explicitly configured SCEP on your firewall to be at risk. Firewalls for which you do not apply the explicit mitigation for this issue are affected.","supportingMedia":[{"type":"text/html","base64":false,"value":"NOTE: You do not need to have explicitly configured SCEP on your firewall to be at risk. Firewalls for which you do not apply the explicit mitigation for this issue are affected."}]}],"workarounds":[{"lang":"en","value":"If you are not using SCEP, you can disable it to mitigate this risk by running the following command in your PAN-OS command-line interface (CLI):\n\n\n> debug sslmgr set disable-scep-auth-cookie yes\n\nCAUTION: This workaround is effective only until the next reboot, after which you must rerun this command to stay protected.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"If you are not using SCEP, you can disable it to mitigate this risk by running the following command in your PAN-OS command-line interface (CLI):<br><tt></tt><p><tt><tt>&gt; debug sslmgr set disable-scep-auth-cookie yes</tt></tt></p>CAUTION: This workaround is effective only until the next reboot, after which you must rerun this command to stay protected."}]}],"solutions":[{"lang":"eng","value":"VERSION           MINOR VERSION            SUGGESTED SOLUTION\nPAN-OS 11.2       11.2.0 through 11.2.2    Upgrade to 11.2.3 or later\nPAN-OS 11.1       11.1.0 through 11.1.4    Upgrade to 11.1.5 or later\nPAN-OS 11.0       11.0.0 through 11.0.5    Upgrade to 11.0.6 or later\nPAN-OS 10.2       10.2.0 through 10.2.10   Upgrade to 10.2.11 or later\nPAN-OS 10.1       10.1.0 through 10.1.14   Upgrade to 10.1.14-h11 or later\nAll other older                            Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\n\n\nPAN-OS 11.0 is EoL. We listed it in this section for completeness because we added a patch for PAN-OS 11.0 before it reached EoL. If you are running PAN-OS 11.0 in any of your firewalls, we strongly recommend that you upgrade to a fixed supported version.\n\nWe proactively initiated the upgrade through Prisma Access March 21, 2025, to cover all tenants.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>PAN-OS 11.2<br></td><td>11.2.0 through 11.2.2</td><td>Upgrade to 11.2.3 or later<br></td></tr><tr><td>PAN-OS 11.1</td><td>11.1.0 through 11.1.4<br></td><td>Upgrade to 11.1.5 or later</td></tr><tr><td>PAN-OS 11.0<br></td><td>11.0.0 through 11.0.5<br></td><td>Upgrade to 11.0.6 or later<br></td></tr><tr><td>PAN-OS 10.2<br></td><td>10.2.0 through 10.2.10</td><td>Upgrade to 10.2.11 or later</td></tr><tr><td>PAN-OS 10.1<br></td><td>10.1.0 through 10.1.14<br></td><td>Upgrade to 10.1.14-h11 or later<br></td></tr><tr><td>All other older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr></tbody></table><br>PAN-OS 11.0 is EoL. We listed it in this section for completeness because we added a patch for PAN-OS 11.0 before it reached EoL. If you are running PAN-OS 11.0 in any of your firewalls, we strongly recommend that you upgrade to a fixed supported version.<br><br>We proactively initiated the upgrade through Prisma Access March 21, 2025, to cover all tenants."}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-04-09T16:00:00.000Z","lang":"en","value":"Initial Publication"}],"credits":[{"lang":"en","value":"independent security researcher","type":"finder"}],"source":{"defect":["PAN-255859"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 11.0.5-h2","PAN-OS 11.0.5-h1","PAN-OS 11.0.5","PAN-OS 11.0.4-h6","PAN-OS 11.0.4-h5","PAN-OS 11.0.4-h4","PAN-OS 11.0.4-h3","PAN-OS 11.0.4-h2","PAN-OS 11.0.4-h1","PAN-OS 11.0.4","PAN-OS 11.0.3-h13","PAN-OS 11.0.3-h12","PAN-OS 11.0.3-h11","PAN-OS 11.0.3-h10","PAN-OS 11.0.3-h9","PAN-OS 11.0.3-h8","PAN-OS 11.0.3-h7","PAN-OS 11.0.3-h6","PAN-OS 11.0.3-h5","PAN-OS 11.0.3-h4","PAN-OS 11.0.3-h3","PAN-OS 11.0.3-h2","PAN-OS 11.0.3-h1","PAN-OS 11.0.3","PAN-OS 11.0.2-h5","PAN-OS 11.0.2-h4","PAN-OS 11.0.2-h3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h5","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h4","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h21","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h10","PAN-OS 10.1.14-h9","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-0126","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Session Fixation Vulnerability in GlobalProtect SAML Login","datePublic":"2025-04-09T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-384","description":"CWE-384 Session Fixation","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-195","descriptions":[{"lang":"en","value":"CAPEC-195 Principal Spoof"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h32:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h31:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h30:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h29:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h28:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h27:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h26:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h25:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h24:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h23:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h22:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h21:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"11.2.0","lessThan":"11.2.3","changes":[{"at":"11.2.3","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.5","changes":[{"at":"11.1.5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.6","changes":[{"at":"11.0.6","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.10-h6","changes":[{"at":"10.2.10-h6","status":"unaffected"},{"at":"10.2.11","status":"unaffected"},{"at":"10.2.4-h25","status":"unaffected"},{"at":"10.2.9-h13","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.1.0","lessThan":"10.1.14-h11","changes":[{"at":"10.1.14-h11","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","platforms":["PAN-OS"],"versions":[{"status":"affected","version":"10.2.0","lessThan":"10.2.4-h36","changes":[{"at":"10.2.10-h16","status":"unaffected"},{"at":"10.2.4-h36","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.4-h5","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker.\n\nThe SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched.","supportingMedia":[{"type":"text/html","base64":false,"value":"When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker.<br><br>The SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched."}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-0126","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"ACTIVE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"HIGH","vulnIntegrityImpact":"LOW","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.3,"threatSeverity":"MEDIUM","threatScore":5.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:H/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"This issue impacts only firewalls on which you configured a GlobalProtect portal to use SAML Authentication.\n\nYou can verify whether you configured GlobalProtect portal by checking for entries in your firewall web interface (Network → GlobalProtect → Portals).\n\nIf you do have GlobalProtect portals or gateways in your configuration, then you can verify whether you configured SAML Authentication on these portals by checking your firewall web interface (Network → GlobalProtect → Portals → (portal-config) → Authentication).\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>This issue impacts only firewalls on which you configured a GlobalProtect portal to use SAML Authentication.</p><p>You can verify whether you configured GlobalProtect portal by checking for entries in your firewall web interface (Network → GlobalProtect → Portals).</p><p>If you do have GlobalProtect portals or gateways in your configuration, then you can verify whether you configured SAML Authentication on these portals by checking your firewall web interface (Network → GlobalProtect → Portals → (portal-config) → Authentication).</p>"}]}],"workarounds":[{"lang":"en","value":"This issue can be mitigated using a different form of authentication for the GlobalProtect portal (such as Client Certificate Authentication, RADIUS, TACACS+, LDAP, or Kerberos). For more information about configuring authentication for the GlobalProtect portal see this technical documentation (https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-web-interface-help/globalprotect/network-globalprotect-portals/globalprotect-portals-authentication-configuration-tab).","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>This issue can be mitigated using a different form of authentication for the GlobalProtect portal (such as Client Certificate Authentication, RADIUS, TACACS+, LDAP, or Kerberos). For more information about configuring authentication for the GlobalProtect portal see this technical </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-web-interface-help/globalprotect/network-globalprotect-portals/globalprotect-portals-authentication-configuration-tab\"><span>documentation</span></a><span>.</span></p>"}]}],"solutions":[{"lang":"eng","value":"VERSION           MINOR VERSION            SUGGESTED SOLUTION\nPAN-OS 11.2       11.2.0 through 11.2.2    Upgrade to 11.2.3 or later\nPAN-OS 11.1       11.1.0 through 11.1.4    Upgrade to 11.1.5 or later\nPAN-OS 11.0       11.0.0 through 11.0.5    Upgrade to 11.0.6 or later\nPAN-OS 10.2       10.2.10                  Upgrade to 10.2.10-h6 or 10.2.11 or later\n                  10.2.5 through 10.2.9    Upgrade to 10.2.9-h13 or 10.2.11 or later\n                  10.2.0 through 10.2.4    Upgrade to 10.2.4-h25 or 10.2.11 or later\nPAN-OS 10.1       10.1.0 through 10.1.14   Upgrade to 10.1.14-h11 or later\nAll other older                            Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\n\n\nPAN-OS 11.0 is EoL. We listed it in this section for completeness because we added a patch for PAN-OS 11.0 before it reached EoL. If you are running PAN-OS 11.0 in any of your firewalls, we strongly recommend that you upgrade from this EoL vulnerable version to a fixed version.\n\nWe proactively initiated an upgrade of Prisma Access on March 21, 2025, to cover all tenants.\n\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>PAN-OS 11.2<br></td><td>11.2.0 through 11.2.2<br></td><td>Upgrade to 11.2.3 or later</td></tr><tr><td>PAN-OS 11.1<br></td><td>11.1.0 through 11.1.4<br></td><td>Upgrade to 11.1.5 or later<br></td></tr><tr><td>PAN-OS 11.0</td><td>11.0.0 through 11.0.5</td><td>Upgrade to 11.0.6 or later</td></tr><tr><td>PAN-OS 10.2<br></td><td>10.2.10<br></td><td>Upgrade to 10.2.10-h6 or 10.2.11 or later<br></td></tr><tr><td>&nbsp;</td><td>10.2.5 through 10.2.9</td><td>Upgrade to 10.2.9-h13 or 10.2.11 or later</td></tr><tr><td>&nbsp;</td><td>10.2.0 through 10.2.4</td><td>Upgrade to 10.2.4-h25 or 10.2.11 or later</td></tr><tr><td>PAN-OS 10.1<br></td><td>10.1.0 through 10.1.14<br></td><td>Upgrade to 10.1.14-h11 or later<br></td></tr><tr><td>All other older <br>unsupported <br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr></tbody></table><br>PAN-OS 11.0 is EoL. We listed it in this section for completeness because we added a patch for PAN-OS 11.0 before it reached EoL. If you are running PAN-OS 11.0 in any of your firewalls, we strongly recommend that you upgrade from this EoL vulnerable version to a fixed version.<br><br>We proactively initiated an upgrade of Prisma Access on March 21, 2025, to cover all tenants.<br><p></p>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-04-09T16:00:00.000Z","lang":"en","value":"Initial Publication"}],"credits":[{"lang":"en","value":"D'Angelo Gonzalez of CrowdStrike","type":"finder"}],"source":{"defect":["PAN-253328"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.4-h17","PAN-OS 11.1.4-h15","PAN-OS 11.1.4-h13","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 11.0.5-h2","PAN-OS 11.0.5-h1","PAN-OS 11.0.5","PAN-OS 11.0.4-h6","PAN-OS 11.0.4-h5","PAN-OS 11.0.4-h4","PAN-OS 11.0.4-h3","PAN-OS 11.0.4-h2","PAN-OS 11.0.4-h1","PAN-OS 11.0.4","PAN-OS 11.0.3-h13","PAN-OS 11.0.3-h12","PAN-OS 11.0.3-h11","PAN-OS 11.0.3-h10","PAN-OS 11.0.3-h9","PAN-OS 11.0.3-h8","PAN-OS 11.0.3-h7","PAN-OS 11.0.3-h6","PAN-OS 11.0.3-h5","PAN-OS 11.0.3-h4","PAN-OS 11.0.3-h3","PAN-OS 11.0.3-h2","PAN-OS 11.0.3-h1","PAN-OS 11.0.3","PAN-OS 11.0.2-h5","PAN-OS 11.0.2-h4","PAN-OS 11.0.2-h3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h5","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h4","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.10-h14","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h21","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h24","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h10","PAN-OS 10.1.14-h9","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-0114","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Denial of Service (DoS) in GlobalProtect","datePublic":"2025-03-12T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-400","description":"CWE-400 Uncontrolled Resource Consumption","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-125","descriptions":[{"lang":"en","value":"CAPEC-125 Flooding"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"unaffected","version":"11.2.0","versionType":"custom"},{"status":"unaffected","version":"11.1.0","versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.2","changes":[{"at":"11.0.2","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.5","changes":[{"at":"10.2.5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.1.0","lessThan":"10.1.14-h11","changes":[{"at":"10.1.14-h11","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A Denial of Service (DoS) vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software enables an unauthenticated attacker to render the service unavailable by sending a large number of specially crafted packets over a period of time. This issue affects both the GlobalProtect portal and the GlobalProtect gateway.\n\nThis issue does not apply to Cloud NGFWs or Prisma Access software.","supportingMedia":[{"type":"text/html","base64":false,"value":"A Denial of Service (DoS) vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software enables an unauthenticated attacker to render the service unavailable by sending a large number of specially crafted packets over a period of time. This issue affects both the GlobalProtect portal and the GlobalProtect gateway.<br><br>This issue does not apply to Cloud NGFWs or Prisma Access software."}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-0114","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.2,"threatSeverity":"MEDIUM","threatScore":4.6,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"This issue is applicable only to PAN-OS firewall configurations with an enabled GlobalProtect portal or gateway. You can verify whether you have a GlobalProtect portal or gateway configured on your firewall by checking entries in the firewall web interface (Network > GlobalProtect > Portals and Network > GlobalProtect > Gateways).","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is applicable only to PAN-OS firewall configurations with an enabled GlobalProtect portal or gateway. You can verify whether you have a GlobalProtect portal or gateway configured on your firewall by checking entries in the firewall web interface (<b>Network</b> &gt; <b>GlobalProtect</b> &gt; <b>Portals</b> and <b>Network</b> &gt; <b>GlobalProtect</b> &gt; <b>Gateways</b>)."}]}],"workarounds":[{"lang":"en","value":"No workaround or mitigation is available.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"No workaround or mitigation is available."}]}],"solutions":[{"lang":"eng","value":"VERSION           MINOR VERSION            SUGGESTED SOLUTION\nPAN-OS 11.0       11.0.0 through 11.0.1    Upgrade to 11.0.2 or later\nPAN-OS 10.2       10.2.0 through 10.2.4    Upgrade to 10.2.5 or later\nPAN-OS 10.1       10.1.0 through 10.1.14   Upgrade to 10.1.14-h11 or later\nAll other older                            Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>PAN-OS 11.0</td><td>11.0.0 through 11.0.1</td><td>Upgrade to 11.0.2 or later</td></tr><tr><td>PAN-OS 10.2</td><td>10.2.0 through 10.2.4<br></td><td>Upgrade to 10.2.5 or later</td></tr><tr><td>PAN-OS 10.1<br></td><td>10.1.0 through 10.1.14<br></td><td>Upgrade to 10.1.14-h11 or later<br></td></tr><tr><td>All other older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr></tbody></table>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-03-12T16:00:00.000Z","lang":"en","value":"Initial Publication"}],"credits":[{"lang":"en","value":"an external reporter","type":"finder"}],"source":{"defect":["PAN-209208"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.0.1-h5","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h4","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h10","PAN-OS 10.1.14-h9","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-0108","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Authentication Bypass in the Management Web Interface","datePublic":"2025-02-12T17:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-306","description":"CWE-306 Missing Authentication for Critical Function","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-115","descriptions":[{"lang":"en","value":"CAPEC-115 Authentication Bypass"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"10.1.0","lessThan":"10.1.14-h9","changes":[{"at":"10.1.14-h9","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.7-h24","changes":[{"at":"10.2.7-h24","status":"unaffected"},{"at":"10.2.8-h21","status":"unaffected"},{"at":"10.2.9-h21","status":"unaffected"},{"at":"10.2.12-h6","status":"unaffected"},{"at":"10.2.13-h3","status":"unaffected"},{"at":"10.2.10-h14","status":"unaffected"},{"at":"10.2.11-h12","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.6-h1","changes":[{"at":"11.1.6-h1","status":"unaffected"},{"at":"11.1.2-h18","status":"unaffected"},{"at":"11.1.4-h13","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.4-h4","changes":[{"at":"11.2.4-h4","status":"unaffected"},{"at":"11.2.5","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"An authentication bypass in the in the management web interface of Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS.\n\nThe attacker must have network access to the management web interface to exploit this issue. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended critical deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431).\n\nThis issue does not affect Cloud NGFW or Prisma Access software.","supportingMedia":[{"type":"text/html","base64":false,"value":"An authentication bypass in the <span>in the management web interface of</span><b><span>&nbsp;</span></b>Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS.<b><br><br></b><span>The attacker must have network access to the management web interface to exploit this issue.&nbsp;</span>You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">critical deployment guidelines</a>.<b><br><br></b>This issue does not affect Cloud NGFW or Prisma Access software."}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-0108","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"The risk is highest when you allow access to the management interface from external IP addresses on the internet. Our recommendation is to remediate as soon as possible."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"RED","exploitMaturity":"ATTACKED","baseSeverity":"HIGH","baseScore":8.8,"threatSeverity":"HIGH","threatScore":8.8,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:A/AU:N/R:U/V:C/RE:M/U:Red"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"You can greatly reduce the risk of exploitation by restricting access to a jump box that is the only system allowed to access the management interface. This will ensure that attacks can succeed only if they obtain privileged access through those specified IP addresses. We recommend remediating this vulnerability in your next scheduled maintenance cycle."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"POC","baseSeverity":"MEDIUM","baseScore":5.9,"threatSeverity":"MEDIUM","threatScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"The risk is greatest if you enabled access to the management interface from the internet or any untrusted network either:\n\n 1. Directly; or\n 2. Through a dataplane interface that includes a management interface profile.\n\nYou greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management interface.\n\nUse the following steps to identify your recently detected devices in our internet scans.\n\n 1. To find any assets that require remediation action, visit the Assets section of the Customer Support Portal at https://support.paloaltonetworks.com (https://support.paloaltonetworks.com/) (Products → Assets → All Assets → Remediation Required).\n 2. Review the list of your devices that we discovered in our scans to have an internet-facing management interface and that we tagged with ‘PAN-SA-2024-0015’ and a last seen timestamp (in UTC). If you do not see any such devices listed, then our scan did not find any devices on your account to have an internet-facing management interface within the past three days.\n\nGlobalProtect portals and gateways are not vulnerable to this issue. However, if you configure a management profile on interfaces with GlobalProtect portals or gateways, then you expose the device to attacks through the management web interface (typically accessible on port 4443).","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>The risk is greatest if you enabled access to the management interface from the internet or any untrusted network either:</span></p><ol><li><span>Directly; or</span></li><li><span>Through a dataplane interface that includes a management interface profile.</span></li></ol><p><span>You greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management interface.</span></p><p><span>Use the following steps to identify your recently detected devices in our internet scans.</span></p><ol><li><span>To find any assets that require remediation action, visit the Assets section of the Customer Support Portal at&nbsp;</span><a target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/\"><span>https://support.paloaltonetworks.com</span></a>&nbsp;(Products → Assets → All Assets → Remediation Required).</li><li><span>Review the list of your devices that we discovered in our scans to have an internet-facing management interface and that we tagged with ‘PAN-SA-2024-0015’ and a last seen timestamp (in UTC). If you do not see any such devices listed, then our scan did not find any devices on your account to have an internet-facing management interface within the past three days.</span></li></ol><p><span>GlobalProtect portals and gateways are not vulnerable to this issue. However, if you configure a management profile on interfaces with GlobalProtect portals or gateways, then you expose the device to attacks through the management web interface (typically accessible on port 4443).</span></p>"}]}],"workarounds":[{"lang":"en","value":"Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our critical deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431). Specifically, you should restrict management interface access to only trusted internal IP addresses.\n\nReview information about how to secure management access to your Palo Alto Networks firewalls:\n\n * Palo Alto Networks LIVEcommunity article:https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\n * Palo Alto Networks official and detailed technical documentation:https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\n\nAdditionally, customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510000 and 510001 (introduced in Applications and Threats content version 8943).","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><b>Recommended mitigation</b>—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">critical deployment guidelines</a>. Specifically, you should restrict management interface access to only trusted internal IP addresses.</p><p>Review information about how to secure management access to your Palo Alto Networks firewalls:</p><ul><li>Palo Alto Networks LIVEcommunity article:<a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431</a></li><li>Palo Alto Networks official and detailed technical documentation:<a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\">https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices</a></li></ul>Additionally, customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510000 and 510001 (introduced in Applications and Threats content version 8943)."}]}],"solutions":[{"lang":"en","value":"VERSION             MINOR VERSION            SUGGESTED SOLUTION\nPAN-OS 10.1         10.1.0 through 10.1.14   Upgrade to 10.1.14-h9 or later\nPAN-OS 10.2         10.2.0 through 10.2.13   Upgrade to 10.2.13-h3 or later\n                    10.2.7                   Upgrade to 10.2.7-h24 or 10.2.13-h3 or later\n                    10.2.8                   Upgrade to 10.2.8-h21 or 10.2.13-h3 or later\n                    10.2.9                   Upgrade to 10.2.9-h21 or 10.2.13-h3 or later\n                    10.2.10                  Upgrade to 10.2.10-h14 or 10.2.13-h3 or later\n                    10.2.11                  Upgrade to 10.2.11-h12 or 10.2.13-h3 or later \n                    10.2.12                  Upgrade to 10.2.12-h6 or 10.2.13-h3 or later\nPAN-OS 11.0 (EoL)                            Upgrade to a supported fixed version\nPAN-OS 11.1         11.1.0 through 11.1.6    Upgrade to 11.1.6-h1 or later\n                    11.1.2                   Upgrade to 11.1.2-h18 or 11.1.6-h1 or later\n                    11.1.4                   Upgrade to 11.1.4-h13 or 11.1.6-h1 or later\nPAN-OS 11.2         11.2.0 through 11.2.4    Upgrade to 11.2.5 or later\n                    11.2.4                   Upgrade to 11.2.4-h4 or 11.2.5 or later\nAll other older                              Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\n\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>PAN-OS 10.1<br></td><td>10.1.0 through 10.1.14<br></td><td>Upgrade to 10.1.14-h9 or later<br></td></tr><tr><td>PAN-OS 10.2<br></td><td>10.2.0 through 10.2.13<br></td><td>Upgrade to 10.2.13-h3 or later<br></td></tr><tr><td>&nbsp;</td><td>10.2.7</td><td>Upgrade to 10.2.7-h24 or 10.2.13-h3 or later</td></tr><tr><td>&nbsp;</td><td>10.2.8</td><td>Upgrade to 10.2.8-h21 or 10.2.13-h3 or later</td></tr><tr><td>&nbsp;</td><td>10.2.9</td><td>Upgrade to 10.2.9-h21 or 10.2.13-h3 or later</td></tr><tr><td>&nbsp;</td><td>10.2.10</td><td>Upgrade to 10.2.10-h14 or 10.2.13-h3 or later</td></tr><tr><td>&nbsp;</td><td>10.2.11</td><td>Upgrade to 10.2.11-h12 or 10.2.13-h3 or later&nbsp;</td></tr><tr><td>&nbsp;</td><td>10.2.12</td><td>Upgrade to 10.2.12-h6 or 10.2.13-h3 or later<br></td></tr><tr><td>PAN-OS 11.0 (EoL)</td><td>&nbsp;</td><td>Upgrade to a supported fixed version</td></tr><tr><td>PAN-OS 11.1<br></td><td>11.1.0 through 11.1.6<br></td><td>Upgrade to 11.1.6-h1 or later<br></td></tr><tr><td>&nbsp;</td><td>11.1.2</td><td>Upgrade to 11.1.2-h18 or 11.1.6-h1 or later<br></td></tr><tr><td>&nbsp;</td><td>11.1.4</td><td>Upgrade to 11.1.4-h13 or 11.1.6-h1 or later<br></td></tr><tr><td>PAN-OS 11.2<br></td><td>11.2.0 through 11.2.4<br></td><td>Upgrade to 11.2.5 or later</td></tr><tr><td>&nbsp;</td><td>11.2.4</td><td>Upgrade to 11.2.4-h4 or 11.2.5 or later<br></td></tr><tr><td>All other older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr></tbody></table><p><br></p>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks has observed exploit attempts chaining CVE-2025-0108 with CVE-2024-9474 and CVE-2025-0111 on unpatched and unsecured PAN-OS web management interfaces.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>Palo Alto Networks has observed exploit attempts chaining CVE-2025-0108 with CVE-2024-9474 and CVE-2025-0111 on unpatched and unsecured PAN-OS web management interfaces.</span></p>"}]}],"timeline":[{"time":"2025-02-18T23:00:00.000Z","lang":"en","value":"Updated the exploit status and solutions table"},{"time":"2025-02-18T19:30:00.000Z","lang":"en","value":"Updated fix availability for PAN-OS 10.2"},{"time":"2025-02-18T07:06:00.000Z","lang":"en","value":"Updated exploit status"},{"time":"2025-02-12T23:45:00.000Z","lang":"en","value":"Added Threat Prevention Threat ID to Workarounds and Mitigations"},{"time":"2025-02-12T17:00:00.000Z","lang":"en","value":"Initial Publication"},{"time":"2025-02-19T23:15:00.000Z","lang":"en","value":"Updated fix availability for PAN-OS 10.2 and 11.1"},{"time":"2025-02-21T17:10:00.000Z","lang":"en","value":"Updated fix availability for PAN-OS 11.1 and 11.2"},{"time":"2025-02-21T23:00:00.000Z","lang":"en","value":"Clarified recommended remediations and added a FAQ"},{"time":"2025-03-06T23:00:00.000Z","lang":"en","value":"Updated to explicitly state that end-of-life (EoL) versions are presumed to be affected"}],"credits":[{"lang":"en","value":"Adam Kues - Assetnote Security Research Team","type":"finder"},{"lang":"en","value":"our Deep Product Security Research Team","type":"finder"}],"source":{"defect":["PAN-273971"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2025-0111","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Authenticated File Read Vulnerability in the Management Web Interface","datePublic":"2025-02-12T17:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-73","description":"CWE-73: External Control of File Name or Path","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-165","descriptions":[{"lang":"en","value":"CAPEC-165 File Manipulation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"10.1.0","lessThan":"10.1.14-h9","changes":[{"at":"10.1.14-h9","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.7-h24","changes":[{"at":"10.2.7-h24","status":"unaffected"},{"at":"10.2.8-h21","status":"unaffected"},{"at":"10.2.9-h21","status":"unaffected"},{"at":"10.2.12-h6","status":"unaffected"},{"at":"10.2.13-h3","status":"unaffected"},{"at":"10.2.10-h14","status":"unaffected"},{"at":"10.2.11-h12","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.6-h1","changes":[{"at":"11.1.6-h1","status":"unaffected"},{"at":"11.1.2-h18","status":"unaffected"},{"at":"11.1.4-h13","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.4-h4","changes":[{"at":"11.2.4-h4","status":"unaffected"},{"at":"11.2.5","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"An authenticated file read vulnerability in the management web interface of the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user.\n\nThe attacker must have network access to the management web interface to exploit this issue. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended critical deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431).\n\n\n\nThis issue does not affect Cloud NGFW or Prisma Access software.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>An authenticated file read vulnerability in the management web interface of the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user.</p><p>The attacker must have network access to the management web interface to exploit this issue. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">critical deployment guidelines</a>.</p><b><p></p></b><p>This issue does not affect Cloud NGFW or Prisma Access software.</p><b></b>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2025-0111","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"The risk is highest when you allow access to the management interface from external IP addresses on the internet. Our recommendation is to remediate as soon as possible."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"RED","exploitMaturity":"ATTACKED","baseSeverity":"HIGH","baseScore":7.1,"threatSeverity":"HIGH","threatScore":7.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:A/AU:N/R:U/V:C/RE:M/U:Red"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"You can greatly reduce the risk of exploitation by restricting access to a jump box that is the only system allowed to access the management interface. This will ensure that attacks can succeed only if they obtain privileged access through those specified IP addresses. We recommend remediating this vulnerability in your next scheduled maintenance cycle."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"MEDIUM","baseScore":5.9,"threatSeverity":"LOW","threatScore":2,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"The risk is greatest if you enabled access to the management interface from the internet or any untrusted network either:\n\n 1. Directly; or\n 2. Through a dataplane interface that includes a management interface profile.\n\nYou greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management interface.\n\nUse the following steps to identify your recently detected devices in our internet scans.\n\n 1. To find any assets that require remediation action, visit the Assets section of the Customer Support Portal at https://support.paloaltonetworks.com (https://support.paloaltonetworks.com/) (Products → Assets → All Assets → Remediation Required).\n 2. Review the list of your devices that we discovered in our scans to have an internet-facing management interface and that we tagged with ‘PAN-SA-2024-0015’ and a last seen timestamp (in UTC). If you do not see any such devices listed, then our scan did not find any devices on your account to have an internet-facing management interface within the past three days.\n\nGlobalProtect portals and gateways are not vulnerable to this issue. However, if you configure a management profile on interfaces with GlobalProtect portals or gateways, then you expose the device to attacks through the management web interface (typically accessible on port 4443).","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>The risk is greatest if you enabled access to the management interface from the internet or any untrusted network either:</span></p><ol><li><span>Directly; or</span></li><li><span>Through a dataplane interface that includes a management interface profile.</span></li></ol><p><span>You greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management interface.</span></p><p><span>Use the following steps to identify your recently detected devices in our internet scans.</span></p><ol><li><span>To find any assets that require remediation action, visit the Assets section of the Customer Support Portal at </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/\"><span>https://support.paloaltonetworks.com</span></a>&nbsp;(Products → Assets → All Assets → Remediation Required).</li><li><span>Review the list of your devices that we discovered in our scans to have an internet-facing management interface and that we tagged with ‘PAN-SA-2024-0015’ and a last seen timestamp (in UTC). If you do not see any such devices listed, then our scan did not find any devices on your account to have an internet-facing management interface within the past three days.</span></li></ol><p><span>GlobalProtect portals and gateways are not vulnerable to this issue. However, if you configure a management profile on interfaces with GlobalProtect portals or gateways, then you expose the device to attacks through the management web interface (typically accessible on port 4443).</span></p>"}]}],"workarounds":[{"lang":"en","value":"Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our critical deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431). Specifically, you should restrict management interface access to only trusted internal IP addresses.\n\nReview information about how to secure management access to your Palo Alto Networks firewalls:\n\n * Palo Alto Networks LIVEcommunity article:https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\n * Palo Alto Networks official and detailed technical documentation:https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\n\nAdditionally, customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510000 and 510001 (introduced in Applications and Threats content version 8943).\nhttps://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices","supportingMedia":[{"type":"text/html","base64":false,"value":"<p></p><p><b>Recommended mitigation</b>—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">critical deployment guidelines</a>. Specifically, you should restrict management interface access to only trusted internal IP addresses.</p><p>Review information about how to secure management access to your Palo Alto Networks firewalls:</p><ul><li>Palo Alto Networks LIVEcommunity article:<a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431</a></li><li>Palo Alto Networks official and detailed technical documentation:<a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\">https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices</a></li></ul>Additionally, customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510000 and 510001 (introduced in Applications and Threats content version 8943).<br><a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\"></a>"}]}],"solutions":[{"lang":"eng","value":"VERSION             MINOR VERSION            SUGGESTED SOLUTION\nPAN-OS 10.1         10.1.0 through 10.1.14   Upgrade to 10.1.14-h9 or later\nPAN-OS 10.2         10.2.0 through 10.2.13   Upgrade to 10.2.13-h3 or later\n                    10.2.7                   Upgrade to 10.2.7-h24 or 10.2.13-h3 or later\n                    10.2.8                   Upgrade to 10.2.8-h21 or 10.2.13-h3 or later\n                    10.2.9                   Upgrade to 10.2.9-h21 or 10.2.13-h3 or later\n                    10.2.10                  Upgrade to 10.2.10-h14 or 10.2.13-h3 or later\n                    10.2.11                  Upgrade to 10.2.11-h12 or 10.2.13-h3 or later\n                    10.2.12                  Upgrade to 10.2.12-h6 or 10.2.13-h3 or later\nPAN-OS 11.0 (EoL)                            Upgrade to a supported fixed version\nPAN-OS 11.1         11.1.0 through 11.1.6    Upgrade to 11.1.6-h1 or later\n                    11.1.2                   Upgrade to 11.1.2-h18 or 11.1.6-h1 or later\n                    11.1.4                   Upgrade to 11.1.4-h13 or 11.1.6-h1 or later\nPAN-OS 11.2         11.2.0 through 11.2.4    Upgrade to 11.2.5 or later\n                    11.2.4                   Upgrade to 11.2.4-h4 or 11.2.5 or later\nAll other older                              Upgrade to a supported fixed version.\nunsupported\nPAN-OS versions\n\n\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<table class=\"tbl\"><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>PAN-OS 10.1<br></td><td>10.1.0 through 10.1.14<br></td><td>Upgrade to 10.1.14-h9 or later<br></td></tr><tr><td>PAN-OS 10.2<br></td><td>10.2.0 through 10.2.13<br></td><td>Upgrade to 10.2.13-h3 or later<br></td></tr><tr><td>&nbsp;</td><td>10.2.7</td><td>Upgrade to 10.2.7-h24 or 10.2.13-h3 or later</td></tr><tr><td>&nbsp;</td><td>10.2.8</td><td>Upgrade to 10.2.8-h21 or 10.2.13-h3 or later</td></tr><tr><td>&nbsp;</td><td>10.2.9</td><td>Upgrade to 10.2.9-h21 or 10.2.13-h3 or later</td></tr><tr><td>&nbsp;</td><td>10.2.10</td><td>Upgrade to 10.2.10-h14 or 10.2.13-h3 or later</td></tr><tr><td>&nbsp;</td><td>10.2.11</td><td>Upgrade to 10.2.11-h12 or 10.2.13-h3 or later </td></tr><tr><td>&nbsp;</td><td>10.2.12</td><td>Upgrade to 10.2.12-h6 or 10.2.13-h3 or later<br></td></tr><tr><td>PAN-OS 11.0 (EoL)</td><td>&nbsp;</td><td>Upgrade to a supported fixed version</td></tr><tr><td>PAN-OS 11.1<br></td><td>11.1.0 through 11.1.6<br></td><td>Upgrade to 11.1.6-h1 or later<br></td></tr><tr><td>&nbsp;</td><td>11.1.2</td><td>Upgrade to 11.1.2-h18 or 11.1.6-h1 or later<br></td></tr><tr><td>&nbsp;</td><td>11.1.4</td><td>Upgrade to 11.1.4-h13 or 11.1.6-h1 or later<br></td></tr><tr><td>PAN-OS 11.2<br></td><td>11.2.0 through 11.2.4<br></td><td>Upgrade to 11.2.5 or later<br></td></tr><tr><td>&nbsp;</td><td>11.2.4</td><td>Upgrade to 11.2.4-h4 or 11.2.5 or later</td></tr><tr><td>All other older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr></tbody></table><p><br></p>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks has observed exploit attempts chaining CVE-2025-0108 with CVE-2024-9474 and CVE-2025-0111 on unpatched and unsecured PAN-OS web management interfaces.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>Palo Alto Networks has observed exploit attempts chaining CVE-2025-0108 with CVE-2024-9474 and CVE-2025-0111 on unpatched and unsecured PAN-OS web management interfaces.</span></p>"}]}],"timeline":[{"time":"2025-02-19T23:15:00.000Z","lang":"en","value":"Updated fix availability for PAN-OS 10.2 and 11.1."},{"time":"2025-02-18T23:00:00.000Z","lang":"en","value":"Updated exploit status and solution table."},{"time":"2025-02-18T19:30:00.000Z","lang":"en","value":"Updated fix availability for PAN-OS 10.2."},{"time":"2025-02-12T23:45:00.000Z","lang":"en","value":"Added Threat Prevention Threat ID to Workarounds and Mitigations."},{"time":"2025-02-12T17:00:00.000Z","lang":"en","value":"Initial Publication."},{"time":"2025-02-21T17:10:00.000Z","lang":"en","value":"Updated fix availability for PAN-OS 11.1 and 11.2."},{"time":"2025-02-24T22:30:00.000Z","lang":"en","value":"Clarified recommended remediations and added a FAQ."},{"time":"2025-02-26T19:15:00.000Z","lang":"en","value":"Added remediation guidance in the FAQ."},{"time":"2025-03-06T23:00:00.000Z","lang":"en","value":"Updated to explicitly state that end-of-life (EoL) versions are presumed to be affected"}],"credits":[{"lang":"en","value":"Émilio Gonzalez","type":"finder"},{"lang":"en","value":"Maxime Gaudreault","type":"finder"},{"lang":"en","value":"our Deep Product Security Research Team","type":"finder"}],"source":{"defect":["PAN-273994"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.4-h3","PAN-OS 11.2.4-h2","PAN-OS 11.2.4-h1","PAN-OS 11.2.4","PAN-OS 11.2.3-h5","PAN-OS 11.2.3-h4","PAN-OS 11.2.3-h3","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.6","PAN-OS 11.1.5-h1","PAN-OS 11.1.5","PAN-OS 11.1.4-h12","PAN-OS 11.1.4-h11","PAN-OS 11.1.4-h10","PAN-OS 11.1.4-h9","PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.13-h2","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h5","PAN-OS 10.2.12-h4","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h11","PAN-OS 10.2.11-h10","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h13","PAN-OS 10.2.10-h12","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h20","PAN-OS 10.2.9-h19","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h20","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.14-h8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"PAN-SA-2025-0001","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"Expedition: Multiple Vulnerabilities in Expedition Migration Tool Lead to Exposure of Firewall Credentials","datePublic":"2025-01-08T17:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-89","description":"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","type":"CWE"}]},{"descriptions":[{"lang":"en","cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]},{"descriptions":[{"lang":"en","cweId":"CWE-73","description":"CWE-73 External Control of File Name or Path","type":"CWE"}]},{"descriptions":[{"lang":"en","cweId":"CWE-155","description":"CWE-155 Improper Neutralization of Wildcards or Matching Symbols","type":"CWE"}]},{"descriptions":[{"lang":"en","cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-66","descriptions":[{"lang":"en","value":"CAPEC-66 SQL Injection"}]},{"capecId":"CAPEC-63","descriptions":[{"lang":"en","value":"CAPEC-63 Cross-Site Scripting (XSS)"}]},{"capecId":"CAPEC-165","descriptions":[{"lang":"en","value":"CAPEC-165 File Manipulation"}]},{"capecId":"CAPEC-127","descriptions":[{"lang":"en","value":"CAPEC-127 Directory Indexing"}]},{"capecId":"CAPEC-88","descriptions":[{"lang":"en","value":"CAPEC-88 OS Command Injection"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Expedition","versions":[{"status":"affected","version":"1","lessThan":"1.2.101","changes":[{"at":"1.2.101","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Panorama","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database contents and arbitrary files, as well as create and delete arbitrary files on the Expedition system. These files include information such as usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software.\n\n\nExpedition, previously known as the Migration Tool, is a free tool that facilitates migration to the Palo Alto Networks NGFW platform from other firewall vendors and provides a temporary workspace for optimizing Palo Alto Networks security policies. Expedition is designed to only be used temporarily for migration purposes, not to be run in production. You do not need it to operate any Palo Alto Networks products or services. Expedition reached its End of Life (EoL) date on December 31, 2024. Please use the suggested alternatives listed in the Expedition End of Life Announcement (https://live.paloaltonetworks.com/t5/expedition-articles/important-update-end-of-life-announcement-for-palo-alto-networks/ta-p/589642).\n\nThese issues do not otherwise impact firewalls, Panorama appliances, Prisma Access deployments, or Cloud NGFWs.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database contents and arbitrary files, as well as create and delete arbitrary files on the Expedition system. These files include information such as usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software.</span><span><br></span></p><b></b><p><span>Expedition, previously known as the Migration Tool, is a free tool that facilitates migration to the Palo Alto Networks NGFW platform from other firewall vendors and provides a temporary workspace for optimizing Palo Alto Networks security policies. Expedition is designed to only be used temporarily for migration purposes, not to be run in production. You do not need it to operate any Palo Alto Networks products or services. Expedition reached its End of Life (EoL) date on December 31, 2024. Please use the suggested alternatives listed in </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/expedition-articles/important-update-end-of-life-announcement-for-palo-alto-networks/ta-p/589642\"><span>the Expedition End of Life Announcement</span></a><span>.</span></p><p><span>These issues do not otherwise impact firewalls, Panorama appliances, Prisma Access deployments, or Cloud NGFWs.</span></p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/PAN-SA-2025-0001","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"CVE-2025-0103"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"HIGH","vulnIntegrityImpact":"LOW","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"HIGH","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"CRITICAL","baseScore":9.2,"threatSeverity":"HIGH","threatScore":7.8,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:H/U:Amber"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"CVE-2025-0104"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"ACTIVE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"HIGH","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":7,"threatSeverity":"MEDIUM","threatScore":4.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:H/U:Amber"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"CVE-2025-0105"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"HIGH","providerUrgency":"GREEN","exploitMaturity":"UNREPORTED","baseSeverity":"MEDIUM","baseScore":6.9,"threatSeverity":"LOW","threatScore":2.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:H/U:Green"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"CVE-2025-0106"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"HIGH","providerUrgency":"GREEN","exploitMaturity":"UNREPORTED","baseSeverity":"MEDIUM","baseScore":6.9,"threatSeverity":"LOW","threatScore":2.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:H/U:Green"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"CVE-2025-0107"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","subConfidentialityImpact":"HIGH","vulnIntegrityImpact":"LOW","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"LOW","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"HIGH","providerUrgency":"GREEN","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":7.7,"threatSeverity":"MEDIUM","threatScore":4.4,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:H/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:H/U:Green"}}],"configurations":[{"lang":"en","value":"No special configuration is required to be affected by these issues.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<span>No special configuration is required to be affected by these issues.</span>"}]}],"workarounds":[{"lang":"en","value":"Ensure that all network access to Expedition is restricted to only authorized users, hosts, and networks. If you are not actively using Expedition, make sure that your Expedition software is shut down.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>Ensure that all network access to Expedition is restricted to only authorized users, hosts, and networks. If you are not actively using Expedition, make sure that your Expedition software is shut down.</span></p>"}]}],"solutions":[{"lang":"eng","value":"The following CVEs are fixed in the specified Expedition version and all later versions* of Expedition.\n\n\nCVE              EXPEDITION\nCVE-2025-0103    Expedition 1.2.100\nCVE-2025-0104    Expedition 1.2.100\nCVE-2025-0105    Expedition 1.2.101\nCVE-2025-0106    Expedition 1.2.101\nCVE-2025-0107    Expedition 1.2.100\n\n* Expedition reached its End of Life (EoL) date (https://live.paloaltonetworks.com/t5/expedition-articles/important-update-end-of-life-announcement-for-palo-alto-networks/ta-p/589642) and is no longer supported. We added these fixes prior to the EoL date and we do not plan to make any additional updates or security fixes. Please use the suggested alternatives listed in the Expedition End of Life Announcement (https://live.paloaltonetworks.com/t5/expedition-articles/important-update-end-of-life-announcement-for-palo-alto-networks/ta-p/589642).\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>The following CVEs are fixed in the specified Expedition version and all later versions* of Expedition.<br></p><table class=\"tbl\"><thead><tr><th>CVE</th><th>Expedition</th></tr></thead><tbody><tr><td>CVE-2025-0103&nbsp;</td><td>Expedition 1.2.100</td></tr><tr><td>CVE-2025-0104<br></td><td>Expedition 1.2.100<br></td></tr><tr><td>CVE-2025-0105<br></td><td>Expedition 1.2.101<br></td></tr><tr><td>CVE-2025-0106<br></td><td>Expedition 1.2.101<br></td></tr><tr><td>CVE-2025-0107<br></td><td>Expedition 1.2.100<br></td></tr></tbody></table><p>* Expedition <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/expedition-articles/important-update-end-of-life-announcement-for-palo-alto-networks/ta-p/589642\">reached its End of Life (EoL) date</a> and is no longer supported. We added these fixes prior to the EoL date and we do not plan to make any additional updates or security fixes. Please use the suggested alternatives listed in <a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/expedition-articles/important-update-end-of-life-announcement-for-palo-alto-networks/ta-p/589642\">the Expedition End of Life Announcement</a>.<br></p>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of these issues.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<span>Palo Alto Networks is not aware of any malicious exploitation of these issues.</span>"}]}],"timeline":[{"time":"2025-01-15T00:30:00.000Z","lang":"en","value":"Updated CVSS Score for CVE-2025-0107"},{"time":"2025-01-08T17:00:00.000Z","lang":"en","value":"Initial publication"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks an independent security researcher working with SSD Secure Disclosure for discovering and reporting CVE-2025-0107.","type":"finder"},{"lang":"en","value":"Palo Alto Networks thanks Mesut Cetin of RedTeamer IT Security for discovering and reporting CVE-2025-0103 and CVE-2025-0104.","type":"finder"},{"lang":"en","value":"Palo Alto Networks thanks Advanced Research Team, CrowdStrike for discovering and reporting CVE-2025-0104, CVE-2025-0105, CVE-2025-0106, and CVE-2025-0107.","type":"finder"}],"source":{"discovery":"EXTERNAL"},"tags":["unsupported-when-assigned"],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2024-3393","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Firewall Denial of Service (DoS) in DNS Security Using a Specially Crafted Packet","datePublic":"2024-12-27T02:30:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-754","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-540","descriptions":[{"lang":"en","value":"CAPEC-540 Overread Buffers"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"11.2.0","lessThan":"11.2.3","changes":[{"at":"11.2.3","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.5","changes":[{"at":"11.1.5","status":"unaffected"},{"at":"11.1.4-h7","status":"unaffected"},{"at":"11.1.2-h16","status":"unaffected"},{"at":"11.1.3-h13","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"10.2.0","lessThan":"10.2.8","changes":[{"at":"10.2.8","status":"affected"},{"at":"10.2.14","status":"unaffected"},{"at":"10.2.8-h19","status":"unaffected"},{"at":"10.2.9-h19","status":"unaffected"},{"at":"10.2.10-h12","status":"unaffected"},{"at":"10.2.11-h10","status":"unaffected"},{"at":"10.2.12-h4","status":"unaffected"},{"at":"10.2.13-h2","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"10.1.0","lessThan":"10.1.14","changes":[{"at":"10.1.14","status":"affected"},{"at":"10.1.15","status":"unaffected"},{"at":"10.1.14-h8","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"10.0.0","versionType":"custom"},{"status":"unaffected","version":"9.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","platforms":["Prisma Access"],"versions":[{"status":"unaffected","version":"10.2.0","lessThan":"10.2.8","changes":[{"at":"10.2.8","status":"affected"},{"at":"10.2.9-h19","status":"unaffected"},{"at":"10.2.10-h12","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.0","lessThan":"11.2.3","changes":[{"at":"11.2.3","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","platforms":["Panorama"],"versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.\n\nThis issue is applicable to the PAN-OS software versions listed below on PA-Series firewalls, VM-Series firewalls, CN-Series firewalls, and Prisma Access.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p><span>A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.</span></p><p><span>This issue is applicable to the PAN-OS software versions listed below on PA-Series firewalls, VM-Series firewalls, CN-Series firewalls, and Prisma Access.</span></p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-3393","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"An attacker sends a malicious packet through the firewall, which processes a malicious packet that triggers this issue."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"LOW","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"ATTACKED","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"HIGH","threatScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:A/AU:N/R:U/V:C/RE:M/U:Amber"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"Prisma Access, when only providing access to authenticated end users, processes a malicious packet that triggers this issue."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"LOW","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"ATTACKED","baseSeverity":"HIGH","baseScore":7.1,"threatSeverity":"HIGH","threatScore":7.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:A/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"This issue does not affect Cloud NGFW, Panorama M-Series, or Panorama virtual appliances.\n\nBoth of the following must be true for PAN-OS software to be affected:\n\n 1. Either a DNS Security License or an Advanced DNS Security License must be applied, AND\n 2. DNS Security logging must be enabled.\n\nYou can check for existing DNS Security Configuration in your firewalls using the PAN-OS CLI:\n\n> show config merged | match log-level\n\n * Look for entries with the string 'log-level':\n   \n    * If no entries are found (output is empty) or all entries show 'log-level none;', your configuration is not vulnerable, and no workaround is needed.\n    * If any entries show values other than 'log-level none;', your configuration is vulnerable. You should either upgrade PAN-OS or follow the steps in the workaround section.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue does not affect Cloud NGFW, Panorama M-Series, or Panorama virtual appliances.<br><br>Both of the following must be true for PAN-OS software to be affected:<br><ol><li>Either a DNS Security License or an Advanced DNS Security License must be applied, AND</li><li>DNS Security logging must be enabled.</li></ol>You can check for existing DNS Security Configuration in your firewalls using the PAN-OS CLI:<br><br>&gt; show config merged | match log-level<br><ul><li>Look for entries with the string 'log-level':<br></li><ul><li>If no entries are found (output is empty) or all entries show 'log-level none;', your configuration is not vulnerable, and no workaround is needed.</li><li>If any entries show values other than 'log-level none;', your configuration is vulnerable. You should either upgrade PAN-OS or follow the steps in the workaround section.</li></ul></ul>"}]}],"workarounds":[{"lang":"en","value":"If your firewall running the vulnerable PAN-OS versions stops responding or reboots unexpectedly and you cannot immediately apply a fix, apply a workaround below based on your deployment.\n\nUnmanaged NGFWs, NGFW managed by Panorama, or Prisma Access managed by Panorama\n\n 1. Ensure that a DNS Security Configuration is already present in the device's configuration. See the \"Required Configuration for Exposure\" section for details.\n 2. Within Objects → Security Profiles (https://docs.paloaltonetworks.com/pan-os/11-2/pan-os-web-interface-help/objects/objects-security-profiles-anti-spyware-profile), determine if you use the predefined Anti-Spyware profiles (https://docs.paloaltonetworks.com/network-security/security-policy/administration/security-profiles/security-profile-anti-spyware) in your Security Policy. These are named \"Default\" or \"Strict\" (https://docs.paloaltonetworks.com/network-security/security-policy/administration/security-profiles/security-profile-anti-spyware). If you are using the predefined security profiles, clone the predefined Anti-Spyware profile (https://docs.paloaltonetworks.com/pan-os/11-2/pan-os-web-interface-help/objects/move-clone-override-or-revert-objects/move-or-clone-an-object) for use as a custom Anti-Spyware profile. After cloning each relevant predefined Anti-Spyware profile, replace them with the cloned custom Anti-Spyware profile or group in your Security Rules (Policies → Security → (security rule) in either Actions → Profiles or Actions → Group (https://docs.paloaltonetworks.com/network-security/security-policy/administration/security-rules/create-a-security-policy-rule#create-a-security-policy-rule-panorama)).\n    \n 3. For each custom Anti-Spyware profile, navigate to Objects → Security Profiles → Anti-Spyware → (select a custom profile) → DNS Policies → DNS Security.\n 4. Change the Log Severity to \"none\" for all configured DNS Security categories.\n    \n    \n    \n 5. Commit the changes.\n\nNote 1: Setting Log Severity to 'none' for devices that didn't have a DNS Security configuration may block DNS traffic that wasn’t previously blocked. Additionally, this may happen without generating any log entries, making it difficult to detect the blocked traffic. Review the Required Configuration for Exposure section for instructions on identifying existing DNS Security Configuration.\n\nNote 2: Remember to revert the Log Severity settings once the fixes are applied.\n\nNGFW managed by Strata Cloud Manager (SCM)\n\n\nYou can choose one of the following mitigation options:\n 1. Option 1: Disable DNS Security logging directly on each NGFW by following the PAN-OS steps above.\n 2. Option 2: Disable DNS Security logging across all NGFWs in your tenant by opening a support case (https://support.paloaltonetworks.com/Support/Index).\n\nPrisma Access managed by Strata Cloud Manager (SCM)\n\nUntil we perform an upgrade of your Prisma Access tenant, you can disable DNS Security logging across all NGFWs in your tenant by opening a support case (https://support.paloaltonetworks.com/Support/Index). If you would like to expedite the upgrade, please make a note of that in the support case.","supportingMedia":[{"type":"text/html","base64":false,"value":"If your firewall running the vulnerable PAN-OS versions stops responding or reboots unexpectedly and you cannot immediately apply a fix, apply a workaround below based on your deployment.<br><br><b>Unmanaged NGFWs, NGFW managed by Panorama, or Prisma Access managed by Panorama</b><b><br></b><ol><li>Ensure that a DNS Security Configuration is already present in the device's configuration. See the \"Required Configuration for Exposure\" section for details.</li><li>Within <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/pan-os/11-2/pan-os-web-interface-help/objects/objects-security-profiles-anti-spyware-profile\">Objects → Security Profiles</a>, determine if you use the predefined <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/network-security/security-policy/administration/security-profiles/security-profile-anti-spyware\">Anti-Spyware profiles</a> in your Security Policy. <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/network-security/security-policy/administration/security-profiles/security-profile-anti-spyware\">These are named \"Default\" or \"Strict\"</a>. If you are using the predefined security profiles, <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/pan-os/11-2/pan-os-web-interface-help/objects/move-clone-override-or-revert-objects/move-or-clone-an-object\">clone the predefined Anti-Spyware profile</a> for use as a custom Anti-Spyware profile. After cloning each relevant predefined Anti-Spyware profile, replace them with the cloned custom Anti-Spyware profile or group in your Security Rules (<a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/network-security/security-policy/administration/security-rules/create-a-security-policy-rule#create-a-security-policy-rule-panorama\">Policies → Security → (security rule) in either Actions → Profiles or Actions → Group</a>).<br></li><li>For each custom Anti-Spyware profile, navigate to Objects → Security Profiles → Anti-Spyware → (select a custom profile) → DNS Policies → DNS Security.</li><li>Change the Log Severity to \"none\" for all configured DNS Security categories.<br><img alt=\"\" src=\"data:image/png;base64,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\"><br><img alt=\"\" src=\"data:image/png;base64,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\"><br></li><li><span>Commit the changes.</span></li></ol>Note 1:&nbsp;Setting Log Severity to 'none' for devices that didn't have a DNS Security configuration may block DNS traffic that wasn’t previously blocked.&nbsp;Additionally, this may happen without generating any log entries, making it difficult to detect the blocked traffic. Review the Required Configuration for Exposure section for instructions on identifying existing DNS Security Configuration.<br><br>Note 2: Remember to revert the Log Severity settings once the fixes are applied.<br><br><b>NGFW managed by Strata Cloud Manager (SCM)</b><br><br><div><div>You can choose one of the following mitigation options:</div><div><ol><li>Option 1: Disable DNS Security logging directly on each NGFW by following the PAN-OS steps above.</li><li>Option 2: Disable DNS Security logging across all NGFWs in your tenant by opening a <a target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/Support/Index\">support case</a>.</li></ol></div><b><p>Prisma Access managed by Strata Cloud Manager (SCM)</p></b></div><p>Until we perform an upgrade of your Prisma Access tenant, you can disable DNS Security logging across all NGFWs in your tenant by opening a <a target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/Support/Index\">support case</a>. If you would like to expedite the upgrade, please make a note of that in the support case.</p><b></b>"}]}],"solutions":[{"lang":"eng","value":"This issue is fixed in PAN-OS 10.1.15, PAN-OS 10.2.14, PAN-OS 11.1.5, PAN-OS 11.2.3, and all later PAN-OS versions.\n\nNote: PAN-OS 11.0 reached the end of life (EOL) on November 17, 2024, so we do not intend to provide a fix for this release.\n\nPrisma Access customers using DNS Security with affected PAN-OS versions should apply one of the workarounds provided below. We will perform upgrades in two phases for impacted customers on the weekends of January 3rd and January 10th. You can request an expedited Prisma Access upgrade to the latest PAN-OS version by opening a support case (https://support.paloaltonetworks.com/Support/Index).\n\nIn addition, to provide the most seamless upgrade path for our customers, we are making fixes available for other TAC-preferred and commonly deployed maintenance releases.\n\nAdditional PAN-OS 11.1 releases with the fix:\n\n * 11.1.2-h16 (available)\n * 11.1.3-h13 (available)\n * 11.1.4-h7 (available)\n * 11.1.5 (available)\n\nAdditional PAN-OS 10.2 releases with the fix:\n * 10.2.8-h19 (available)\n * 10.2.9-h19 (available)\n * 10.2.10-h12 (available)\n * 10.2.11-h10 (available)\n * 10.2.12-h4 (available)\n * 10.2.13-h2 (available)\n * 10.2.14 (ETA: early March)\n\nAdditional PAN-OS 10.1 releases with the fix:\n * 10.1.14-h8 (available)\n * 10.1.15 (ETA: end of February)\n\nAdditional PAN-OS releases with the fix only applicable to Prisma Access:\n * 10.2.9-h19 (available)\n * 10.2.10-h12 (available)","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>This issue is fixed in PAN-OS 10.1.15, PAN-OS 10.2.14, PAN-OS 11.1.5, PAN-OS 11.2.3, and all later PAN-OS versions.</p><p>Note: PAN-OS 11.0 reached the end of life (EOL) on November 17, 2024, so we do not intend to provide a fix for this release.</p><p>Prisma Access customers using DNS Security with affected PAN-OS versions should apply one of the workarounds provided below. We will perform upgrades in two phases for impacted customers on the weekends of January 3rd and January 10th. You can request an expedited Prisma Access upgrade to the latest PAN-OS version by opening a <a target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/Support/Index\">support case</a>.</p><p>In addition, to provide the most seamless upgrade path for our customers, we are making fixes available for other TAC-preferred and commonly deployed maintenance releases.</p><p>​​Additional PAN-OS 11.1 releases with the fix:</p><div><ul><li>11.1.2-h16&nbsp;(available)</li><li>11.1.3-h13&nbsp;(available)</li><li>11.1.4-h7&nbsp;(available)</li><li>11.1.5&nbsp;(available)</li></ul></div><div>Additional PAN-OS 10.2 releases with the fix:</div><div><ul><li>10.2.8-h19&nbsp;(available)</li><li>10.2.9-h19&nbsp;(available)</li><li>10.2.10-h12&nbsp;(available)</li><li>10.2.11-h10&nbsp;(available)</li><li>10.2.12-h4&nbsp;(available)</li><li>10.2.13-h2&nbsp;(available)</li><li>10.2.14&nbsp;(ETA: early March)</li></ul></div><div>Additional PAN-OS 10.1 releases with the fix:</div><div><ul><li>10.1.14-h8&nbsp;(available)</li><li>10.1.15&nbsp;(ETA: end of February)</li></ul></div><div>Additional PAN-OS releases with the fix only applicable to Prisma Access:</div><div><ul><li>10.2.9-h19&nbsp;(available)</li><li>10.2.10-h12&nbsp;(available)</li></ul></div>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is aware of customers experiencing this denial of service (DoS) when their firewall blocks malicious DNS packets that trigger this issue.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<span>Palo Alto Networks is aware of customers experiencing this denial of service (DoS) when their firewall blocks malicious DNS packets that trigger this issue.</span>"}]}],"timeline":[{"time":"2025-01-30T00:00:00.000Z","lang":"en","value":"Corrected the 11.1.4 fix version to 11.1.4-h7 in the Product Status table"},{"time":"2025-01-17T23:45:00.000Z","lang":"en","value":"Updated Required Configuration section to clarify how to verify if DNS Security is enabled."},{"time":"2024-12-30T19:15:00.000Z","lang":"en","value":"Clarified affected products and platforms, and updated Workarounds and Mitigations"},{"time":"2024-12-27T18:40:00.000Z","lang":"en","value":"Simplified Product Status table, Required Configuration, and added ETAs to Solution"},{"time":"2024-12-27T02:30:00.000Z","lang":"en","value":"Initial publication"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks the CERT-EE team for their extra effort in providing invaluable forensic and analytic assistance.","type":"reporter"}],"source":{"defect":["PAN-259351","PAN-219034"],"discovery":"USER"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.13-h1","PAN-OS 10.2.13","PAN-OS 10.2.12-h3","PAN-OS 10.2.12-h2","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h9","PAN-OS 10.2.11-h8","PAN-OS 10.2.11-h7","PAN-OS 10.2.11-h6","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h11","PAN-OS 10.2.10-h10","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h18","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.1.14-h7","PAN-OS 10.1.14-h6","PAN-OS 10.1.14-h5","PAN-OS 10.1.14-h4","PAN-OS 10.1.14-h3","PAN-OS 10.1.14-h2","PAN-OS 10.1.14-h1","PAN-OS 10.1.14"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2024-0012","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015)","datePublic":"2024-11-18T14:20:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-306","description":"CWE-306 Missing Authentication for Critical Function","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-115","descriptions":[{"lang":"en","value":"CAPEC-115 Authentication Bypass"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.6:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h31:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h30:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h29:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h28:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h27:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h26:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h25:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h24:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h23:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h22:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h21:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:-:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"11.2.0","lessThan":"11.2.4-h1","changes":[{"at":"11.2.4-h1","status":"unaffected"},{"at":"11.2.1-h1","status":"unaffected"},{"at":"11.2.2-h2","status":"unaffected"},{"at":"11.2.3-h3","status":"unaffected"},{"at":"11.2.0-h1","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.5-h1","changes":[{"at":"11.1.5-h1","status":"unaffected"},{"at":"11.1.0-h4","status":"unaffected"},{"at":"11.1.1-h2","status":"unaffected"},{"at":"11.1.2-h15","status":"unaffected"},{"at":"11.1.3-h11","status":"unaffected"},{"at":"11.1.4-h7","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.6-h1","changes":[{"at":"11.0.6-h1","status":"unaffected"},{"at":"11.0.0-h4","status":"unaffected"},{"at":" 11.0.1-h5","status":"unaffected"},{"at":"11.0.2-h5","status":"unaffected"},{"at":"11.0.3-h13","status":"unaffected"},{"at":"11.0.4-h6","status":"unaffected"},{"at":" 11.0.5-h2","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.12-h2","changes":[{"at":"10.2.0-h4","status":"unaffected"},{"at":"10.2.1-h3","status":"unaffected"},{"at":" 10.2.2-h6","status":"unaffected"},{"at":"10.2.3-h14","status":"unaffected"},{"at":"10.2.4-h32","status":"unaffected"},{"at":"10.2.5-h9","status":"unaffected"},{"at":"10.2.6-h6","status":"unaffected"},{"at":"10.2.7-h18","status":"unaffected"},{"at":"10.2.8-h15","status":"unaffected"},{"at":"10.2.9-h16","status":"unaffected"},{"at":" 10.2.10-h9","status":"unaffected"},{"at":"10.2.11-h6","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"10.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 (https://security.paloaltonetworks.com/CVE-2024-9474).\n\nThe risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431).\n\nThis issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software on PA-Series, VM-Series, and CN-Series firewalls and on Panorama (virtual and M-Series).\n\n\nCloud NGFW and Prisma Access are not impacted by this vulnerability.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like <a target=\"_blank\" rel=\"nofollow\" href=\"https://security.paloaltonetworks.com/CVE-2024-9474\">CVE-2024-9474</a>.</p><p>The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">best practice deployment guidelines</a>.</p><p>This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, PAN-OS 11.1, and PAN-OS 11.2 software on PA-Series, VM-Series, and CN-Series firewalls and on Panorama (virtual and M-Series).<br></p><p>Cloud NGFW and Prisma Access are not impacted by this vulnerability.</p>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-0012","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"The risk is highest when you allow access to the management interface from external IP addresses on the internet."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"LOW","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"HIGH","providerUrgency":"RED","exploitMaturity":"ATTACKED","baseSeverity":"CRITICAL","baseScore":9.3,"threatSeverity":"CRITICAL","threatScore":9.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:A/AU:N/R:U/V:C/RE:H/U:Red"}},{"format":"CVSS","scenarios":[{"lang":"en","value":"If you configure restricted access to a jump box that is the only system allowed to access the management interface, you greatly reduce the risk of exploitation because attacks would require privileged access using only those IP addresses."}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"HIGH","providerUrgency":"RED","exploitMaturity":"ATTACKED","baseSeverity":"MEDIUM","baseScore":5.9,"threatSeverity":"MEDIUM","threatScore":5.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:A/AU:N/R:U/V:C/RE:H/U:Red"}}],"configurations":[{"lang":"en","value":"The risk is greatest if you configure the management interface to enable access from the internet or any untrusted network either:\n\n 1. Directly\n    or\n 2. Through a dataplane interface that includes a management interface profile.\n\nThe risk is greatly reduced if you make sure that only trusted internal IP addresses are allowed to access the management interface.\n\nUse the following steps to identify your recently detected devices in our Internet scans:\n\n 1. To find your known assets that require remediation action, visit the Assets section of Customer Support Portal at https://support.paloaltonetworks.com (https://support.paloaltonetworks.com/) (Products → Assets → All Assets → Remediation Required).\n 2. The list of your known devices with an internet-facing management interface discovered in our scans are tagged with PAN-SA-2024-0015 with a last seen timestamp in UTC. If no such devices are listed, it indicates our scan did not find any devices with internet-facing management interface for your account in the last three days.\n\nGlobalProtect Portals and Gateways are not vulnerable to this issue. However, if a management profile is configured on interfaces with GlobalProtect portals or gateways, then it exposes the device to attacks via the management web interface (typically accessible on port 4443) in such cases.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>The risk is greatest if you configure the management interface to enable access from the internet or any untrusted network either:</p><ol><li>Directly<br>or</li><li>Through a dataplane interface that includes a management interface profile.</li></ol><p>The risk is greatly reduced if you make sure that only trusted internal IP addresses are allowed to access the management interface.</p><p>Use the following steps to identify your recently detected devices in our Internet scans:</p><ol><li>To find your known assets that require remediation action, visit the Assets section of Customer Support Portal at&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/\">https://support.paloaltonetworks.com</a>&nbsp;(Products → Assets → All Assets → Remediation Required).</li><li>The list of your known devices with an internet-facing management interface discovered in our scans are tagged with PAN-SA-2024-0015 with a last seen timestamp in UTC. If no such devices are listed, it indicates our scan did not find any devices with internet-facing management interface for your account in the last three days.</li></ol>GlobalProtect Portals and Gateways are not vulnerable to this issue. However, if a management profile is configured on interfaces with GlobalProtect portals or gateways, then it exposes the device to attacks via the management web interface (typically accessible on port 4443) in such cases.<br>"}]}],"workarounds":[{"lang":"en","value":"Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you haven’t already, we strongly recommend that you secure access to your management interface according to our best practice deployment guidelines. Specifically, you should restrict access to the management interface to only trusted internal IP addresses to prevent external access from the internet.\n\nAdditionally, if you have a Threat Prevention subscription, you can block these attacks using Threat IDs 95746, 95747, 95752, 95753, 95759, and 95763 (available in Applications and Threats content version 8915-9075 and later). For these Threat IDs to protect against attacks for this vulnerability,\n\n * Ensure that all the listed Threat IDs are set to block mode,\n * Route incoming traffic for the MGT port through a DP port (https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#id59206398-3dab-4b2f-9b4b-7ea500d036ba), e.g., enabling management profile on a DP interface for management access,\n * Replace the Certificate for Inbound Traffic Management (https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#id112f7714-8995-4496-bbf9-781e63dec71c),\n * Decrypt inbound traffic to the management interface so the firewall can inspect it (https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#idbbd82587-17a2-42b4-9245-d3714e1e13a2), and\n * Enable threat prevention on the inbound traffic to management services.\n\nReview information about how to secure management access to your Palo Alto Networks firewalls:\n\n * Palo Alto Networks LIVEcommunity article: https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\n * Palo Alto Networks official and more detailed technical documentation: https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you haven’t already, we strongly recommend that you secure access to your management interface according to our best practice deployment guidelines. Specifically, you should restrict access to the management interface to only trusted internal IP addresses to prevent external access from the internet.</p><p>Additionally, if you have a Threat Prevention subscription, you can block these attacks using Threat IDs 95746, 95747, 95752, 95753, 95759, and 95763 (available in Applications and Threats content version 8915-9075 and later). For these Threat IDs to protect against attacks for this vulnerability,</p><ul><li>Ensure that all the listed Threat IDs are set to block mode,</li><li><a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#id59206398-3dab-4b2f-9b4b-7ea500d036ba\">Route incoming traffic for the MGT port through a DP port</a>, e.g., enabling management profile on a DP interface for management access,</li><li><a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#id112f7714-8995-4496-bbf9-781e63dec71c\">Replace the Certificate for Inbound Traffic Management</a>,</li><li><a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices#idbbd82587-17a2-42b4-9245-d3714e1e13a2\">Decrypt inbound traffic to the management interface so the firewall can inspect it</a>, and</li><li>Enable threat prevention on the inbound traffic to management services.</li></ul>Review information about how to secure management access to your Palo Alto Networks firewalls:<br><ul><li>Palo Alto Networks LIVEcommunity article:&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\">https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431</a></li><li>Palo Alto Networks official and more detailed technical documentation:&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\">https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices</a></li></ul>"}]}],"solutions":[{"lang":"eng","value":"We strongly recommend that you secure access to your management interface following the instructions in the workarounds section below.\n\nThis issue is fixed in PAN-OS 10.2.12-h2, PAN-OS 11.0.6-h1, PAN-OS 11.1.5-h1, PAN-OS 11.2.4-h1, and all later PAN-OS versions.\n\nIn addition, in an attempt to provide the most seamless upgrade path for our customers, we are making fixes available for other TAC-preferred and commonly deployed maintenance releases.\n\n * Additional PAN-OS 11.2 fixes:\n   * 11.2.0-h1\n   * 11.2.1-h1\n   * 11.2.2-h2\n   * 11.2.3-h3\n   * 11.2.4-h1\n * Additional PAN-OS 11.1 fixes:\n   * 11.1.0-h4\n   * 11.1.1-h2\n   * 11.1.2-h15\n   * 11.1.3-h11\n   * 11.1.4-h7\n   * 11.1.5-h1\n * Additional PAN-OS 11.0 fixes:\n   * 11.0.0-h4\n   * 11.0.1-h5\n   * 11.0.2-h5\n   * 11.0.3-h13\n   * 11.0.4-h6\n   * 11.0.5-h2\n   * 11.0.6-h1\n * Additional PAN-OS 10.2 fixes:\n   * 10.2.0-h4\n   * 10.2.1-h3\n   * 10.2.2-h6\n   * 10.2.3-h14\n   * 10.2.4-h32\n   * 10.2.5-h9\n   * 10.2.6-h6\n   * 10.2.7-h18\n   * 10.2.8-h15\n   * 10.2.9-h16\n   * 10.2.10-h9\n   * 10.2.11-h6\n   * 10.2.12-h2","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>We strongly recommend that you secure access to your management interface following the instructions in the workarounds section below.</p><p>This issue is fixed in PAN-OS 10.2.12-h2, PAN-OS 11.0.6-h1, PAN-OS 11.1.5-h1, PAN-OS 11.2.4-h1, and all later PAN-OS versions.</p><p>In addition, in an attempt to provide the most seamless upgrade path for our customers, we are making fixes available for other TAC-preferred and commonly deployed maintenance releases.</p><div><div><ul><li>Additional PAN-OS 11.2 fixes:<ul><li>​​11.2.0-h1</li><li>11.2.1-h1</li><li>11.2.2-h2</li><li>11.2.3-h3</li><li>11.2.4-h1</li></ul></li><li>Additional PAN-OS 11.1 fixes:<ul><li>11.1.0-h4</li><li>11.1.1-h2</li><li>11.1.2-h15</li><li>11.1.3-h11</li><li>11.1.4-h7</li><li>11.1.5-h1</li></ul></li><li>Additional PAN-OS 11.0 fixes:<ul><li>11.0.0-h4</li><li>11.0.1-h5</li><li>11.0.2-h5</li><li>11.0.3-h13</li><li>11.0.4-h6</li><li>11.0.5-h2</li><li>11.0.6-h1</li></ul></li><li>Additional PAN-OS 10.2 fixes:<ul><li>10.2.0-h4</li><li>10.2.1-h3</li><li>10.2.2-h6</li><li>10.2.3-h14</li><li>10.2.4-h32</li><li>10.2.5-h9</li><li>10.2.6-h6</li><li>10.2.7-h18</li><li>10.2.8-h15</li><li>10.2.9-h16</li><li>10.2.10-h9</li><li>10.2.11-h6</li><li>10.2.12-h2</li></ul></li></ul></div></div>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is aware of an increasing number of attacks that leverage the exploitation of this vulnerability. Proof of concepts for this vulnerability have been publicly disclosed by third parties.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is aware of an increasing number of attacks that leverage the exploitation of this vulnerability. Proof of concepts for this vulnerability have been publicly disclosed by third parties.<br>"}]}],"timeline":[{"time":"2025-03-03T20:00:00.000Z","lang":"en","value":"Updated the product status table"},{"time":"2024-11-23T23:30:00.000Z","lang":"en","value":"Clarified no impact to GlobalProtect portals or gateways"},{"time":"2024-11-20T00:00:00.000Z","lang":"en","value":"Clarified applicability to PA-Series, VM-Series, and CN-Series firewalls and Panorama (virtual and M-Series)"},{"time":"2024-11-18T14:20:00.000Z","lang":"en","value":"CVE-2024-0012 assigned to this publication as the vulnerability is identified and fixed"},{"time":"2024-11-15T22:00:00.000Z","lang":"en","value":"Answered a FAQ about indicators of compromise"},{"time":"2024-11-14T22:18:00.000Z","lang":"en","value":"Raised the severity of PAN-SA-2024-0015 bulletin as we have observed threat activity"},{"time":"2024-11-11T01:03:00.000Z","lang":"en","value":"Added instructions to find your devices with an internet-facing management interface discovered in our scans"},{"time":"2024-11-08T13:00:00.000Z","lang":"en","value":"Initially published as PAN-SA-2024-0015"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks our Deep Product Security Research Team for discovering this issue internally from threat activity.","type":"finder"}],"source":{"advisory":"PAN-SA-2024-0015","discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.4","PAN-OS 11.2.3-h2","PAN-OS 11.2.3-h1","PAN-OS 11.2.3","PAN-OS 11.2.2-h1","PAN-OS 11.2.1","PAN-OS 11.2.0","PAN-OS 11.1.5","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 11.0.6","PAN-OS 11.0.5-h1","PAN-OS 11.0.5","PAN-OS 11.0.4-h5","PAN-OS 11.0.4-h4","PAN-OS 11.0.4-h3","PAN-OS 11.0.4-h2","PAN-OS 11.0.4-h1","PAN-OS 11.0.4","PAN-OS 11.0.3-h12","PAN-OS 11.0.3-h11","PAN-OS 11.0.3-h10","PAN-OS 11.0.3-h9","PAN-OS 11.0.3-h8","PAN-OS 11.0.3-h7","PAN-OS 11.0.3-h6","PAN-OS 11.0.3-h5","PAN-OS 11.0.3-h4","PAN-OS 11.0.3-h3","PAN-OS 11.0.3-h2","PAN-OS 11.0.3-h1","PAN-OS 11.0.3","PAN-OS 11.0.2-h4","PAN-OS 11.0.2-h3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.12-h1","PAN-OS 10.2.12","PAN-OS 10.2.11-h5","PAN-OS 10.2.11-h4","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2024-2551","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Firewall Denial of Service (DoS) Using a Specially Crafted Packet","datePublic":"2024-11-13T18:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-476","description":"CWE-476 NULL Pointer Dereference","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-129","descriptions":[{"lang":"en","value":"CAPEC-129 Pointer Manipulation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*"],"versions":[{"status":"unaffected","version":"11.2.0","versionType":"custom"},{"status":"unaffected","version":"11.1.0","versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.5","changes":[{"at":"11.0.5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.4-h6","changes":[{"at":"10.2.4-h6","status":"unaffected"},{"at":"10.2.5","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.1.0","lessThan":"10.1.14","changes":[{"at":"10.1.14","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop a core system service on the firewall by sending a crafted packet through the data plane that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<span>A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop a core system service on the firewall by sending a crafted packet through the data plane that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.</span><br>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-2551","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"MEDIUM","threatScore":6.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"No special configuration is required to be affected by this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"No special configuration is required to be affected by this issue."}]}],"workarounds":[{"lang":"en","value":"No workaround or mitigation is available.","supportingMedia":[{"type":"text/html","base64":false,"value":"No workaround or mitigation is available."}]}],"solutions":[{"lang":"eng","value":"This issue is fixed in PAN-OS 10.1.14, PAN-OS 10.2.4-h6, PAN-OS 10.2.5, PAN-OS 11.0.5, and all later PAN-OS versions.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is fixed in PAN-OS 10.1.14, PAN-OS 10.2.4-h6, PAN-OS 10.2.5, PAN-OS 11.0.5, and all later PAN-OS versions.<br>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2024-11-13T17:00:00.000Z","lang":"en","value":"Initial publication"}],"credits":[{"lang":"en","value":"a customer","type":"finder"}],"source":{"defect":["PAN-223185"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.0.4-h6","PAN-OS 11.0.4-h5","PAN-OS 11.0.4-h4","PAN-OS 11.0.4-h3","PAN-OS 11.0.4-h2","PAN-OS 11.0.4-h1","PAN-OS 11.0.4","PAN-OS 11.0.3-h13","PAN-OS 11.0.3-h12","PAN-OS 11.0.3-h11","PAN-OS 11.0.3-h10","PAN-OS 11.0.3-h9","PAN-OS 11.0.3-h8","PAN-OS 11.0.3-h7","PAN-OS 11.0.3-h6","PAN-OS 11.0.3-h5","PAN-OS 11.0.3-h4","PAN-OS 11.0.3-h3","PAN-OS 11.0.3-h2","PAN-OS 11.0.3-h1","PAN-OS 11.0.3","PAN-OS 11.0.2-h5","PAN-OS 11.0.2-h4","PAN-OS 11.0.2-h3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h5","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h4","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.1.13-h5","PAN-OS 10.1.13-h4","PAN-OS 10.1.13-h3","PAN-OS 10.1.13-h2","PAN-OS 10.1.13-h1","PAN-OS 10.1.13","PAN-OS 10.1.12-h3","PAN-OS 10.1.12-h2","PAN-OS 10.1.12-h1","PAN-OS 10.1.12","PAN-OS 10.1.11-h10","PAN-OS 10.1.11-h9","PAN-OS 10.1.11-h8","PAN-OS 10.1.11-h7","PAN-OS 10.1.11-h6","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h9","PAN-OS 10.1.10-h8","PAN-OS 10.1.10-h7","PAN-OS 10.1.10-h6","PAN-OS 10.1.10-h5","PAN-OS 10.1.10-h4","PAN-OS 10.1.10-h3","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h14","PAN-OS 10.1.9-h13","PAN-OS 10.1.9-h12","PAN-OS 10.1.9-h11","PAN-OS 10.1.9-h10","PAN-OS 10.1.9-h9","PAN-OS 10.1.9-h8","PAN-OS 10.1.9-h7","PAN-OS 10.1.9-h6","PAN-OS 10.1.9-h5","PAN-OS 10.1.9-h4","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h8","PAN-OS 10.1.8-h7","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7-h1","PAN-OS 10.1.7","PAN-OS 10.1.6-h9","PAN-OS 10.1.6-h8","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h4","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h6","PAN-OS 10.1.4-h5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h4","PAN-OS 10.1.3-h3","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2024-9472","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Traffic","datePublic":"2024-11-13T18:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-476","description":"CWE-476 NULL Pointer Dereference","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-129","descriptions":[{"lang":"en","value":"CAPEC-129 Pointer Manipulation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected","cpes":[]},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*"],"versions":[{"status":"affected","version":"11.2.0","lessThan":"11.2.2-h3","changes":[{"at":"11.2.2-h3","status":"unaffected"},{"at":"11.2.3","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.2-h14","changes":[{"at":"11.1.2-h14","status":"unaffected"},{"at":"11.1.3-h10","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"11.0.0","versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.7-h16","changes":[{"at":"10.2.7-h16","status":"unaffected"},{"at":"10.2.8-h13","status":"unaffected"},{"at":"10.2.9-h14","status":"unaffected"},{"at":"10.2.10-h7","status":"unaffected"},{"at":"10.2.11-h4","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"10.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected","cpes":[]}],"descriptions":[{"lang":"en","value":"A null pointer dereference in Palo Alto Networks PAN-OS software on PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series hardware platforms when Decryption policy is enabled allows an unauthenticated attacker to crash PAN-OS by sending specific traffic through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.\n\nPalo Alto Networks VM-Series, Cloud NGFW, and Prisma Access are not affected.\n\nThis issue only affects PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series running these specific versions of PAN-OS:\n * 10.2.7-h12\n * 10.2.8-h10\n * 10.2.9-h9\n * 10.2.9-h11\n * 10.2.10-h2\n * 10.2.10-h3\n * 10.2.11\n * 10.2.11-h1\n * 10.2.11-h2\n * 10.2.11-h3\n * 11.1.2-h9\n * 11.1.2-h12\n * 11.1.3-h2\n * 11.1.3-h4\n * 11.1.3-h6\n * 11.2.2\n * 11.2.2-h1","supportingMedia":[{"type":"text/html","base64":false,"value":"<div>A null pointer dereference in Palo Alto Networks PAN-OS software on PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series hardware platforms when Decryption policy is enabled allows an unauthenticated attacker to crash PAN-OS by sending specific traffic through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.</div><br><div>Palo Alto Networks VM-Series, Cloud NGFW, and Prisma Access are not affected.</div><br><div>This issue only affects PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series running these specific versions of PAN-OS:</div><div><ul><li>10.2.7-h12</li><li>10.2.8-h10</li><li>10.2.9-h9</li><li>10.2.9-h11</li><li>10.2.10-h2</li><li>10.2.10-h3</li><li>10.2.11</li><li>10.2.11-h1</li><li>10.2.11-h2</li><li>10.2.11-h3</li><li>11.1.2-h9</li><li>11.1.2-h12</li><li>11.1.3-h2</li><li>11.1.3-h4</li><li>11.1.3-h6</li><li>11.2.2</li><li>11.2.2-h1</li></ul></div>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-9472","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"MEDIUM","threatScore":6.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"This issue is only applicable firewalls where url proxy or any decrypt-policy is configured.\n\nWhen any decrypt policy is configured, this issue may be encountered regardless of whether traffic matches explicit decrypt, explicit no-decrypt, or none of the decryption policies.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is only applicable firewalls where url proxy or any decrypt-policy is configured.<br><br>When any decrypt policy is configured, this issue may be encountered regardless of whether traffic matches explicit decrypt, explicit no-decrypt, or none of the decryption policies."}]}],"workarounds":[{"lang":"en","value":"This issue does not impact firewalls that do not have url proxy or any decrypt-policy configured.\n\nThe issue can be completely mitigated by setting this option:\n\n\n> set system setting ctd nonblocking-pattern-match disable","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue does not impact firewalls that do not have url proxy or any decrypt-policy configured.<br><br>The issue can be completely mitigated by setting this option:<br><blockquote><tt>set system setting ctd nonblocking-pattern-match disable</tt></blockquote>"}]}],"solutions":[{"lang":"eng","value":"This issue is fixed in PAN-OS 10.2.7-h16, PAN-OS 10.2.8-h13, PAN-OS 10.2.9-h14, PAN-OS 10.2.10-h7, PAN-OS 10.2.11-h4, PAN-OS 11.1.2-h14, PAN-OS 11.1.3-h10, PAN-OS 11.2.2-h3, PAN-OS 11.2.3, and all later PAN-OS versions.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is fixed in PAN-OS 10.2.7-h16, PAN-OS 10.2.8-h13, PAN-OS 10.2.9-h14, PAN-OS 10.2.10-h7, PAN-OS 10.2.11-h4, PAN-OS 11.1.2-h14, PAN-OS 11.1.3-h10, PAN-OS 11.2.2-h3, PAN-OS 11.2.3, and all later PAN-OS versions."}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue. However, customers have reported encountering this issue during normal operations.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue. However, customers have reported encountering this issue during normal operations."}]}],"timeline":[{"time":"2024-11-13T17:00:00.000Z","lang":"en","value":"Initial publication"}],"source":{"defect":["PAN-262287","PAN-226361"],"discovery":"USER"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.1-h1","PAN-OS 11.2.1","PAN-OS 11.2.0-h1","PAN-OS 11.2.0","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 10.2.11-h3","PAN-OS 10.2.11-h2","PAN-OS 10.2.11-h1","PAN-OS 10.2.11","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2024-2550","assignerOrgId":"00000000-0000-4000-9000-000000000000","serial":1,"state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000"},"title":"PAN-OS: Firewall Denial of Service (DoS) in GlobalProtect Gateway Using a Specially Crafted Packet","datePublic":"2024-11-13T18:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-476","description":"CWE-476 NULL Pointer Dereference","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-129","descriptions":[{"lang":"en","value":"CAPEC-129 Pointer Manipulation"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*"],"versions":[{"status":"unaffected","version":"11.2.0","versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.5","changes":[{"at":"11.1.5","status":"unaffected"},{"at":"11.1.4-h9","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.6","changes":[{"at":"11.0.6","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.11","changes":[{"at":"10.2.11","status":"unaffected"},{"at":"10.2.10-h10","status":"unaffected"},{"at":"10.2.9-h18","status":"unaffected"},{"at":"10.2.8-h18","status":"unaffected"},{"at":"10.2.7-h21","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"10.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop the GlobalProtect service on the firewall by sending a specially crafted packet that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.\n","supportingMedia":[{"type":"text/html","base64":false,"value":"<span>A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop the GlobalProtect service on the firewall by sending a specially crafted packet that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.</span><br>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-2550","tags":["vendor-advisory"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"HIGH","baseScore":8.7,"threatSeverity":"MEDIUM","threatScore":6.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"This issue impacts only firewalls on which you configured a GlobalProtect gateway. You can verify whether you configured GlobalProtect gateway by checking for entries in your firewall web interface (Network → GlobalProtect → Gateways).","supportingMedia":[{"type":"text/html","base64":false,"value":"<div><div>This issue impacts only firewalls on which you configured a GlobalProtect gateway. You can verify whether you configured GlobalProtect gateway by checking for entries in your firewall web interface (Network → GlobalProtect → Gateways).</div></div>"}]}],"workarounds":[{"lang":"en","value":"No workaround or mitigation is available.","supportingMedia":[{"type":"text/html","base64":false,"value":"No workaround or mitigation is available."}]}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 10.2.11, PAN-OS 11.0.6, PAN-OS 11.1.5, and all later PAN-OS versions.\n\nIn addition, in an attempt to provide the most seamless upgrade path for our customers, we are making additional fixes available as noted below:\n\n * Additional 11.1 fix:\n   * 11.1.4-h9\n     \n * Additional 10.2 fixes:\n   * 10.2.10-h10\n   * 10.2.9-h18\n   * 10.2.8-h18\n   * 10.2.7-h21","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is fixed in PAN-OS 10.2.11, PAN-OS 11.0.6, PAN-OS 11.1.5, and all later PAN-OS versions.<br><br>In addition, in an attempt to provide the most seamless upgrade path for our customers, we are making additional fixes available as noted below:<br><ul><li>Additional 11.1 fix:<ul><li>11.1.4-h9<br></li></ul></li><li>Additional 10.2 fixes:<ul><li>10.2.10-h10</li><li>10.2.9-h18</li><li>10.2.8-h18</li><li>10.2.7-h21</li></ul></li></ul>"}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-01-06T21:30:00.000Z","lang":"en","value":"Added additional fixed versions for PAN-OS 10.2"},{"time":"2024-12-20T20:55:00.000Z","lang":"en","value":"Updated the Product Status table"},{"time":"2024-11-13T17:00:00.000Z","lang":"en","value":"Initial publication"}],"credits":[{"lang":"en","value":"Michael Baker from AC3","type":"finder"}],"source":{"defect":["PAN-244950","PAN-221352"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"x_affectedList":["PAN-OS 11.1.4-h8","PAN-OS 11.1.4-h7","PAN-OS 11.1.4-h6","PAN-OS 11.1.4-h5","PAN-OS 11.1.4-h4","PAN-OS 11.1.4-h3","PAN-OS 11.1.4-h2","PAN-OS 11.1.4-h1","PAN-OS 11.1.4","PAN-OS 11.1.3-h13","PAN-OS 11.1.3-h12","PAN-OS 11.1.3-h11","PAN-OS 11.1.3-h10","PAN-OS 11.1.3-h9","PAN-OS 11.1.3-h8","PAN-OS 11.1.3-h7","PAN-OS 11.1.3-h6","PAN-OS 11.1.3-h5","PAN-OS 11.1.3-h4","PAN-OS 11.1.3-h3","PAN-OS 11.1.3-h2","PAN-OS 11.1.3-h1","PAN-OS 11.1.3","PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 11.0.5-h2","PAN-OS 11.0.5-h1","PAN-OS 11.0.5","PAN-OS 11.0.4-h6","PAN-OS 11.0.4-h5","PAN-OS 11.0.4-h4","PAN-OS 11.0.4-h3","PAN-OS 11.0.4-h2","PAN-OS 11.0.4-h1","PAN-OS 11.0.4","PAN-OS 11.0.3-h13","PAN-OS 11.0.3-h12","PAN-OS 11.0.3-h11","PAN-OS 11.0.3-h10","PAN-OS 11.0.3-h9","PAN-OS 11.0.3-h8","PAN-OS 11.0.3-h7","PAN-OS 11.0.3-h6","PAN-OS 11.0.3-h5","PAN-OS 11.0.3-h4","PAN-OS 11.0.3-h3","PAN-OS 11.0.3-h2","PAN-OS 11.0.3-h1","PAN-OS 11.0.3","PAN-OS 11.0.2-h5","PAN-OS 11.0.2-h4","PAN-OS 11.0.2-h3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h5","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h4","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.10-h9","PAN-OS 10.2.10-h8","PAN-OS 10.2.10-h7","PAN-OS 10.2.10-h6","PAN-OS 10.2.10-h5","PAN-OS 10.2.10-h4","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h17","PAN-OS 10.2.9-h16","PAN-OS 10.2.9-h15","PAN-OS 10.2.9-h14","PAN-OS 10.2.9-h13","PAN-OS 10.2.9-h12","PAN-OS 10.2.9-h11","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h32","PAN-OS 10.2.4-h31","PAN-OS 10.2.4-h30","PAN-OS 10.2.4-h29","PAN-OS 10.2.4-h28","PAN-OS 10.2.4-h27","PAN-OS 10.2.4-h26","PAN-OS 10.2.4-h25","PAN-OS 10.2.4-h24","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"PAN-SA-2024-0010","assignerOrgId":"00000000-0000-4000-9000-000000000000","assignerShortName":"palo_alto","dateUpdated":"2024-11-14T00:00:00.000Z","serial":1,"dateReserved":"2024-10-09T07:00:00.000Z","datePublished":"2024-10-09T07:00:00.000Z","state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000","shortName":"Not found","dateUpdated":"2024-11-20T08:00:00.000Z"},"title":"Expedition: Multiple Vulnerabilities in Expedition Lead to Exposure of Firewall Credentials","datePublic":"2024-10-09T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","type":"CWE"}]},{"descriptions":[{"lang":"en","cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]},{"descriptions":[{"lang":"en","cweId":"CWE-89","description":"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","type":"CWE"}]},{"descriptions":[{"lang":"en","cweId":"CWE-532","description":"CWE-532 Insertion of Sensitive Information into Log File","type":"CWE"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Expedition","versions":[{"status":"affected","version":"1","lessThan":"1.2.96","changes":[{"at":"1.2.96","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Panorama","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Multiple vulnerabilities in Palo Alto Networks Expedition allow an attacker to read Expedition database contents and arbitrary files, as well as write arbitrary files to temporary storage locations on the Expedition system. Combined, these include information such as usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.\n\nThese issues do not affect the firewalls, Panorama, Prisma Access, or Cloud NGFW.","supportingMedia":[{"type":"text/html","base64":true,"value":"<pre>Multiple vulnerabilities in Palo Alto Networks Expedition allow an attacker to read Expedition database contents and arbitrary files, as well as write arbitrary files to temporary storage locations on the Expedition system. Combined, these include information such as usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.\n\nThese issues do not affect the firewalls, Panorama, Prisma Access, or Cloud NGFW.</pre>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/PAN-SA-2024-0010","tags":["x_refsource_CONFIRM"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"HIGH","providerUrgency":"AMBER","exploitMaturity":"NOT_DEFINED","baseSeverity":"CRITICAL","baseScore":9.9,"threatSeverity":"CRITICAL","threatScore":9.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:N/SA:N/AU:N/R:U/V:C/RE:H/U:Amber"}}],"workarounds":[{"lang":"en","value":"Ensure networks access to Expedition is restricted to authorized users, hosts, or networks.\n\nIf Expedition is not in active use, ensure that Expedition software is shut down.\n\nFor CVE-2024-9465, you can check for an indicator of compromise with the following command on an Expedition system (replace \"root\" with your username if you are using a different username):\n\n    mysql -uroot -p -D pandb -e \"SELECT * FROM cronjobs;\"\n\nIf you see any records returned, this indicates a potential compromise. Please note that if no records are returned, the system may still be compromised. This is only intended to indicate a potential compromise, rather than confirm a system has not been compromised.\n\nThere are no practical indicators of compromise for the remainder of the CVEs in this advisory.","supportingMedia":[{"type":"text/html","base64":false,"value":"Ensure networks access to Expedition is restricted to authorized users, hosts, or networks.\n\nIf Expedition is not in active use, ensure that Expedition software is shut down.\n\nFor CVE-2024-9465, you can check for an indicator of compromise with the following command on an Expedition system (replace \"root\" with your username if you are using a different username):\n\n    mysql -uroot -p -D pandb -e \"SELECT * FROM cronjobs;\"\n\nIf you see any records returned, this indicates a potential compromise. Please note that if no records are returned, the system may still be compromised. This is only intended to indicate a potential compromise, rather than confirm a system has not been compromised.\n\nThere are no practical indicators of compromise for the remainder of the CVEs in this advisory."}]}],"solutions":[{"lang":"en","value":"The fixes for all listed issues are available in Expedition 1.2.96, and all later Expedition versions.\n\nThe cleartext file affected by CVE-2024-9466 will be removed automatically during the upgrade.\n\nAll Expedition usernames, passwords, and API keys should be rotated after upgrading to the fixed version of Expedition.\n\nAll firewall usernames, passwords, and API keys processed by Expedition should be rotated after updating.","supportingMedia":[{"type":"text/html","base64":false,"value":"The fixes for all listed issues are available in Expedition 1.2.96, and all later Expedition versions.\n\nThe cleartext file affected by CVE-2024-9466 will be removed automatically during the upgrade.\n\nAll Expedition usernames, passwords, and API keys should be rotated after upgrading to the fixed version of Expedition.\n\nAll firewall usernames, passwords, and API keys processed by Expedition should be rotated after updating."}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is aware of reports from CISA that there is evidence of active exploitation for CVE-2024-9463 and CVE-2024-9465. More information can be found at https://www.cisa.gov/news-events/alerts/2024/11/14/cisa-adds-two-known-exploited-vulnerabilities-catalog.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is aware of reports from CISA that there is evidence of active exploitation for CVE-2024-9463 and CVE-2024-9465. More information can be found at https://www.cisa.gov/news-events/alerts/2024/11/14/cisa-adds-two-known-exploited-vulnerabilities-catalog."}]}],"timeline":[{"time":"2024-11-14T21:30:00.000Z","lang":"eng","value":"Updated Exploitation Status section with report from CISA"},{"time":"2024-10-09T22:32:00.000Z","lang":"eng","value":"Clarified that firewalls, Panorama, Prisma Access, and Cloud NGFW are not affected"},{"time":"2024-10-09T16:00:00.000Z","lang":"eng","value":"Initial publication"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Zach Hanley (@hacks_zach) of Horizon3.ai for discovering and reporting CVE-2024-9464, CVE-2024-9465, and CVE-2024-9466.","type":"finder"},{"lang":"en","value":"Palo Alto Networks thanks Enrique Castillo of Palo Alto Networks for discovering and reporting CVE-2024-9463, CVE-2024-9464, CVE-2024-9465, and CVE-2024-9467.","type":"finder"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"x_affectedList":["Expedition"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2024-9468","assignerOrgId":"00000000-0000-4000-9000-000000000000","assignerShortName":"palo_alto","dateUpdated":"2024-10-14T00:00:00.000Z","serial":1,"dateReserved":"2024-10-09T07:00:00.000Z","datePublished":"2024-10-09T07:00:00.000Z","state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000","shortName":"palo_alto","dateUpdated":"2024-10-09T17:05:00.000Z"},"title":"PAN-OS: Firewall Denial of Service (DoS) via a Maliciously Crafted Packet","datePublic":"2024-10-09T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-583","descriptions":[{"lang":"en","value":"CAPEC-583 Disabling Network Hardware"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h23:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h22:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h21:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h23:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h22:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h21:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h20:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h19:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h18:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h17:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h16:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h15:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h14:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h13:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h12:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h11:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h10:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h9:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h8:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h7:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h6:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h5:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h1:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*","cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*"],"versions":[{"status":"unaffected","version":"11.2.0","versionType":"custom"},{"status":"affected","version":"11.1.0","lessThan":"11.1.3","changes":[{"at":"11.1.3","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.0.0","lessThan":"11.0.4-h5","changes":[{"at":"11.0.4-h5","status":"unaffected"},{"at":"11.0.6","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.2.0","lessThan":"10.2.4-h24","changes":[{"at":"10.2.9-h11","status":"unaffected"},{"at":"10.2.10-h4","status":"unaffected"},{"at":"10.2.11","status":"unaffected"},{"at":"10.2.8-h20","status":"unaffected"},{"at":"10.2.7-h24","status":"unaffected"},{"at":"10.2.4-h24","status":"unaffected"}],"versionType":"custom"},{"status":"unaffected","version":"10.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.","supportingMedia":[{"type":"text/html","base64":true,"value":"<pre>A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.</pre>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-9468","tags":["x_refsource_CONFIRM"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"LOW","providerUrgency":"AMBER","exploitMaturity":"NOT_DEFINED","baseSeverity":"HIGH","baseScore":8.2,"threatSeverity":"HIGH","threatScore":8.2,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:C/RE:L/U:Amber"}}],"configurations":[{"lang":"en","value":"This issue affects only PAN-OS configurations where all of the following are true:\n* Threat Prevention is enabled.\n* The Threat Prevention signature 86467 (\"Possible Domain Fronting Detection-SNI\") is enabled on an Anti-Spyware profile.\n* This setting is enabled: Device > Setup > Session > Decryption Settings > SSL Decryption Settings > Send handshake messages to CTD for inspection.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue affects only PAN-OS configurations where all of the following are true:\n* Threat Prevention is enabled.\n* The Threat Prevention signature 86467 (\"Possible Domain Fronting Detection-SNI\") is enabled on an Anti-Spyware profile.\n* This setting is enabled: Device > Setup > Session > Decryption Settings > SSL Decryption Settings > Send handshake messages to CTD for inspection."}]}],"workarounds":[{"lang":"en","value":"Customers can block attacks for this vulnerability by disabling this setting: Device > Setup Session > Decryption Settings > SSL Decryption Settings > Send handshake messages to CTD for inspection.\n\nCustomers with a Threat Prevention subscription, who want to keep domain fronting detection enabled, can block attacks for this vulnerability by enabling Threat ID 94971 (introduced in Applications and Threats content version 8854).","supportingMedia":[{"type":"text/html","base64":false,"value":"Customers can block attacks for this vulnerability by disabling this setting: Device > Setup Session > Decryption Settings > SSL Decryption Settings > Send handshake messages to CTD for inspection.\n\nCustomers with a Threat Prevention subscription, who want to keep domain fronting detection enabled, can block attacks for this vulnerability by enabling Threat ID 94971 (introduced in Applications and Threats content version 8854)."}]}],"solutions":[{"lang":"en","value":"This issue is fixed in 10.2.9-h11, 10.2.10-h4, PAN-OS 10.2.11, PAN-OS 11.0.4-h5, PAN-OS 11.0.6, PAN-OS 11.1.3, and all later PAN-OS versions.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is fixed in 10.2.9-h11, 10.2.10-h4, PAN-OS 10.2.11, PAN-OS 11.0.4-h5, PAN-OS 11.0.6, PAN-OS 11.1.3, and all later PAN-OS versions."}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2025-04-30T17:45:00.000Z","lang":"en","value":"Updated fix availability for PAN-OS 10.2"},{"time":"2024-10-14T22:40:00.000Z","lang":"eng","value":"Clarified the Required Configuration for Exposure section"},{"time":"2024-10-09T16:00:00.000Z","lang":"eng","value":"Initial publication"}],"credits":[{"lang":"en","value":"This issue was found by Jeff Luo of Palo Alto Networks during internal review.","type":"finder"}],"source":{"defect":["PAN-244840"],"discovery":"INTERNAL"},"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"x_affectedList":["PAN-OS 11.1.2-h18","PAN-OS 11.1.2-h17","PAN-OS 11.1.2-h16","PAN-OS 11.1.2-h15","PAN-OS 11.1.2-h14","PAN-OS 11.1.2-h13","PAN-OS 11.1.2-h12","PAN-OS 11.1.2-h11","PAN-OS 11.1.2-h10","PAN-OS 11.1.2-h9","PAN-OS 11.1.2-h8","PAN-OS 11.1.2-h7","PAN-OS 11.1.2-h6","PAN-OS 11.1.2-h5","PAN-OS 11.1.2-h4","PAN-OS 11.1.2-h3","PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.1-h2","PAN-OS 11.1.1-h1","PAN-OS 11.1.1","PAN-OS 11.1.0-h4","PAN-OS 11.1.0-h3","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 11.0.5-h2","PAN-OS 11.0.5-h1","PAN-OS 11.0.5","PAN-OS 11.0.4-h4","PAN-OS 11.0.4-h3","PAN-OS 11.0.4-h2","PAN-OS 11.0.4-h1","PAN-OS 11.0.4","PAN-OS 11.0.3-h13","PAN-OS 11.0.3-h12","PAN-OS 11.0.3-h11","PAN-OS 11.0.3-h10","PAN-OS 11.0.3-h9","PAN-OS 11.0.3-h8","PAN-OS 11.0.3-h7","PAN-OS 11.0.3-h6","PAN-OS 11.0.3-h5","PAN-OS 11.0.3-h4","PAN-OS 11.0.3-h3","PAN-OS 11.0.3-h2","PAN-OS 11.0.3-h1","PAN-OS 11.0.3","PAN-OS 11.0.2-h5","PAN-OS 11.0.2-h4","PAN-OS 11.0.2-h3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h5","PAN-OS 11.0.1-h4","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h4","PAN-OS 11.0.0-h3","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 10.2.10-h3","PAN-OS 10.2.10-h2","PAN-OS 10.2.10-h1","PAN-OS 10.2.10","PAN-OS 10.2.9-h10","PAN-OS 10.2.9-h9","PAN-OS 10.2.9-h8","PAN-OS 10.2.9-h7","PAN-OS 10.2.9-h6","PAN-OS 10.2.9-h5","PAN-OS 10.2.9-h4","PAN-OS 10.2.9-h3","PAN-OS 10.2.9-h2","PAN-OS 10.2.9-h1","PAN-OS 10.2.9","PAN-OS 10.2.8-h19","PAN-OS 10.2.8-h18","PAN-OS 10.2.8-h17","PAN-OS 10.2.8-h16","PAN-OS 10.2.8-h15","PAN-OS 10.2.8-h14","PAN-OS 10.2.8-h13","PAN-OS 10.2.8-h12","PAN-OS 10.2.8-h11","PAN-OS 10.2.8-h10","PAN-OS 10.2.8-h9","PAN-OS 10.2.8-h8","PAN-OS 10.2.8-h7","PAN-OS 10.2.8-h6","PAN-OS 10.2.8-h5","PAN-OS 10.2.8-h4","PAN-OS 10.2.8-h3","PAN-OS 10.2.8-h2","PAN-OS 10.2.8-h1","PAN-OS 10.2.8","PAN-OS 10.2.7-h23","PAN-OS 10.2.7-h22","PAN-OS 10.2.7-h21","PAN-OS 10.2.7-h20","PAN-OS 10.2.7-h19","PAN-OS 10.2.7-h18","PAN-OS 10.2.7-h17","PAN-OS 10.2.7-h16","PAN-OS 10.2.7-h15","PAN-OS 10.2.7-h14","PAN-OS 10.2.7-h13","PAN-OS 10.2.7-h12","PAN-OS 10.2.7-h11","PAN-OS 10.2.7-h10","PAN-OS 10.2.7-h9","PAN-OS 10.2.7-h8","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h6","PAN-OS 10.2.6-h5","PAN-OS 10.2.6-h4","PAN-OS 10.2.6-h3","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h9","PAN-OS 10.2.5-h8","PAN-OS 10.2.5-h7","PAN-OS 10.2.5-h6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h23","PAN-OS 10.2.4-h22","PAN-OS 10.2.4-h21","PAN-OS 10.2.4-h20","PAN-OS 10.2.4-h19","PAN-OS 10.2.4-h18","PAN-OS 10.2.4-h17","PAN-OS 10.2.4-h16","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h14","PAN-OS 10.2.3-h13","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h6","PAN-OS 10.2.2-h5","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h3","PAN-OS 10.2.1-h2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h4","PAN-OS 10.2.0-h3","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2024-8686","assignerOrgId":"00000000-0000-4000-9000-000000000000","assignerShortName":"palo_alto","dateUpdated":"2024-09-11T00:00:00.000Z","serial":1,"dateReserved":"2024-09-11T07:00:00.000Z","datePublished":"2024-09-11T07:00:00.000Z","state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000","shortName":"palo_alto","dateUpdated":"2024-09-11T16:34:00.000Z"},"title":"PAN-OS: Command Injection Vulnerability","datePublic":"2024-09-11T16:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","type":"CWE"}]}],"impacts":[{"descriptions":[{"lang":"en","value":""}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","cpes":["cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*"],"versions":[{"status":"unaffected","version":"11.2.0","lessThan":"11.2.2","changes":[{"at":"11.2.2","status":"affected"},{"at":"11.2.3","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"11.2.2","versionType":"custom"},{"status":"unaffected","version":"11.1.0","versionType":"custom"},{"status":"unaffected","version":"11.0.0","versionType":"custom"},{"status":"unaffected","version":"10.2.0","versionType":"custom"},{"status":"unaffected","version":"10.1.0","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as root on the firewall.","supportingMedia":[{"type":"text/html","base64":true,"value":"<pre>A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as root on the firewall.</pre>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-8686","tags":["x_refsource_CONFIRM"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"NOT_DEFINED","baseSeverity":"HIGH","baseScore":8.6,"threatSeverity":"HIGH","threatScore":8.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Amber"}}],"configurations":[{"lang":"en","value":"TBD","supportingMedia":[{"type":"text/html","base64":false,"value":"TBD"}]}],"workarounds":[{"lang":"en","value":"TBD","supportingMedia":[{"type":"text/html","base64":false,"value":"TBD"}]}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 11.2.3 and all later PAN-OS versions.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is fixed in PAN-OS 11.2.3 and all later PAN-OS versions."}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2024-09-11T16:00:00.000Z","lang":"eng","value":"Initial publication"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Louis Lingg for discovering and reporting this issue.","type":"finder"}],"source":{"defect":["PAN-263321"],"discovery":"EXTERNAL"},"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"x_affectedList":["PAN-OS 11.2.2-h2","PAN-OS 11.2.2-h1","PAN-OS 11.2.2"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2024-5911","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2024-07-10T00:00:00","dateReserved":"2024-07-10T00:00:00","dateUpdated":"2024-07-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: File Upload Vulnerability in the Panorama Web Interface","datePublic":"2024-07-10T16:00:00.000Z","providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2024-07-10T18:40:02.209Z"},"descriptions":[{"lang":"en","value":"An arbitrary file upload vulnerability in Palo Alto Networks Panorama software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and crash the Panorama. Repeated attacks eventually cause the Panorama to enter maintenance mode, which requires manual intervention to bring the Panorama back online.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An arbitrary file upload vulnerability in Palo Alto Networks Panorama software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and crash the Panorama. Repeated attacks eventually cause the Panorama to enter maintenance mode, which requires manual intervention to bring the Panorama back online.</pre>"}]}],"x_affectedList":["PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1","PAN-OS 10.2.0","PAN-OS 10.2","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"11.1 All","status":"unaffected"},{"version":"11.0 All","status":"unaffected"},{"version":"11.2 All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.2","status":"affected","lessThan":"10.2.4","versionType":"custom","changes":[{"at":"10.2.4","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.9","versionType":"custom","changes":[{"at":"10.1.9","status":"unaffected"}]}],"platforms":["Panorama"]},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2024-5911"}],"credits":[{"lang":"en","value":"This issue was found by Yasukazu Miyashita of Palo Alto Networks during an internal security review."}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","baseSeverity":"HIGH","baseScore":7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-434 Unrestricted Upload of File with Dangerous Type","cweId":"CWE-434"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["PAN-182835"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 10.1.9, PAN-OS 10.2.4, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 10.1.9, PAN-OS 10.2.4, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2024-07-10T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2024-3400","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2024-04-12T00:00:00","dateReserved":"2024-04-12T00:00:00","dateUpdated":"2024-05-03T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect","datePublic":"2024-04-12T06:55:00.000Z","providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2024-04-19T22:27:27.179Z"},"descriptions":[{"lang":"en","value":"A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.\n\nCloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.\n\nCustomers should continue to monitor this security advisory for the latest updates and product guidance.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.\n\nCloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.\n\nCustomers should continue to monitor this security advisory for the latest updates and product guidance.</pre>"}]}],"x_affectedList":["PAN-OS 11.1.2-h2","PAN-OS 11.1.2-h1","PAN-OS 11.1.2","PAN-OS 11.1.0-h2","PAN-OS 11.1.0-h1","PAN-OS 11.1.0","PAN-OS 11.1","PAN-OS 11.0.4","PAN-OS 11.0.3-h9","PAN-OS 11.0.3-h8","PAN-OS 11.0.3-h7","PAN-OS 11.0.3-h6","PAN-OS 11.0.3-h5","PAN-OS 11.0.3-h4","PAN-OS 11.0.3-h3","PAN-OS 11.0.3-h2","PAN-OS 11.0.3-h1","PAN-OS 11.0.3","PAN-OS 11.0.2-h3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h3","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h2","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 11.0","PAN-OS 10.2.9","PAN-OS 10.2.7-h7","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6-h2","PAN-OS 10.2.6-h1","PAN-OS 10.2.6","PAN-OS 10.2.5-h5","PAN-OS 10.2.5-h4","PAN-OS 10.2.5-h3","PAN-OS 10.2.5-h2","PAN-OS 10.2.5-h1","PAN-OS 10.2.5","PAN-OS 10.2.4-h15","PAN-OS 10.2.4-h14","PAN-OS 10.2.4-h13","PAN-OS 10.2.4-h12","PAN-OS 10.2.4-h11","PAN-OS 10.2.4-h10","PAN-OS 10.2.4-h9","PAN-OS 10.2.4-h8","PAN-OS 10.2.4-h7","PAN-OS 10.2.4-h6","PAN-OS 10.2.4-h5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h12","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h4","PAN-OS 10.2.2-h3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1-h1","PAN-OS 10.2.1","PAN-OS 10.2.0-h2","PAN-OS 10.2.0-h1","PAN-OS 10.2.0","PAN-OS 10.2"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0 All","status":"unaffected"},{"version":"9.1 All","status":"unaffected"},{"version":"10.0 All","status":"unaffected"},{"version":"10.1 All","status":"unaffected"},{"version":"10.2","status":"affected","lessThan":"10.2.0-h3","versionType":"custom","changes":[{"at":"10.2.0-h3","status":"unaffected"},{"at":"10.2.1-h2","status":"unaffected"},{"at":"10.2.2-h5","status":"unaffected"},{"at":"10.2.3-h13","status":"unaffected"},{"at":"10.2.4-h16","status":"unaffected"},{"at":"10.2.5-h6","status":"unaffected"},{"at":"10.2.6-h3","status":"unaffected"},{"at":"10.2.7-h8","status":"unaffected"},{"at":"10.2.8-h3","status":"unaffected"},{"at":"10.2.9-h1","status":"unaffected"}]},{"version":"11.0","status":"affected","lessThan":"11.0.0-h3","versionType":"custom","changes":[{"at":"11.0.0-h3","status":"unaffected"},{"at":"11.0.1-h4","status":"unaffected"},{"at":"11.0.2-h4","status":"unaffected"},{"at":"11.0.3-h10","status":"unaffected"},{"at":"11.0.4-h1","status":"unaffected"}]},{"version":"11.1","status":"affected","lessThan":"11.1.0-h3","versionType":"custom","changes":[{"at":"11.1.0-h3","status":"unaffected"},{"at":"11.1.1-h1","status":"unaffected"},{"at":"11.1.2-h3","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2024-3400"},{"tags":["x_refsource_CONFIRM"],"url":"https://unit42.paloaltonetworks.com/cve-2024-3400/"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.paloaltonetworks.com/blog/2024/04/more-on-the-pan-os-cve/"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Volexity for detecting and identifying this issue, Capability Development Group at Bishop Fox for helping us improve threat prevention signatures, Nick Wilson, and Louis Lingg for sharing their research into post-exploitation persistence techniques."}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"HIGH","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"RED","baseSeverity":"CRITICAL","baseScore":10,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/AU:Y/R:U/V:C/RE:M/U:Red"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')","cweId":"CWE-77"}]},{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["PAN-252214"],"discovery":"USER"},"configurations":[{"lang":"en","value":"This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 firewalls configured with GlobalProtect gateway or GlobalProtect portal (or both). Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability.\n\nYou can verify whether you have a GlobalProtect gateway or GlobalProtect portal configured by checking for entries in your firewall web interface (Network > GlobalProtect > Gateways or Network > GlobalProtect > Portals).","supportingMedia":{"value":"This issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 firewalls configured with GlobalProtect gateway or GlobalProtect portal (or both). Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability.\n\nYou can verify whether you have a GlobalProtect gateway or GlobalProtect portal configured by checking for entries in your firewall web interface (Network > GlobalProtect > Gateways or Network > GlobalProtect > Portals).","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Recommended Mitigation: Customers with a Threat Prevention subscription can block attacks for this vulnerability using Threat IDs 95187, 95189, and 95191 (available in Applications and Threats content version 8836-8695 and later). Please monitor this advisory and new Threat Prevention content updates for additional Threat Prevention IDs around CVE-2024-3400.\n\nTo apply the Threat IDs, customers must ensure that vulnerability protection has been applied to their GlobalProtect interface to prevent exploitation of this issue on their device. Please see https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/ta-p/340184 for more information.\n\nIn earlier versions of this advisory, disabling device telemetry was listed as a secondary mitigation action. Disabling device telemetry is no longer an effective mitigation. Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability.","supportingMedia":{"value":"Recommended Mitigation: Customers with a Threat Prevention subscription can block attacks for this vulnerability using Threat IDs 95187, 95189, and 95191 (available in Applications and Threats content version 8836-8695 and later). Please monitor this advisory and new Threat Prevention content updates for additional Threat Prevention IDs around CVE-2024-3400.\n\nTo apply the Threat IDs, customers must ensure that vulnerability protection has been applied to their GlobalProtect interface to prevent exploitation of this issue on their device. Please see https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/ta-p/340184 for more information.\n\nIn earlier versions of this advisory, disabling device telemetry was listed as a secondary mitigation action. Disabling device telemetry is no longer an effective mitigation. Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is aware of an increasing number of attacks that leverage the exploitation of this vulnerability. Proof of concepts for this vulnerability have been publicly disclosed by third parties.\n\nWe are also aware of proof-of-concept by third parties of post-exploit persistence techniques that survive resets and upgrades. We are not aware at this time of any malicious attempts to use these persistence techniques in active exploitation of the vulnerability. These fixes listed below and Threat Prevention signatures completely prevent the initial remote command execution, stopping subsequent post-exploitation or persistence.\n\nMore information about the vulnerability's exploitation in the wild can be found in the Unit 42 threat brief (https://unit42.paloaltonetworks.com/cve-2024-3400/) and the Palo Alto Networks PSIRT blog post (https://www.paloaltonetworks.com/blog/2024/04/more-on-the-pan-os-cve/).","supportingMedia":{"value":"Palo Alto Networks is aware of an increasing number of attacks that leverage the exploitation of this vulnerability. Proof of concepts for this vulnerability have been publicly disclosed by third parties.\n\nWe are also aware of proof-of-concept by third parties of post-exploit persistence techniques that survive resets and upgrades. We are not aware at this time of any malicious attempts to use these persistence techniques in active exploitation of the vulnerability. These fixes listed below and Threat Prevention signatures completely prevent the initial remote command execution, stopping subsequent post-exploitation or persistence.\n\nMore information about the vulnerability's exploitation in the wild can be found in the Unit 42 threat brief (https://unit42.paloaltonetworks.com/cve-2024-3400/) and the Palo Alto Networks PSIRT blog post (https://www.paloaltonetworks.com/blog/2024/04/more-on-the-pan-os-cve/).","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"We strongly advise customers to immediately upgrade to a fixed version of PAN-OS to protect their devices even when workarounds and mitigations have been applied.\n\nThis issue is fixed in PAN-OS 10.2.9-h1, PAN-OS 11.0.4-h1, PAN-OS 11.1.2-h3, and in all later PAN-OS versions. These fixes and those listed below completely prevent the initial remote command execution, stopping subsequent post-exploitation or persistence.\n\nIn addition, to provide the most seamless upgrade path for customers, additional hotfixes have been made available as a courtesy for other commonly deployed maintenance releases.\n\n  PAN-OS 10.2:\n  - 10.2.9-h1 (Released 4/14/24)\n  - 10.2.8-h3 (Released 4/15/24)\n  - 10.2.7-h8 (Released 4/15/24)\n  - 10.2.6-h3 (Released 4/16/24)\n  - 10.2.5-h6 (Released 4/16/24)\n  - 10.2.4-h16 (Released 4/18/24)\n  - 10.2.3-h13 (Released 4/18/24)\n  - 10.2.2-h5 (Released 4/18/24)\n  - 10.2.1-h2 (Released 4/18/24)\n  - 10.2.0-h3 (Released 4/18/24)\n  \n  PAN-OS 11.0:\n  - 11.0.4-h1 (Released 4/14/24)\n  - 11.0.4-h2 (Released 4/17/24)\n  - 11.0.3-h10 (Released 4/16/24)\n  - 11.0.2-h4 (Released 4/16/24)\n  - 11.0.1-h4 (Released 4/18/24)\n  - 11.0.0-h3 (Released 4/18/24)\n  \n  PAN-OS 11.1:\n  - 11.1.2-h3 (Released 4/14/24)\n  - 11.1.1-h1 (Released 4/16/24)\n  - 11.1.0-h3 (Released 4/16/24)\n\nNote: Due to naming convention limitations, “-h” hotfix versions on Azure marketplace are instead named via addition of an extra “0”. Ex: 11.1.2-h3 is published on Azure as 11.1.203.\n\nIf any exploitation was observed on a device, please take the remediation steps suggested here: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CrO6CAK\n\nAn enhanced factory reset (EFR) procedure that does not rely on the integrity of a potentially compromised device can be scheduled by opening a case through Customer Support (TAC). This is recommended for:\n1. Customers who have not applied the PAN-OS fixes or Threat Prevention signatures with vulnerability protection applied to the GlobalProtect interface (regardless of level of compromise) on or before April 25, 2024; or\n2. Customers who are concerned about a persistent risk.\n","supportingMedia":{"value":"We strongly advise customers to immediately upgrade to a fixed version of PAN-OS to protect their devices even when workarounds and mitigations have been applied.\n\nThis issue is fixed in PAN-OS 10.2.9-h1, PAN-OS 11.0.4-h1, PAN-OS 11.1.2-h3, and in all later PAN-OS versions. These fixes and those listed below completely prevent the initial remote command execution, stopping subsequent post-exploitation or persistence.\n\nIn addition, to provide the most seamless upgrade path for customers, additional hotfixes have been made available as a courtesy for other commonly deployed maintenance releases.\n\n  PAN-OS 10.2:\n  - 10.2.9-h1 (Released 4/14/24)\n  - 10.2.8-h3 (Released 4/15/24)\n  - 10.2.7-h8 (Released 4/15/24)\n  - 10.2.6-h3 (Released 4/16/24)\n  - 10.2.5-h6 (Released 4/16/24)\n  - 10.2.4-h16 (Released 4/18/24)\n  - 10.2.3-h13 (Released 4/18/24)\n  - 10.2.2-h5 (Released 4/18/24)\n  - 10.2.1-h2 (Released 4/18/24)\n  - 10.2.0-h3 (Released 4/18/24)\n  \n  PAN-OS 11.0:\n  - 11.0.4-h1 (Released 4/14/24)\n  - 11.0.4-h2 (Released 4/17/24)\n  - 11.0.3-h10 (Released 4/16/24)\n  - 11.0.2-h4 (Released 4/16/24)\n  - 11.0.1-h4 (Released 4/18/24)\n  - 11.0.0-h3 (Released 4/18/24)\n  \n  PAN-OS 11.1:\n  - 11.1.2-h3 (Released 4/14/24)\n  - 11.1.1-h1 (Released 4/16/24)\n  - 11.1.0-h3 (Released 4/16/24)\n\nNote: Due to naming convention limitations, “-h” hotfix versions on Azure marketplace are instead named via addition of an extra “0”. Ex: 11.1.2-h3 is published on Azure as 11.1.203.\n\nIf any exploitation was observed on a device, please take the remediation steps suggested here: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CrO6CAK\n\nAn enhanced factory reset (EFR) procedure that does not rely on the integrity of a potentially compromised device can be scheduled by opening a case through Customer Support (TAC). This is recommended for:\n1. Customers who have not applied the PAN-OS fixes or Threat Prevention signatures with vulnerability protection applied to the GlobalProtect interface (regardless of level of compromise) on or before April 25, 2024; or\n2. Customers who are concerned about a persistent risk.\n","type":"text/html","base64":false}}],"timeline":[{"time":"2024-05-03T04:50:00.000Z","lang":"eng","value":"Enhanced Factory Reset (EFR) Procedure is Available Against any Potential Post-Exploit Persistence Techniques."},{"time":"2024-05-01T23:45:00.000Z","lang":"eng","value":"Answered a FAQ about how to verify the fix or threat prevention signature was applied correctly"},{"time":"2024-04-29T17:58:00.000Z","lang":"eng","value":"Updated exploitation status about proof-of-concept by third parties of post-exploit persistence techniques"},{"time":"2024-04-25T01:48:00.000Z","lang":"eng","value":"Added link to KB article for remediating a device"},{"time":"2024-04-20T18:23:00.000Z","lang":"eng","value":"Answered a FAQ about Tech Support File collection and forensic evidence"},{"time":"2024-04-19T22:25:00.000Z","lang":"eng","value":"Added reference to PSIRT blog post about CVE-2024-3400"},{"time":"2024-04-19T01:15:00.000Z","lang":"eng","value":"Clarified vulnerability title and description"},{"time":"2024-04-17T22:00:00.000Z","lang":"eng","value":"Clarified FAQ regarding evidence of attempted exploit activity"},{"time":"2024-04-17T05:10:00.000Z","lang":"eng","value":"Added new Threat Prevention Threat ID to Workarounds and Mitigations"},{"time":"2024-04-17T02:00:00.000Z","lang":"eng","value":"Added a CLI command to search for possible attempts of exploit activity"},{"time":"2024-04-16T20:45:00.000Z","lang":"eng","value":"Updated product and mitigation guidance, exploit status, and PAN-OS fix availability"},{"time":"2024-04-15T02:30:00.000Z","lang":"eng","value":"All necessary PAN-OS fixes are now available, clarified Workarounds and Mitigations when using Panorama templates"},{"time":"2024-04-14T02:50:00.000Z","lang":"eng","value":"Clarified impact on GlobalProtect portal configurations"},{"time":"2024-04-13T05:50:00.000Z","lang":"eng","value":"Added link to Unit42 threat brief and clarified impact to customer-managed VMs in the cloud"},{"time":"2024-04-12T06:55:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2024-3382","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2024-04-10T00:00:00","dateReserved":"2024-04-10T00:00:00","dateUpdated":"2024-04-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Firewall Denial of Service (DoS) via a Burst of Crafted Packets","datePublic":"2024-04-10T16:00:00.000Z","providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2024-04-10T17:05:47.325Z"},"descriptions":[{"lang":"en","value":"A memory leak exists in Palo Alto Networks PAN-OS software that enables an attacker to send a burst of crafted packets through the firewall that eventually prevents the firewall from processing traffic. This issue applies only to PA-5400 Series devices that are running PAN-OS software with the SSL Forward Proxy feature enabled.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A memory leak exists in Palo Alto Networks PAN-OS software that enables an attacker to send a burst of crafted packets through the firewall that eventually prevents the firewall from processing traffic. This issue applies only to PA-5400 Series devices that are running PAN-OS software with the SSL Forward Proxy feature enabled.</pre>"}]}],"x_affectedList":["PAN-OS 11.1.0","PAN-OS 11.1","PAN-OS 11.0.3-h3","PAN-OS 11.0.3-h2","PAN-OS 11.0.3-h1","PAN-OS 11.0.3","PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 11.0","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6","PAN-OS 10.2.5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1","PAN-OS 10.2.0","PAN-OS 10.2"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0 All","status":"unaffected"},{"version":"9.1 All","status":"unaffected"},{"version":"10.1 All","status":"unaffected"},{"version":"10.2","status":"affected","lessThan":"10.2.7-h3","versionType":"custom","changes":[{"at":"10.2.7-h3","status":"unaffected"}]},{"version":"11.0","status":"affected","lessThan":"11.0.4","versionType":"custom","changes":[{"at":"11.0.4","status":"unaffected"}]},{"version":"11.1","status":"affected","lessThan":"11.1.2","versionType":"custom","changes":[{"at":"11.1.2","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2024-3382"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Celedonio Albarran of Equity Residential and their Infrastructure and Security teams for discovering and reporting this issue."}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"LOW","providerUrgency":"AMBER","baseSeverity":"HIGH","baseScore":8.2,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:D/RE:L/U:Amber"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-770 Allocation of Resources Without Limits or Throttling","cweId":"CWE-770"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["PAN-234921"],"discovery":"USER"},"configurations":[{"lang":"en","value":"This issue applies only to PA-5400 Series devices that are running PAN-OS firewall configurations with the SSL Forward Proxy feature enabled. You can verify whether you have the SSL Forward Proxy feature enabled by checking for decryption policy rules in your firewall web interface (Policies > Decryption).","supportingMedia":{"value":"This issue applies only to PA-5400 Series devices that are running PAN-OS firewall configurations with the SSL Forward Proxy feature enabled. You can verify whether you have the SSL Forward Proxy feature enabled by checking for decryption policy rules in your firewall web interface (Policies > Decryption).","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"You can mitigate this issue by disabling decryption on your firewalls. To temporarily disable SSL Decryption, refer to the administrator’s guide for your PAN-OS software (such as PAN-OS 11.1: https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/temporarily-disable-ssl-decryption). Additionally, to ensure that decryption remains disabled after a reboot, configure a policy-based decryption exclusion that excludes all traffic from being decrypted (https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/decryption-exclusions/create-a-policy-based-decryption-exclusion).","supportingMedia":{"value":"You can mitigate this issue by disabling decryption on your firewalls. To temporarily disable SSL Decryption, refer to the administrator’s guide for your PAN-OS software (such as PAN-OS 11.1: https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/temporarily-disable-ssl-decryption). Additionally, to ensure that decryption remains disabled after a reboot, configure a policy-based decryption exclusion that excludes all traffic from being decrypted (https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/decryption-exclusions/create-a-policy-based-decryption-exclusion).","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 10.2.7-h3, PAN-OS 11.0.4, PAN-OS 11.1.2, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 10.2.7-h3, PAN-OS 11.0.4, PAN-OS 11.1.2, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2024-04-10T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2024-3383","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2024-04-10T00:00:00","dateReserved":"2024-04-10T00:00:00","dateUpdated":"2024-04-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Improper Group Membership Change Vulnerability in Cloud Identity Engine (CIE)","datePublic":"2024-04-10T16:00:00.000Z","providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2024-04-10T17:06:15.823Z"},"descriptions":[{"lang":"en","value":"A vulnerability in how Palo Alto Networks PAN-OS software processes data received from Cloud Identity Engine (CIE) agents enables modification of User-ID groups. This impacts user access to network resources where users may be inappropriately denied or allowed access to resources based on your existing Security Policy rules.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability in how Palo Alto Networks PAN-OS software processes data received from Cloud Identity Engine (CIE) agents enables modification of User-ID groups. This impacts user access to network resources where users may be inappropriately denied or allowed access to resources based on your existing Security Policy rules.</pre>"}]}],"x_affectedList":["PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 11.0","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1","PAN-OS 10.2.0","PAN-OS 10.2","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"11.1 All","status":"unaffected"},{"version":"9.1 All","status":"unaffected"},{"version":"9.0 All","status":"unaffected"},{"version":"11.0","status":"affected","lessThan":"11.0.3","versionType":"custom","changes":[{"at":"11.0.3","status":"unaffected"}]},{"version":"10.2","status":"affected","lessThan":"10.2.5","versionType":"custom","changes":[{"at":"10.2.5","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.11","versionType":"custom","changes":[{"at":"10.1.11","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2024-3383"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Rodgers Moore, CCIE# 8153 of Insight.com, for discovering and reporting this issue."}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"LOW","providerUrgency":"AMBER","baseSeverity":"HIGH","baseScore":8.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:D/RE:L/U:Amber"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-282: Improper Ownership Management","cweId":"CWE-282"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["PAN-211764","PAN-218522"],"discovery":"USER"},"configurations":[{"lang":"en","value":"This issue applies only to PAN-OS firewall configurations with Cloud Identity Engine (CIE) enabled. You should verify whether CIE is configured on your firewall web interface (Device > User Identification > Cloud Identity Engine).","supportingMedia":{"value":"This issue applies only to PAN-OS firewall configurations with Cloud Identity Engine (CIE) enabled. You should verify whether CIE is configured on your firewall web interface (Device > User Identification > Cloud Identity Engine).","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 10.1.11, PAN-OS 10.2.5, PAN-OS 11.0.3, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 10.1.11, PAN-OS 10.2.5, PAN-OS 11.0.3, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2024-04-10T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2024-3385","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2024-04-10T00:00:00","dateReserved":"2024-04-10T00:00:00","dateUpdated":"2024-04-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Firewall Denial of Service (DoS) when GTP Security is Disabled","datePublic":"2024-04-10T16:00:00.000Z","providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2024-04-10T17:06:28.153Z"},"descriptions":[{"lang":"en","value":"A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.\n\nThis affects the following hardware firewall models:\n- PA-5400 Series firewalls\n- PA-7000 Series firewalls","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.\n\nThis affects the following hardware firewall models:\n- PA-5400 Series firewalls\n- PA-7000 Series firewalls</pre>"}]}],"x_affectedList":["PAN-OS 11.0.2-h2","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0-h1","PAN-OS 11.0.0","PAN-OS 11.0","PAN-OS 10.2.7-h6","PAN-OS 10.2.7-h5","PAN-OS 10.2.7-h4","PAN-OS 10.2.7-h3","PAN-OS 10.2.7-h2","PAN-OS 10.2.7-h1","PAN-OS 10.2.7","PAN-OS 10.2.6","PAN-OS 10.2.5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h11","PAN-OS 10.2.3-h10","PAN-OS 10.2.3-h9","PAN-OS 10.2.3-h8","PAN-OS 10.2.3-h7","PAN-OS 10.2.3-h6","PAN-OS 10.2.3-h5","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1","PAN-OS 10.2.0","PAN-OS 10.2","PAN-OS 10.1.11-h5","PAN-OS 10.1.11-h4","PAN-OS 10.1.11-h3","PAN-OS 10.1.11-h2","PAN-OS 10.1.11-h1","PAN-OS 10.1.11","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h6","PAN-OS 10.1.8-h5","PAN-OS 10.1.8-h4","PAN-OS 10.1.8-h3","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7","PAN-OS 10.1.6-h7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h3","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3-h2","PAN-OS 10.1.3-h1","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 9.1.16-h3","PAN-OS 9.1.16-h2","PAN-OS 9.1.16-h1","PAN-OS 9.1.16","PAN-OS 9.1.15-h1","PAN-OS 9.1.15","PAN-OS 9.1.14-h7","PAN-OS 9.1.14-h6","PAN-OS 9.1.14-h5","PAN-OS 9.1.14-h4","PAN-OS 9.1.14-h3","PAN-OS 9.1.14-h2","PAN-OS 9.1.14-h1","PAN-OS 9.1.14","PAN-OS 9.1.13-h4","PAN-OS 9.1.13-h3","PAN-OS 9.1.13-h2","PAN-OS 9.1.13-h1","PAN-OS 9.1.13","PAN-OS 9.1.12-h6","PAN-OS 9.1.12-h5","PAN-OS 9.1.12-h4","PAN-OS 9.1.12-h3","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h4","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.16-h5","PAN-OS 9.0.16-h4","PAN-OS 9.0.16-h3","PAN-OS 9.0.16-h2","PAN-OS 9.0.16-h1","PAN-OS 9.0.16","PAN-OS 9.0.15","PAN-OS 9.0.14-h4","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"11.1 All","status":"unaffected"},{"version":"9.0","status":"affected","lessThan":"9.0.17-h4","versionType":"custom","changes":[{"at":"9.0.17-h4","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.17","versionType":"custom","changes":[{"at":"9.1.17","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.12","versionType":"custom","changes":[{"at":"10.1.12","status":"unaffected"}]},{"version":"10.2","status":"affected","lessThan":"10.2.8","versionType":"custom","changes":[{"at":"10.2.8","status":"unaffected"}]},{"version":"11.0","status":"affected","lessThan":"11.0.3","versionType":"custom","changes":[{"at":"11.0.3","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2024-3385"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks an external reporter for discovering and reporting this issue."}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"LOW","providerUrgency":"AMBER","baseSeverity":"HIGH","baseScore":8.2,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:D/RE:L/U:Amber"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]},{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-476: NULL Pointer Dereference","cweId":"CWE-476"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["PAN-221224"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This does not affect VM-Series firewalls, CN-Series firewalls, Cloud NGFWs, or Prisma Access.\n\nThis issue affects only PAN-OS configurations with GTP Security disabled; it does not affect PAN-OS configurations that have GTP Security enabled. You should verify whether GTP Security is disabled by checking your firewall web interface (Device > Setup > Management > General Settings) and take the appropriate actions as needed.","supportingMedia":{"value":"This does not affect VM-Series firewalls, CN-Series firewalls, Cloud NGFWs, or Prisma Access.\n\nThis issue affects only PAN-OS configurations with GTP Security disabled; it does not affect PAN-OS configurations that have GTP Security enabled. You should verify whether GTP Security is disabled by checking your firewall web interface (Device > Setup > Management > General Settings) and take the appropriate actions as needed.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 94993 (introduced in Applications and Threats content version 8832).","supportingMedia":{"value":"Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 94993 (introduced in Applications and Threats content version 8832).","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue. This was encountered by two customers in normal production usage.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue. This was encountered by two customers in normal production usage.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.12, PAN-OS 10.2.8, PAN-OS 11.0.3, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.12, PAN-OS 10.2.8, PAN-OS 11.0.3, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2024-04-10T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2024-3384","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2024-04-10T00:00:00","dateReserved":"2024-04-10T00:00:00","dateUpdated":"2024-04-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Firewall Denial of Service (DoS) via Malformed NTLM Packets","datePublic":"2024-04-10T16:00:00.000Z","providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2024-04-10T17:06:21.704Z"},"descriptions":[{"lang":"en","value":"A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN Manager (NTLM) packets from Windows servers. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN Manager (NTLM) packets from Windows servers. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.</pre>"}]}],"x_affectedList":["PAN-OS 10.0.11-h3","PAN-OS 10.0.11-h2","PAN-OS 10.0.11-h1","PAN-OS 10.0.11","PAN-OS 10.0.10-h1","PAN-OS 10.0.10","PAN-OS 10.0.9","PAN-OS 10.0.8-h10","PAN-OS 10.0.8-h9","PAN-OS 10.0.8-h8","PAN-OS 10.0.8-h7","PAN-OS 10.0.8-h6","PAN-OS 10.0.8-h5","PAN-OS 10.0.8-h4","PAN-OS 10.0.8-h3","PAN-OS 10.0.8-h2","PAN-OS 10.0.8-h1","PAN-OS 10.0.8","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.15","PAN-OS 9.1.14-h7","PAN-OS 9.1.14-h6","PAN-OS 9.1.14-h5","PAN-OS 9.1.14-h4","PAN-OS 9.1.14-h3","PAN-OS 9.1.14-h2","PAN-OS 9.1.14-h1","PAN-OS 9.1.14","PAN-OS 9.1.13-h4","PAN-OS 9.1.13-h3","PAN-OS 9.1.13-h2","PAN-OS 9.1.13-h1","PAN-OS 9.1.13","PAN-OS 9.1.12-h6","PAN-OS 9.1.12-h5","PAN-OS 9.1.12-h4","PAN-OS 9.1.12-h3","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h4","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.16-h5","PAN-OS 9.0.16-h4","PAN-OS 9.0.16-h3","PAN-OS 9.0.16-h2","PAN-OS 9.0.16-h1","PAN-OS 9.0.16","PAN-OS 9.0.15","PAN-OS 9.0.14-h4","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.23-h1","PAN-OS 8.1.23","PAN-OS 8.1.22","PAN-OS 8.1.21-h1","PAN-OS 8.1.21","PAN-OS 8.1.20-h1","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.1 All","status":"unaffected"},{"version":"10.2 All","status":"unaffected"},{"version":"11.0 All","status":"unaffected"},{"version":"11.1 All","status":"unaffected"},{"version":"8.1","status":"affected","lessThan":"8.1.24","versionType":"custom","changes":[{"at":"8.1.24","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.17","versionType":"custom","changes":[{"at":"9.0.17","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.15-h1","versionType":"custom","changes":[{"at":"9.1.15-h1","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.12","versionType":"custom","changes":[{"at":"10.0.12","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2024-3384"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks rqu for discovering and reporting this issue."}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","baseSeverity":"HIGH","baseScore":8.2,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-1286 Improper Validation of Syntactic Correctness of Input","cweId":"CWE-1286"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["PAN-198992"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This issue affects only PAN-OS configurations with NTLM authentication enabled. You should verify whether NTLM authentication is enabled by checking your firewall web interface (Device > User Identification > User Mapping > Palo Alto Networks User-ID Agent Setup > NTLM).","supportingMedia":{"value":"This issue affects only PAN-OS configurations with NTLM authentication enabled. You should verify whether NTLM authentication is enabled by checking your firewall web interface (Device > User Identification > User Mapping > Palo Alto Networks User-ID Agent Setup > NTLM).","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.15-h1, PAN-OS 10.0.12, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.15-h1, PAN-OS 10.0.12, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2024-04-10T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-6790","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2023-12-13T00:00:00","dateReserved":"2023-12-13T00:00:00","dateUpdated":"2023-12-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: DOM-Based Cross-Site Scripting (XSS) Vulnerability in the Web Interface","datePublic":"2023-12-13T17:00:00.000Z","providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2023-12-13T18:15:48.142Z"},"descriptions":[{"lang":"en","value":"A DOM-Based cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to execute a JavaScript payload in the context of an administrator’s browser when they view a specifically crafted link to the PAN-OS web interface.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A DOM-Based cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to execute a JavaScript payload in the context of an administrator’s browser when they view a specifically crafted link to the PAN-OS web interface.</pre>"}]}],"x_affectedList":["PAN-OS 11.0.0","PAN-OS 11.0","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1","PAN-OS 10.2.0","PAN-OS 10.2","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.11-h1","PAN-OS 10.0.11","PAN-OS 10.0.10","PAN-OS 10.0.9","PAN-OS 10.0.8-h8","PAN-OS 10.0.8-h7","PAN-OS 10.0.8-h6","PAN-OS 10.0.8-h5","PAN-OS 10.0.8-h4","PAN-OS 10.0.8-h3","PAN-OS 10.0.8-h2","PAN-OS 10.0.8-h1","PAN-OS 10.0.8","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.15-h1","PAN-OS 9.1.15","PAN-OS 9.1.14-h4","PAN-OS 9.1.14-h3","PAN-OS 9.1.14-h2","PAN-OS 9.1.14-h1","PAN-OS 9.1.14","PAN-OS 9.1.13-h3","PAN-OS 9.1.13-h2","PAN-OS 9.1.13-h1","PAN-OS 9.1.13","PAN-OS 9.1.12-h3","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.16-h3","PAN-OS 9.0.16-h2","PAN-OS 9.0.16-h1","PAN-OS 9.0.16","PAN-OS 9.0.15","PAN-OS 9.0.14-h4","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.24-h1","PAN-OS 8.1.24","PAN-OS 8.1.23-h1","PAN-OS 8.1.23","PAN-OS 8.1.22","PAN-OS 8.1.21-h1","PAN-OS 8.1.21","PAN-OS 8.1.20-h1","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","Cloud NGFW"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"11.1 All","status":"unaffected"},{"version":"8.1","status":"affected","lessThan":"8.1.25","versionType":"custom","changes":[{"at":"8.1.25","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.17","versionType":"custom","changes":[{"at":"9.0.17","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.16","versionType":"custom","changes":[{"at":"9.1.16","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.9","versionType":"custom","changes":[{"at":"10.1.9","status":"unaffected"}]},{"version":"10.2","status":"affected","lessThan":"10.2.4","versionType":"custom","changes":[{"at":"10.2.4","status":"unaffected"}]},{"version":"11.0","status":"affected","lessThan":"11.0.1","versionType":"custom","changes":[{"at":"11.0.1","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.12","versionType":"custom","changes":[{"at":"10.0.12","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2023-3284"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Kajetan Rostojek for discovering and reporting this issue."}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"ACTIVE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"AUTOMATIC","valueDensity":"DIFFUSE","vulnerabilityResponseEffort":"LOW","providerUrgency":"AMBER","baseSeverity":"HIGH","baseScore":7.5,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/AU:Y/R:A/V:D/RE:L/U:Amber"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","cweId":"CWE-79"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["PAN-193367"],"discovery":"EXTERNAL"},"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.25, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.12, PAN-OS 10.1.9, PAN-OS 10.2.4, PAN-OS 11.0.1, and all later PAN-OS versions.\n\nPlease note that customers impacted by the PAN-OS root and default certificate expiration issue must carefully select the fixed version of PAN-OS they upgrade their devices to when addressing this vulnerability to not reintroduce the certificate issue. More information and support for the certificate expiration issue in PAN-OS is available at https://live.paloaltonetworks.com/t5/customer-advisories/emergency-update-required-pan-os-root-and-default-certificate/ta-p/564672.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.25, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.12, PAN-OS 10.1.9, PAN-OS 10.2.4, PAN-OS 11.0.1, and all later PAN-OS versions.\n\nPlease note that customers impacted by the PAN-OS root and default certificate expiration issue must carefully select the fixed version of PAN-OS they upgrade their devices to when addressing this vulnerability to not reintroduce the certificate issue. More information and support for the certificate expiration issue in PAN-OS is available at https://live.paloaltonetworks.com/t5/customer-advisories/emergency-update-required-pan-os-root-and-default-certificate/ta-p/564672.","type":"text/html","base64":false}}],"timeline":[{"time":"2023-12-13T17:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-38802","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2023-09-13T16:00:00.000Z","dateReserved":"2023-09-13T16:00:00.000Z","dateUpdated":"2024-01-18T00:00:00.000000Z"},"containers":{"cna":{"title":" PAN-OS: Denial-of-Service (DoS) Vulnerability in BGP Software","datePublic":"2023-09-13T16:00:00.000Z","providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2023-11-15T05:07:02.171314"},"descriptions":[{"lang":"en","value":"BGP software such as FRRouting FRR included as part of the PAN-OS, Prisma SD-WAN ION, and Prisma Access routing features enable a remote attacker to incorrectly reset network sessions though an invalid BGP update. This issue is applicable only to devices and appliances with BGP routing features enabled.\n\nThis issue requires the remote attacker to control at least one established BGP session that is propagated to the router to exploit it. The denial-of-service (DoS) impact on the network is dependent on the network's architecture and fault tolerant design.\n\nPrisma Access ‘Security Processing Node Endpoint Remote Network (SP-RN/Branches)' and 'Service Connections (SCs/CANs)' nodes do not peer with the Internet and do not receive Internet routes directly unless explicitly configured by the customer. Prisma Access Nodes are commonly protected by unaffected customer-premise equipment (CPE router devices). Hence the impact of this issue on Prisma Access is limited.\n\nFurther details about this issue can be found at: https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>BGP software such as FRRouting FRR included as part of the PAN-OS, Prisma SD-WAN ION, and Prisma Access routing features enable a remote attacker to incorrectly reset network sessions though an invalid BGP update. This issue is applicable only to devices and appliances with BGP routing features enabled.\n\nThis issue requires the remote attacker to control at least one established BGP session that is propagated to the router to exploit it. The denial-of-service (DoS) impact on the network is dependent on the network's architecture and fault tolerant design.\n\nPrisma Access ‘Security Processing Node Endpoint Remote Network (SP-RN/Branches)' and 'Service Connections (SCs/CANs)' nodes do not peer with the Internet and do not receive Internet routes directly unless explicitly configured by the customer. Prisma Access Nodes are commonly protected by unaffected customer-premise equipment (CPE router devices). Hence the impact of this issue on Prisma Access is limited.\n\nFurther details about this issue can be found at: https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling\n</pre>"}]}],"x_affectedList":["Prisma SD-WAN ION 6.2","Prisma SD-WAN ION 6.1","Prisma Access","PAN-OS 11.0.2-h1","PAN-OS 11.0.2","PAN-OS 11.0.1-h2","PAN-OS 11.0.1-h1","PAN-OS 11.0.1","PAN-OS 11.0.0","PAN-OS 11.0","PAN-OS 10.2.5","PAN-OS 10.2.4-h4","PAN-OS 10.2.4-h3","PAN-OS 10.2.4-h2","PAN-OS 10.2.4-h1","PAN-OS 10.2.4","PAN-OS 10.2.3-h4","PAN-OS 10.2.3-h3","PAN-OS 10.2.3-h2","PAN-OS 10.2.3-h1","PAN-OS 10.2.3","PAN-OS 10.2.2-h2","PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1","PAN-OS 10.2.0","PAN-OS 10.2","PAN-OS 10.1.10-h2","PAN-OS 10.1.10-h1","PAN-OS 10.1.10","PAN-OS 10.1.9-h3","PAN-OS 10.1.9-h2","PAN-OS 10.1.9-h1","PAN-OS 10.1.9","PAN-OS 10.1.8-h2","PAN-OS 10.1.8-h1","PAN-OS 10.1.8","PAN-OS 10.1.7","PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 9.1.16-h2","PAN-OS 9.1.16-h1","PAN-OS 9.1.16","PAN-OS 9.1.15-h1","PAN-OS 9.1.15","PAN-OS 9.1.14-h4","PAN-OS 9.1.14-h3","PAN-OS 9.1.14-h2","PAN-OS 9.1.14-h1","PAN-OS 9.1.14","PAN-OS 9.1.13-h3","PAN-OS 9.1.13-h2","PAN-OS 9.1.13-h1","PAN-OS 9.1.13","PAN-OS 9.1.12-h3","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"11.0","status":"affected","lessThan":"11.0.3","versionType":"custom","changes":[{"at":"11.0.3","status":"unaffected"}]},{"version":"10.2","status":"affected","lessThan":"10.2.6","versionType":"custom","changes":[{"at":"10.2.6","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.11","versionType":"custom","changes":[{"at":"10.1.11","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.16-h3","versionType":"custom","changes":[{"at":"9.1.16-h3","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.26","versionType":"custom","changes":[{"at":"8.1.26","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.17-h4","versionType":"custom","changes":[{"at":"9.0.17-h4","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"Customers whose most recent software upgrade was before 09/30","status":"affected"},{"version":"Customers who have received a software upgrade or are using new software on or after 09/30","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Prisma SD-WAN ION","versions":[{"version":"5.6 All","status":"unaffected"},{"version":"6.1","status":"affected","lessThan":"6.1.5","versionType":"custom","changes":[{"at":"6.1.5","status":"unaffected"}]},{"version":"6.2","status":"affected","lessThan":"6.2.3","versionType":"custom","changes":[{"at":"6.2.3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2023-38802"},{"tags":["x_refsource_CONFIRM"],"url":"https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Ben Cartwright-Cox for discovering this issue in BGP implementations."}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"YES","Recovery":"AUTOMATIC","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"LOW","providerUrgency":"AMBER","baseSeverity":"HIGH","baseScore":8.2,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:Y/R:A/V:C/RE:L/U:Amber"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-754 Improper Check for Unusual or Exceptional Conditions","cweId":"CWE-754"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["PAN-227523"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only to devices and appliances that are configured with BGP routing features enabled. You can verify whether BGP is enabled for a router by selecting it from 'Network > Virtual Routers’ or 'Network > Logical Routers’ in the web interface of PAN-OS firewalls.\n\nTo exploit this issue, the remote attacker must control at least one established BGP session that is propagated to the router.","supportingMedia":{"value":"This issue is applicable only to devices and appliances that are configured with BGP routing features enabled. You can verify whether BGP is enabled for a router by selecting it from 'Network > Virtual Routers’ or 'Network > Logical Routers’ in the web interface of PAN-OS firewalls.\n\nTo exploit this issue, the remote attacker must control at least one established BGP session that is propagated to the router.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"You can prevent exploitation of this issue by inserting an unaffected BGP router—configured to drop the invalid BGP update instead of propagating it—between the attacker-originated BGP update and PAN-OS, Prisma SD-WAN ION, and Prisma Access devices. This stops the invalid BGP update from reaching the affected router.","supportingMedia":{"value":"You can prevent exploitation of this issue by inserting an unaffected BGP router—configured to drop the invalid BGP update instead of propagating it—between the attacker-originated BGP update and PAN-OS, Prisma SD-WAN ION, and Prisma Access devices. This stops the invalid BGP update from reaching the affected router.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue targeting our customers. However, knowledge of invalid BGP attributes that trigger this issue is publicly available.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue targeting our customers. However, knowledge of invalid BGP attributes that trigger this issue is publicly available.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.26, PAN-OS 9.0.17-h4, PAN-OS 9.1.16-h3, PAN-OS 10.1.11, PAN-OS 10.2.6, PAN-OS 11.0.3, and all later PAN-OS versions.\n\nThis issue is fixed in Prisma SD-WAN ION 6.1.5, Prisma SD-WAN ION 6.2.3, and all later Prisma SD-WAN ION versions. This issue does not impact Prisma SD-WAN ION 5.6 versions.\n\nFor Prisma Access customers, the upgrade to fix this issue will be available on 09/30. Customers should work with their Prisma Access contacts and support to secure a maintenance window for the on-demand software upgrade.\n\nPlease note that full Prisma Access data plane upgrades scheduled on and after 09/30 will have this fix incorporated by default. No additional action is necessary for these customers to remediate this issue.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.26, PAN-OS 9.0.17-h4, PAN-OS 9.1.16-h3, PAN-OS 10.1.11, PAN-OS 10.2.6, PAN-OS 11.0.3, and all later PAN-OS versions.\n\nThis issue is fixed in Prisma SD-WAN ION 6.1.5, Prisma SD-WAN ION 6.2.3, and all later Prisma SD-WAN ION versions. This issue does not impact Prisma SD-WAN ION 5.6 versions.\n\nFor Prisma Access customers, the upgrade to fix this issue will be available on 09/30. Customers should work with their Prisma Access contacts and support to secure a maintenance window for the on-demand software upgrade.\n\nPlease note that full Prisma Access data plane upgrades scheduled on and after 09/30 will have this fix incorporated by default. No additional action is necessary for these customers to remediate this issue.","type":"text/html","base64":false}}],"timeline":[{"time":"2023-12-13T17:00:00.000Z","lang":"eng","value":"Updated the ETA for the fix in Prisma SD-WAN ION 6.2"},{"time":"2023-12-09T00:00:00.000Z","lang":"eng","value":"Updated availability of the fix in PAN-OS 8.1.26 and PAN-OS 9.0.17-h4"},{"time":"2023-11-08T17:00:00.000Z","lang":"eng","value":"Updated availability of the fix in PAN-OS 11.0.3 and added CVSS 4.0 scoring"},{"time":"2023-11-08T17:00:00.000Z","lang":"eng","value":"A fix for this issue is being developed for PAN-OS 8.1 and PAN-OS 9.0"},{"time":"2023-11-02T21:05:00.000Z","lang":"eng","value":"Updated the ETA for the fix in PAN-OS 11.0.3"},{"time":"2023-10-24T02:20:00.000Z","lang":"eng","value":"Updated availability of the fix in Prisma SD-WAN ION 6.1.5"},{"time":"2023-10-16T16:15:00.000Z","lang":"eng","value":"Updated the ETA for the fix in Prisma SD-WAN ION 6.1"},{"time":"2023-10-11T16:00:00.000Z","lang":"eng","value":"Updated the ETA for the fix in PAN-OS 11.0.3"},{"time":"2023-10-04T02:05:00.000Z","lang":"eng","value":"Updated availability of the fix in PAN-OS 9.1.16-h3"},{"time":"2023-09-28T04:45:00.000Z","lang":"eng","value":"Updated availability of the fix in PAN-OS 10.1.11 and 10.2.6"},{"time":"2023-09-22T00:02:00.000Z","lang":"eng","value":"Updated guidance for Prisma Access customers"},{"time":"2023-09-16T00:34:00.000Z","lang":"eng","value":"Prisma SD-WAN ION is confirmed to be impacted"},{"time":"2023-09-15T01:00:00.000Z","lang":"eng","value":"The impact of this issue is under investigation for Prisma Access"},{"time":"2023-09-13T16:00:00.000Z","lang":"eng","value":"Initial Publication"},{"time":"2024-01-18T18:00:00.000Z","lang":"eng","value":"Updated availability of the fix in Prisma SD-WAN ION 6.2.3"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-0030","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2022-10-12T00:00:00","dateReserved":"2022-10-12T00:00:00","dateUpdated":"2022-10-12T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Authentication Bypass in Web Interface","datePublic":"2022-10-12T16:00:00.000Z","providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2022-10-12T00:00:00"},"descriptions":[{"lang":"en","value":"An authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface allows a network-based attacker with specific knowledge of the target firewall or Panorama appliance to impersonate an existing PAN-OS administrator and perform privileged actions.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An authentication bypass vulnerability in the Palo Alto Networks PAN-OS 8.1 web interface allows a network-based attacker with specific knowledge of the target firewall or Panorama appliance to impersonate an existing PAN-OS administrator and perform privileged actions.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.23-h1","PAN-OS 8.1.23","PAN-OS 8.1.22","PAN-OS 8.1.21-h1","PAN-OS 8.1.21","PAN-OS 8.1.20-h1","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0 All","status":"unaffected"},{"version":"9.1 All","status":"unaffected"},{"version":"10.1 All","status":"unaffected"},{"version":"10.2 All","status":"unaffected"},{"version":"10.0 All","status":"unaffected"},{"version":"8.1","status":"affected","lessThan":"8.1.24","versionType":"custom","changes":[{"at":"8.1.24","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2022-0030"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks the security researcher that discovered and reported this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-290 Authentication Bypass by Spoofing","cweId":"CWE-290"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-195571"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Customers with a Threat Prevention subscription can block known attacks for this vulnerability by enabling Threat ID 92720 (Applications and Threats content update 8630-7638).\n\nTo exploit this issue, the attacker must have network access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices.","supportingMedia":{"value":"Customers with a Threat Prevention subscription can block known attacks for this vulnerability by enabling Threat ID 92720 (Applications and Threats content update 8630-7638).\n\nTo exploit this issue, the attacker must have network access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.24 and all later PAN-OS versions.\n\nPlease note that PAN-OS 8.1 has reached its software end-of-life (EoL) and is supported only on PA-200, PA-500, and PA-5000 Series firewalls and on M-100 appliances and only until each of their respective hardware EoL dates:  https://www.paloaltonetworks.com/services/support/end-of-life-announcements/hardware-end-of-life-dates.html.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.24 and all later PAN-OS versions.\n\nPlease note that PAN-OS 8.1 has reached its software end-of-life (EoL) and is supported only on PA-200, PA-500, and PA-5000 Series firewalls and on M-100 appliances and only until each of their respective hardware EoL dates:  https://www.paloaltonetworks.com/services/support/end-of-life-announcements/hardware-end-of-life-dates.html.","type":"text/html","base64":false}}],"timeline":[{"time":"2022-10-12T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-0028","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2022-08-10T00:00:00","dateReserved":"2022-08-10T00:00:00","dateUpdated":"2022-08-19T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Reflected Amplification Denial-of-Service (DoS) Vulnerability in URL Filtering","datePublic":"2022-08-10T16:00:00.000Z","providerMetadata":{"dateUpdated":"2022-08-10T16:00:16","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series (virtual) and CN-Series (container) firewall against an attacker-specified target.\n\nTo be misused by an external attacker, the firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a security rule with a source zone that has an external facing network interface. This configuration is not typical for URL filtering and, if set, is likely unintended by the administrator.\n\nIf exploited, this issue would not impact the confidentiality, integrity, or availability of our products. However, the resulting denial-of-service (DoS) attack may help obfuscate the identity of the attacker and implicate the firewall as the source of the attack.\n\nWe have taken prompt action to address this issue in our PAN-OS software. All PAN-OS software updates for this issue are now available. This issue does not impact Panorama M-Series or Panorama virtual appliances.\n\nThis issue has been resolved for all Cloud NGFW and Prisma Access customers and no additional action is required from them.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series (virtual) and CN-Series (container) firewall against an attacker-specified target.\n\nTo be misused by an external attacker, the firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a security rule with a source zone that has an external facing network interface. This configuration is not typical for URL filtering and, if set, is likely unintended by the administrator.\n\nIf exploited, this issue would not impact the confidentiality, integrity, or availability of our products. However, the resulting denial-of-service (DoS) attack may help obfuscate the identity of the attacker and implicate the firewall as the source of the attack.\n\nWe have taken prompt action to address this issue in our PAN-OS software. All PAN-OS software updates for this issue are now available. This issue does not impact Panorama M-Series or Panorama virtual appliances.\n\nThis issue has been resolved for all Cloud NGFW and Prisma Access customers and no additional action is required from them.</pre>"}]}],"x_affectedList":["PAN-OS 10.2.2-h1","PAN-OS 10.2.2","PAN-OS 10.2.1","PAN-OS 10.2.0","PAN-OS 10.2","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.11","PAN-OS 10.0.10","PAN-OS 10.0.9","PAN-OS 10.0.8-h8","PAN-OS 10.0.8-h7","PAN-OS 10.0.8-h6","PAN-OS 10.0.8-h5","PAN-OS 10.0.8-h4","PAN-OS 10.0.8-h3","PAN-OS 10.0.8-h2","PAN-OS 10.0.8-h1","PAN-OS 10.0.8","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.14-h3","PAN-OS 9.1.14-h2","PAN-OS 9.1.14-h1","PAN-OS 9.1.14","PAN-OS 9.1.13-h3","PAN-OS 9.1.13-h2","PAN-OS 9.1.13-h1","PAN-OS 9.1.13","PAN-OS 9.1.12-h3","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.16-h2","PAN-OS 9.0.16-h1","PAN-OS 9.0.16","PAN-OS 9.0.15","PAN-OS 9.0.14-h4","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.23","PAN-OS 8.1.22","PAN-OS 8.1.21-h1","PAN-OS 8.1.21","PAN-OS 8.1.20-h1","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"Cloud NGFW","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.23-h1","versionType":"custom","changes":[{"at":"8.1.23-h1","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.16-h3","versionType":"custom","changes":[{"at":"9.0.16-h3","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.14-h4","versionType":"custom","changes":[{"at":"9.1.14-h4","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.11-h1","versionType":"custom","changes":[{"at":"10.0.11-h1","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.6-h6","versionType":"custom","changes":[{"at":"10.1.6-h6","status":"unaffected"}]},{"version":"10.2","status":"affected","lessThan":"10.2.2-h2","versionType":"custom","changes":[{"at":"10.2.2-h2","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"2.1 All","status":"unaffected"},{"version":"2.2 All","status":"unaffected"},{"version":"3.0 All","status":"unaffected"},{"version":"3.1 All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2022-0028"}],"credits":[{"lang":"en","value":"This issue was responsibly reported to Palo Alto Networks by Excellium-Services S.A. CSIRT, CERT-XLM."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":8.6,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-406 Insufficient Control of Network Message Volume (Network Amplification)","cweId":"CWE-406"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-192999"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"The firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a security rule with a source zone that has an external facing interface for this issue to be misused by an external attacker. This configuration is not typical for URL filtering and is likely unintended by the administrator.\n\nThis issue is applicable to PA-Series (hardware), VM-Series (virtual), and CN-Series (container) firewalls only when all three of the following conditions are true:\n\n1. The security policy on the firewall that allows traffic to pass from Zone A to Zone B includes a URL filtering profile with one or more blocked categories;\nAND\n2. Packet-based attack protection is not enabled in a Zone Protection profile for Zone A including both (Packet Based Attack Protection > TCP Drop > TCP Syn With Data) and (Packet Based Attack Protection > TCP Drop > Strip TCP Options > TCP Fast Open);\nAND\n3. Flood protection through SYN cookies is not enabled in a Zone Protection profile for Zone A (Flood Protection > SYN > Action > SYN Cookie) with an activation threshold of 0 connections.","supportingMedia":{"value":"The firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a security rule with a source zone that has an external facing interface for this issue to be misused by an external attacker. This configuration is not typical for URL filtering and is likely unintended by the administrator.\n\nThis issue is applicable to PA-Series (hardware), VM-Series (virtual), and CN-Series (container) firewalls only when all three of the following conditions are true:\n\n1. The security policy on the firewall that allows traffic to pass from Zone A to Zone B includes a URL filtering profile with one or more blocked categories;\nAND\n2. Packet-based attack protection is not enabled in a Zone Protection profile for Zone A including both (Packet Based Attack Protection > TCP Drop > TCP Syn With Data) and (Packet Based Attack Protection > TCP Drop > Strip TCP Options > TCP Fast Open);\nAND\n3. Flood protection through SYN cookies is not enabled in a Zone Protection profile for Zone A (Flood Protection > SYN > Action > SYN Cookie) with an activation threshold of 0 connections.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"If you have a URL filtering policy with one or more blocked categories assigned to a security rule with a source zone that has an external facing interface, removing this configuration will prevent this issue from being exploited by remote attackers to conduct reflected DoS.\n\nTo prevent denial-of-service (DoS) attacks resulting from this issue from all sources, you can configure your Palo Alto Networks firewalls by enabling one of two zone protection mitigations on all Security zones with an assigned Security policy that includes a URL filtering profile:\n\n1. Packet-based attack protection including both (Packet Based Attack Protection > TCP Drop > TCP SYN with Data) and (Packet Based Attack Protection > TCP Drop > Strip TCP Options > TCP Fast Open);\nOR\n2. Flood protection (Flood Protection > SYN > Action > SYN Cookie) with an activation threshold of 0 connections.\n\nNOTES:\nIt is not necessary nor advantageous to apply both the attack and flood protections. \n(Palo Alto Networks Aporeto software only) You should not enable either of these protections if using Aporeto software; instead, wait for and install a fixed version of PAN-OS software.\n\nPacket-Based Attack Protection Workaround (Recommended)\n\nFollow the technical documentation to configure packet-based attack protection options for all defined Security zones with URL filtering enabled in the Security profile for that zone:\nhttps://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/zone-protection-and-dos-protection/configure-zone-protection-to-increase-network-security/configure-packet-based-attack-protection\n\nThe packet-based attack protection workaround will prevent the firewall from establishing TCP sessions in impacted zones when the TCP SYN packet contains data in the three-way handshake for a TCP session. Please note that this workaround may disrupt applications that use TCP Fast Open in the zone.\n\nFlood Protection (Alternate) Workaround\n\nIf you instead decide to enable the flood protection workaround, first make sure you understand how  enabling SYN cookies will change traffic flow in the impacted zones:\nhttps://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/zone-protection-and-dos-protection/zone-defense/zone-protection-profiles/flood-protection","supportingMedia":{"value":"If you have a URL filtering policy with one or more blocked categories assigned to a security rule with a source zone that has an external facing interface, removing this configuration will prevent this issue from being exploited by remote attackers to conduct reflected DoS.\n\nTo prevent denial-of-service (DoS) attacks resulting from this issue from all sources, you can configure your Palo Alto Networks firewalls by enabling one of two zone protection mitigations on all Security zones with an assigned Security policy that includes a URL filtering profile:\n\n1. Packet-based attack protection including both (Packet Based Attack Protection > TCP Drop > TCP SYN with Data) and (Packet Based Attack Protection > TCP Drop > Strip TCP Options > TCP Fast Open);\nOR\n2. Flood protection (Flood Protection > SYN > Action > SYN Cookie) with an activation threshold of 0 connections.\n\nNOTES:\nIt is not necessary nor advantageous to apply both the attack and flood protections. \n(Palo Alto Networks Aporeto software only) You should not enable either of these protections if using Aporeto software; instead, wait for and install a fixed version of PAN-OS software.\n\nPacket-Based Attack Protection Workaround (Recommended)\n\nFollow the technical documentation to configure packet-based attack protection options for all defined Security zones with URL filtering enabled in the Security profile for that zone:\nhttps://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/zone-protection-and-dos-protection/configure-zone-protection-to-increase-network-security/configure-packet-based-attack-protection\n\nThe packet-based attack protection workaround will prevent the firewall from establishing TCP sessions in impacted zones when the TCP SYN packet contains data in the three-way handshake for a TCP session. Please note that this workaround may disrupt applications that use TCP Fast Open in the zone.\n\nFlood Protection (Alternate) Workaround\n\nIf you instead decide to enable the flood protection workaround, first make sure you understand how  enabling SYN cookies will change traffic flow in the impacted zones:\nhttps://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/zone-protection-and-dos-protection/zone-defense/zone-protection-profiles/flood-protection","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks recently learned that an attempted reflected denial-of-service (RDoS) attack was identified by a service provider. This attempted attack took advantage of susceptible firewalls from multiple vendors, including Palo Alto Networks. We immediately started to root cause and remediate this issue.\n\nExploitation of this issue does not impact the confidentiality, integrity, or availability of our products.\n","supportingMedia":{"value":"Palo Alto Networks recently learned that an attempted reflected denial-of-service (RDoS) attack was identified by a service provider. This attempted attack took advantage of susceptible firewalls from multiple vendors, including Palo Alto Networks. We immediately started to root cause and remediate this issue.\n\nExploitation of this issue does not impact the confidentiality, integrity, or availability of our products.\n","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"We identified workarounds to prevent the denial-of-service (DoS) attacks that result from this issue in certain Palo Alto Networks firewalls, with this policy configuration.\n\nThis issue is fixed in PAN-OS 8.1.23-h1, PAN-OS 9.0.16-h3, PAN-OS 9.1.14-h4, PAN-OS 10.0.11-h1, PAN-OS 10.1.6-h6, PAN-OS 10.2.2-h2, and all later PAN-OS versions for PA-Series, VM-Series and CN-Series firewalls.\n\nAll PAN-OS software updates for this issue are now available.","supportingMedia":{"value":"We identified workarounds to prevent the denial-of-service (DoS) attacks that result from this issue in certain Palo Alto Networks firewalls, with this policy configuration.\n\nThis issue is fixed in PAN-OS 8.1.23-h1, PAN-OS 9.0.16-h3, PAN-OS 9.1.14-h4, PAN-OS 10.0.11-h1, PAN-OS 10.1.6-h6, PAN-OS 10.2.2-h2, and all later PAN-OS versions for PA-Series, VM-Series and CN-Series firewalls.\n\nAll PAN-OS software updates for this issue are now available.","type":"text/html","base64":false}}],"timeline":[{"time":"2022-08-10T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2022-08-10T23:10:00.000Z","lang":"eng","value":"PAN-OS 10.1.6-h6 fixed version is now available. Updated ETA for PAN-OS 8.1.23-h1. Clarified URL filtering assignment language."},{"time":"2022-08-12T02:45:00.000Z","lang":"eng","value":"An update to the acknowledgements section of the advisory."},{"time":"2022-08-16T00:42:00.000Z","lang":"eng","value":"PAN-OS 8.1.23-h1 fixed version is now available."},{"time":"2022-08-18T23:38:00.000Z","lang":"eng","value":"PAN-OS 10.2.2-h2 fixed version is now available."},{"time":"2022-08-19T16:22:00.000Z","lang":"eng","value":"PAN-OS 9.0.16-h3, PAN-OS 9.1.14-h4, and PAN-OS 10.0.11-h1 fixed versions are now available."}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-0024","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2022-05-11T00:00:00","dateReserved":"2022-05-11T00:00:00","dateUpdated":"2022-05-11T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Improper Neutralization Vulnerability Leads to Unintended Program Execution During Configuration Commit","datePublic":"2022-05-11T16:00:00.000Z","providerMetadata":{"dateUpdated":"2022-05-11T16:30:22","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A vulnerability exists in Palo Alto Networks PAN-OS software that enables an authenticated network-based PAN-OS administrator to upload a specifically created configuration that disrupts system processes and potentially execute arbitrary code with root privileges when the configuration is committed on both hardware and virtual firewalls.\n\nThis issue does not impact Panorama appliances or Prisma Access customers.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists in Palo Alto Networks PAN-OS software that enables an authenticated network-based PAN-OS administrator to upload a specifically created configuration that disrupts system processes and potentially execute arbitrary code with root privileges when the configuration is committed on both hardware and virtual firewalls.\n\nThis issue does not impact Panorama appliances or Prisma Access customers.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.23;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.16;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.13;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.10;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.5.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.23;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.16;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.13;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.10;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.5.\n</pre>"}]}],"x_affectedList":["PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.9","PAN-OS 10.0.8-h8","PAN-OS 10.0.8-h7","PAN-OS 10.0.8-h6","PAN-OS 10.0.8-h5","PAN-OS 10.0.8-h4","PAN-OS 10.0.8-h3","PAN-OS 10.0.8-h2","PAN-OS 10.0.8-h1","PAN-OS 10.0.8","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.12-h3","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.15","PAN-OS 9.0.14-h4","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.22","PAN-OS 8.1.21-h1","PAN-OS 8.1.21","PAN-OS 8.1.20-h1","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.1","status":"affected","lessThan":"9.1.13","versionType":"custom","changes":[{"at":"9.1.13","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.5","versionType":"custom","changes":[{"at":"10.1.5","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.16","versionType":"custom","changes":[{"at":"9.0.16","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.23","versionType":"custom","changes":[{"at":"8.1.23","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.10","versionType":"custom","changes":[{"at":"10.0.10","status":"unaffected"}]},{"version":"10.2.0","status":"unaffected","lessThan":"10.2*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2022-0024"}],"credits":[{"lang":"en","value":" This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-138 Improper Neutralization of Special Elements","cweId":"CWE-138"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-177551"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue requires the attacker to have authenticated access to the PAN-OS management interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue requires the attacker to have authenticated access to the PAN-OS management interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.23, PAN-OS 9.0.16, PAN-OS 9.1.13, PAN-OS 10.0.10, PAN-OS 10.1.5, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.23, PAN-OS 9.0.16, PAN-OS 9.1.13, PAN-OS 10.0.10, PAN-OS 10.1.5, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2022-05-11T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-0778","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2022-03-31T00:00:00","dateReserved":"2022-03-31T00:00:00","dateUpdated":"2022-06-24T00:00:00.000000Z"},"containers":{"cna":{"title":"Impact of the OpenSSL Infinite Loop Vulnerability CVE-2022-0778","datePublic":"2022-03-31T02:30:00.000Z","providerMetadata":{"orgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","shortName":"openssl","dateUpdated":"2024-06-21T19:07:01.186352"},"descriptions":[{"lang":"en","value":"The Palo Alto Networks Product Security Assurance team has evaluated the OpenSSL infinite loop vulnerability (CVE-2022-0778) as it relates to our products.\n\nThis vulnerability causes the OpenSSL library to enter an infinite loop when parsing an invalid certificate and can result in a Denial-of-Service (DoS) to the application. An attacker does not need a verified certificate to exploit this vulnerability because parsing a bad certificate triggers the infinite loop before the verification process is completed.\n\nThe Prisma Cloud and Cortex XSOAR products are not impacted by this vulnerability. However, PAN-OS, GlobalProtect app, and Cortex XDR agent software contain a vulnerable version of the OpenSSL library and product availability is impacted by this vulnerability. For PAN-OS software, this includes both hardware and virtual firewalls and Panorama appliances as well as Prisma Access customers. This vulnerability has reduced severity on Cortex XDR agent and GlobalProtect app as successful exploitation requires a meddler-in-the-middle attack (MITM): 5.9 Medium (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).\n\nAll fixed versions of Cortex XDR agent, GlobalProtect app, and PAN-OS are now available.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The Palo Alto Networks Product Security Assurance team has evaluated the OpenSSL infinite loop vulnerability (CVE-2022-0778) as it relates to our products.\n\nThis vulnerability causes the OpenSSL library to enter an infinite loop when parsing an invalid certificate and can result in a Denial-of-Service (DoS) to the application. An attacker does not need a verified certificate to exploit this vulnerability because parsing a bad certificate triggers the infinite loop before the verification process is completed.\n\nThe Prisma Cloud and Cortex XSOAR products are not impacted by this vulnerability. However, PAN-OS, GlobalProtect app, and Cortex XDR agent software contain a vulnerable version of the OpenSSL library and product availability is impacted by this vulnerability. For PAN-OS software, this includes both hardware and virtual firewalls and Panorama appliances as well as Prisma Access customers. This vulnerability has reduced severity on Cortex XDR agent and GlobalProtect app as successful exploitation requires a meddler-in-the-middle attack (MITM): 5.9 Medium (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).\n\nAll fixed versions of Cortex XDR agent, GlobalProtect app, and PAN-OS are now available.</pre>"}]},{"lang":"en","value":"This issue impacts the following versions of PAN-OS:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.23;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.16-h2;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.13-h3;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.10;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.5-h1;\nPAN-OS 10.2 versions earlier than PAN-OS 10.2.1.\n\n\nThis issue impacts the following versions of GlobalProtect app:\nGlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.11;\nGlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.12;\nGlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.4;\nGlobalProtect app 6.0 versions earlier than GlobalProtect app 6.0.1 on Windows and macOS;\nGlobalProtect app 6.0 versions earlier than GlobalProtect app 6.0.2 on Android and iOS.\n\n\nThis issue impacts the following versions and builds of Cortex XDR agent:\nCortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9 hotfix build 6.1.9.61370 on Windows;\nCortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.7 hotfix build 6.1.7.1690 on macOS;\nCortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.7 hotfix build 6.1.7.60245 on Linux;\nAll versions and builds of Cortex XDR agent 7.4;\nCortex XDR agent 7.5-CE versions earlier than Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.60642 on Windows;\nCortex XDR agent 7.5-CE versions earlier than Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.2276 on macOS;\nCortex XDR agent 7.5-CE versions earlier than Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.59687 on Linux\nCortex XDR agent 7.5 versions earlier than Cortex XDR agent 7.5.3 build 7.5.3.60113 on Windows;\nCortex XDR agent 7.5 versions earlier than Cortex XDR agent 7.5.3 build 7.5.3.2265 on macOS;\nCortex XDR agent 7.5 versions earlier than Cortex XDR agent 7.5.3 build 7.5.3.59465 on Linux;\nCortex XDR agent 7.6 versions earlier than Cortex XDR agent 7.6.2 hotfix build 7.6.2.60545 on Windows;\nCortex XDR agent 7.6 versions earlier than Cortex XDR agent 7.6.2 hotfix build 7.6.2.2311 on macOS;\nCortex XDR agent 7.6 versions earlier than Cortex XDR agent 7.6.2 hotfix build 7.6.2.59612 on Linux;\nCortex XDR agent 7.7 versions earlier than Cortex XDR agent 7.7.0 hotfix build 7.7.0.60725 on Windows;\nCortex XDR agent 7.7 versions earlier than Cortex XDR agent 7.7.0 hotfix build 7.7.0.2356 on macOS;\nCortex XDR agent 7.7 versions earlier than Cortex XDR agent 7.7.0 hotfix build 7.7.0.59559 on Linux.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts the following versions of PAN-OS:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.23;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.16-h2;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.13-h3;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.10;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.5-h1;\nPAN-OS 10.2 versions earlier than PAN-OS 10.2.1.\n\n\nThis issue impacts the following versions of GlobalProtect app:\nGlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.11;\nGlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.12;\nGlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.4;\nGlobalProtect app 6.0 versions earlier than GlobalProtect app 6.0.1 on Windows and macOS;\nGlobalProtect app 6.0 versions earlier than GlobalProtect app 6.0.2 on Android and iOS.\n\n\nThis issue impacts the following versions and builds of Cortex XDR agent:\nCortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9 hotfix build 6.1.9.61370 on Windows;\nCortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.7 hotfix build 6.1.7.1690 on macOS;\nCortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.7 hotfix build 6.1.7.60245 on Linux;\nAll versions and builds of Cortex XDR agent 7.4;\nCortex XDR agent 7.5-CE versions earlier than Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.60642 on Windows;\nCortex XDR agent 7.5-CE versions earlier than Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.2276 on macOS;\nCortex XDR agent 7.5-CE versions earlier than Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.59687 on Linux\nCortex XDR agent 7.5 versions earlier than Cortex XDR agent 7.5.3 build 7.5.3.60113 on Windows;\nCortex XDR agent 7.5 versions earlier than Cortex XDR agent 7.5.3 build 7.5.3.2265 on macOS;\nCortex XDR agent 7.5 versions earlier than Cortex XDR agent 7.5.3 build 7.5.3.59465 on Linux;\nCortex XDR agent 7.6 versions earlier than Cortex XDR agent 7.6.2 hotfix build 7.6.2.60545 on Windows;\nCortex XDR agent 7.6 versions earlier than Cortex XDR agent 7.6.2 hotfix build 7.6.2.2311 on macOS;\nCortex XDR agent 7.6 versions earlier than Cortex XDR agent 7.6.2 hotfix build 7.6.2.59612 on Linux;\nCortex XDR agent 7.7 versions earlier than Cortex XDR agent 7.7.0 hotfix build 7.7.0.60725 on Windows;\nCortex XDR agent 7.7 versions earlier than Cortex XDR agent 7.7.0 hotfix build 7.7.0.2356 on macOS;\nCortex XDR agent 7.7 versions earlier than Cortex XDR agent 7.7.0 hotfix build 7.7.0.59559 on Linux.</pre>"}]},{"lang":"en","value":"This issue is addressed for Prisma Access customers in the Prisma Access patch rollout that will begin on May 7, 2022 and will be a phased rollout performed based on theaters. Palo Alto Networks will send an additional email notification through Prisma Access Insights one week before the rollout begins for affected tenant(s).","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue is addressed for Prisma Access customers in the Prisma Access patch rollout that will begin on May 7, 2022 and will be a phased rollout performed based on theaters. Palo Alto Networks will send an additional email notification through Prisma Access Insights one week before the rollout begins for affected tenant(s).</pre>"}]}],"x_affectedList":["Prisma Access 3.1","Prisma Access 3.0","Prisma Access 2.2","Prisma Access 2.1","PAN-OS 10.2.0","PAN-OS 10.2","PAN-OS 10.1.5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.9","PAN-OS 10.0.8-h8","PAN-OS 10.0.8-h7","PAN-OS 10.0.8-h6","PAN-OS 10.0.8-h5","PAN-OS 10.0.8-h4","PAN-OS 10.0.8-h3","PAN-OS 10.0.8-h2","PAN-OS 10.0.8-h1","PAN-OS 10.0.8","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.13-h2","PAN-OS 9.1.13-h1","PAN-OS 9.1.13","PAN-OS 9.1.12-h3","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.16-h1","PAN-OS 9.0.16","PAN-OS 9.0.15","PAN-OS 9.0.14-h4","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.22","PAN-OS 8.1.21-h1","PAN-OS 8.1.21","PAN-OS 8.1.20-h1","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","GlobalProtect App 6.0","GlobalProtect App 5.3","GlobalProtect App 5.2","GlobalProtect App 5.1","Cortex XDR Agent 7.7","Cortex XDR Agent 7.6","Cortex XDR Agent 7.5-CE","Cortex XDR Agent 7.5","Cortex XDR Agent 7.4","Cortex XDR Agent 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.23","versionType":"custom","changes":[{"at":"8.1.23","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.13-h3","versionType":"custom","changes":[{"at":"9.1.13-h3","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.10","versionType":"custom","changes":[{"at":"10.0.10","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.5-h1","versionType":"custom","changes":[{"at":"10.1.5-h1","status":"unaffected"}]},{"version":"10.2","status":"affected","lessThan":"10.2.1","versionType":"custom","changes":[{"at":"10.2.1","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.16-h2","versionType":"custom","changes":[{"at":"9.0.16-h2","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"2.1 Preferred, Innovation","status":"affected"},{"version":"2.2 Preferred","status":"affected"},{"version":"3.0 Preferred, Innovation","status":"affected"},{"version":"3.1 Preferred, Innovation","status":"affected"}]},{"vendor":"Palo Alto Networks","product":"GlobalProtect App","versions":[{"version":"6.0","status":"affected","lessThan":"6.0.1","versionType":"custom","changes":[{"at":"6.0.1","status":"unaffected"}]}],"platforms":["Windows and macOS"]},{"vendor":"Palo Alto Networks","product":"GlobalProtect App","versions":[{"version":"5.2","status":"affected","lessThan":"5.2.12","versionType":"custom","changes":[{"at":"5.2.12","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThan":"5.1.11","versionType":"custom","changes":[{"at":"5.1.11","status":"unaffected"}]},{"version":"5.3","status":"affected","lessThan":"5.3.4","versionType":"custom","changes":[{"at":"5.3.4","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"GlobalProtect App","versions":[{"version":"6.0","status":"affected","lessThan":"6.0.2","versionType":"custom","changes":[{"at":"6.0.2","status":"unaffected"}]}],"platforms":["Android and iOS"]},{"vendor":"Palo Alto Networks","product":"Cortex XSOAR","versions":[{"version":"All","status":"unaffected"}]},{"vendor":"Palo Alto Networks","product":"Cortex XDR Agent","versions":[{"version":"7.4.*","status":"affected"}]},{"vendor":"Palo Alto Networks","product":"Cortex XDR Agent","versions":[{"version":"6.1","status":"affected","lessThan":"6.1.9.61370","versionType":"custom","changes":[{"at":"6.1.9.61370","status":"unaffected"}]},{"version":"7.5-CE","status":"affected","lessThan":"7.5.100.60642","versionType":"custom","changes":[{"at":"7.5.100.60642","status":"unaffected"}]},{"version":"7.5","status":"affected","lessThan":"7.5.3.60113","versionType":"custom","changes":[{"at":"7.5.3.60113","status":"unaffected"}]},{"version":"7.6","status":"affected","lessThan":"7.6.2.60545","versionType":"custom","changes":[{"at":"7.6.2.60545","status":"unaffected"}]},{"version":"7.7","status":"affected","lessThan":"7.7.0.60725","versionType":"custom","changes":[{"at":"7.7.0.60725","status":"unaffected"}]}],"platforms":["Windows"]},{"vendor":"Palo Alto Networks","product":"Cortex XDR Agent","versions":[{"version":"7.5","status":"affected","lessThan":"7.5.3.2265","versionType":"custom","changes":[{"at":"7.5.3.2265","status":"unaffected"}]},{"version":"7.6","status":"affected","lessThan":"7.6.2.2311","versionType":"custom","changes":[{"at":"7.6.2.2311","status":"unaffected"}]},{"version":"7.7","status":"affected","lessThan":"7.7.0.2356","versionType":"custom","changes":[{"at":"7.7.0.2356","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThan":"6.1.7.1690","versionType":"custom","changes":[{"at":"6.1.7.1690","status":"unaffected"}]},{"version":"7.5-CE","status":"affected","lessThan":"7.5.100.2276","versionType":"custom","changes":[{"at":"7.5.100.2276","status":"unaffected"}]}],"platforms":["macOS"]},{"vendor":"Palo Alto Networks","product":"Cortex XDR Agent","versions":[{"version":"7.5","status":"affected","lessThan":"7.5.3.59465","versionType":"custom","changes":[{"at":"7.5.3.59465","status":"unaffected"}]},{"version":"7.6","status":"affected","lessThan":"7.6.2.59612","versionType":"custom","changes":[{"at":"7.6.2.59612","status":"unaffected"}]},{"version":"7.7","status":"affected","lessThan":"7.7.0.59559","versionType":"custom","changes":[{"at":"7.7.0.59559","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThan":"6.1.7.60245","versionType":"custom","changes":[{"at":"6.1.7.60245","status":"unaffected"}]},{"version":"7.5-CE","status":"affected","lessThan":"7.5.100.59687","versionType":"custom","changes":[{"at":"7.5.100.59687","status":"unaffected"}]}],"platforms":["Linux"]},{"vendor":"Palo Alto Networks","product":"Prisma Cloud","versions":[{"version":"All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2022-0778"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.openssl.org/news/secadv/20220315.txt"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-834 Excessive Iteration","cweId":"CWE-834"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-190175","PAN-190223"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Customers with a Threat Prevention subscription can block known attacks for this vulnerability by enabling Threat IDs 92409 and 92411 (Applications and Threats content update 8552). This mitigation reduces the risk of exploitation from known exploits.\n\nCustomers will need to upgrade their products to a fixed version to completely remove the risk of this issue.\n","supportingMedia":{"value":"Customers with a Threat Prevention subscription can block known attacks for this vulnerability by enabling Threat IDs 92409 and 92411 (Applications and Threats content update 8552). This mitigation reduces the risk of exploitation from known exploits.\n\nCustomers will need to upgrade their products to a fixed version to completely remove the risk of this issue.\n","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue on any of our products.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue on any of our products.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.23, PAN-OS 9.0.16-h2, PAN-OS 9.1.13-h3, PAN-OS 10.0.10, PAN-OS 10.1.5-h1, PAN-OS 10.2.1, and all later PAN-OS versions.\n\nThis issue is fixed in GlobalProtect app 5.1.11, GlobalProtect app 5.2.12, GlobalProtect app 5.3.4, GlobalProtect app 6.0.1 on Window and macOS, GlobalProtect app 6.0.2 on Android and iOS, and all later GlobalProtect app versions.\n\nThis issue is fixed in Cortex XDR agent 6.1.9 hotfix build 6.1.9.61370 on Windows, Cortex XDR agent 6.1.7 hotfix build 6.1.7.1690 on macOS, Cortex XDR agent 6.1.7 hotfix build 6.1.7.60245 on Linux, Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.60642 on Windows, Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.2276 on macOS, Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.59687 on Linux, Cortex XDR agent 7.5.3 build 7.5.3.60113 on Windows, Cortex XDR agent 7.5.3 build 7.5.3.2265 on macOS, Cortex XDR agent 7.5.3 build 7.5.3.59465 on Linux, Cortex XDR agent 7.6.2 hotfix build 7.6.2.60545 on Windows, Cortex XDR agent 7.6.2 hotfix build 7.6.2.2311 on macOS, Cortex XDR agent 7.6.2 hotfix build 7.6.2.59612 hotfix on Linux, Cortex XDR agent 7.7.0 hotfix build 7.7.0.60725 on Windows, Cortex XDR agent 7.7.0 hotfix build 7.7.0.2356 on macOS, Cortex XDR agent 7.7.0 hotfix build 7.7.0.59559 on Linux, and all later versions and builds of Cortex XDR agent. Cortex XDR agent 7.4 is end-of-life on May 24, 2022 and is not expected to receive a fix for this issue.\n\nThis issue is addressed for Prisma Access customers in the Prisma Access patch rollout that will begin on May 7, 2022 and will be a phased rollout performed based on theaters. Palo Alto Networks will send an additional email notification through Prisma Access Insights one week before the rollout begins for affected tenant(s).","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.23, PAN-OS 9.0.16-h2, PAN-OS 9.1.13-h3, PAN-OS 10.0.10, PAN-OS 10.1.5-h1, PAN-OS 10.2.1, and all later PAN-OS versions.\n\nThis issue is fixed in GlobalProtect app 5.1.11, GlobalProtect app 5.2.12, GlobalProtect app 5.3.4, GlobalProtect app 6.0.1 on Window and macOS, GlobalProtect app 6.0.2 on Android and iOS, and all later GlobalProtect app versions.\n\nThis issue is fixed in Cortex XDR agent 6.1.9 hotfix build 6.1.9.61370 on Windows, Cortex XDR agent 6.1.7 hotfix build 6.1.7.1690 on macOS, Cortex XDR agent 6.1.7 hotfix build 6.1.7.60245 on Linux, Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.60642 on Windows, Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.2276 on macOS, Cortex XDR agent 7.5.100-CE hotfix build 7.5.100.59687 on Linux, Cortex XDR agent 7.5.3 build 7.5.3.60113 on Windows, Cortex XDR agent 7.5.3 build 7.5.3.2265 on macOS, Cortex XDR agent 7.5.3 build 7.5.3.59465 on Linux, Cortex XDR agent 7.6.2 hotfix build 7.6.2.60545 on Windows, Cortex XDR agent 7.6.2 hotfix build 7.6.2.2311 on macOS, Cortex XDR agent 7.6.2 hotfix build 7.6.2.59612 hotfix on Linux, Cortex XDR agent 7.7.0 hotfix build 7.7.0.60725 on Windows, Cortex XDR agent 7.7.0 hotfix build 7.7.0.2356 on macOS, Cortex XDR agent 7.7.0 hotfix build 7.7.0.59559 on Linux, and all later versions and builds of Cortex XDR agent. Cortex XDR agent 7.4 is end-of-life on May 24, 2022 and is not expected to receive a fix for this issue.\n\nThis issue is addressed for Prisma Access customers in the Prisma Access patch rollout that will begin on May 7, 2022 and will be a phased rollout performed based on theaters. Palo Alto Networks will send an additional email notification through Prisma Access Insights one week before the rollout begins for affected tenant(s).","type":"text/html","base64":false}}],"timeline":[{"time":"2022-05-11T16:00:00.000Z","lang":"eng","value":"Cortex XDR agent fixes for Cortex XDR agent 6.1 and 7.5-CE are now available."},{"time":"2022-05-04T17:40:00.000Z","lang":"eng","value":"GlobalProtect app fixed version GlobalProtect app 6.0.1 is now available."},{"time":"2022-04-30T01:00:00.000Z","lang":"eng","value":"Updated fix information for Cortex XDR agent. New fix ETA for Prisma Access customers."},{"time":"2022-04-27T17:15:00.000Z","lang":"eng","value":"PAN-OS fixed version PAN-OS 8.1.23 is now available."},{"time":"2022-04-22T03:00:00.000Z","lang":"eng","value":"Added new Cortex XDR agent fix ETAs. Updated ETA for PAN-OS 8.1.23 fix."},{"time":"2022-04-20T17:00:00.000Z","lang":"eng","value":"Added new GlobalProtect app 5.3 fix ETA."},{"time":"2022-04-19T18:15:00.000Z","lang":"eng","value":"PAN-OS fixed version PAN-OS 10.2.1 is now available."},{"time":"2022-04-15T20:30:00.000Z","lang":"eng","value":"Added new GlobalProtect app fix ETAs."},{"time":"2022-04-12T23:45:00.000Z","lang":"eng","value":"PAN-OS fixed version PAN-OS 10.0.10 is now available."},{"time":"2022-04-12T01:00:00.000Z","lang":"eng","value":"PAN-OS fixed version PAN-OS 9.0.16-h2 is now available."},{"time":"2022-04-07T23:45:00.000Z","lang":"eng","value":"PAN-OS fixed versions PAN-OS 9.1.13-h3 and PAN-OS 10.1.5-h1 are now available."},{"time":"2022-04-06T18:00:00.000Z","lang":"eng","value":"Added new PAN-OS fix ETAs, available threat prevention signatures, and additional FAQ."},{"time":"2022-03-31T02:30:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2022-05-12T21:10:00.000Z","lang":"eng","value":"GlobalProtect app fixed version GlobalProtect app 5.1.11 is now available."},{"time":"2022-05-28T01:45:00.000Z","lang":"eng","value":"GlobalProtect app fixed version GlobalProtect app 5.2.12 is now available."},{"time":"2022-05-31T16:40:00.000Z","lang":"eng","value":"GlobalProtect app fixed version GlobalProtect app 5.3.4 is now available."},{"time":"2022-06-24T19:04:00.000Z","lang":"eng","value":"Fixed version clarification for GlobalProtect app on Android and iOS platforms."}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2021-44228","assignerOrgId":"00000000-0000-4000-9000-000000000000","assignerShortName":"palo_alto","dateUpdated":"2022-01-22T00:00:00.000Z","serial":1,"dateReserved":"2021-12-10T08:00:00.000Z","datePublished":"2021-12-10T08:00:00.000Z","state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000","shortName":"apache","dateUpdated":"2023-04-03T07:00:00.000Z"},"title":"Impact of Log4j Vulnerabilities CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832","datePublic":"2021-12-10T21:45:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-94","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')","type":"CWE"}]}],"impacts":[{"descriptions":[{"lang":"en","value":""}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Prisma SD-WAN (CloudGenix)","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Cortex XSOAR","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"GlobalProtect App","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Cortex XDR Agent","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Cloud Compute","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Cloud","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Bridgecrew","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"WildFire Appliance (WF-500)","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"SaaS Security","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"WildFire Cloud","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"IoT Security","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Cortex Xpanse","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Okyo Garde","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"User-ID Agent","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","platforms":["Firewall","WildFire"],"versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","platforms":["Panorama"],"versions":[{"status":"unaffected","version":"8.1.0","lessThan":"All","versionType":"custom"},{"status":"unaffected","version":"10.1.0","lessThan":"All","versionType":"custom"},{"status":"affected","version":"9.0.0","lessThan":"9.0.15","changes":[{"at":"9.0.15","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"10.0.0","lessThan":"10.0.8-h8","changes":[{"at":"10.0.8-h8","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"9.1.0","lessThan":"9.1.12-h3","changes":[{"at":"9.1.12-h3","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Expedition","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Cortex Data Lake","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Enterprise Data Loss Prevention","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Exact Data Matching CLI","versions":[{"status":"affected","version":" ","lessThan":"2.1","changes":[{"at":"2.1","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-DB Private Cloud","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"Traps","versions":[{"status":"unaffected","version":"All","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Apache Log4j Java library is vulnerable to a remote code execution vulnerability CVE-2021-44228, known as Log4Shell, and related vulnerabilities CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832. Log4Shell allows remote unauthenticated attackers with the ability to inject text into log messages to execute arbitrary code loaded from malicious servers with the privileges of the process utilizing Log4j.\n\nThese products and services are not affected by Log4Shell: Bridgecrew, Cortex Data Lake, Cortex XDR agents, Cortex XSOAR, Cortex Xpanse, Enterprise Data Loss Prevention (DLP), Expedition, the GlobalProtect app, IoT Security, Okyo Garde, PAN-DB Private Cloud, PAN-OS software running on firewalls including VM and CN series, Prisma Access, Prisma Cloud, Prisma Cloud Compute, Prisma SD-WAN (CloudGenix), SaaS Security, Traps, User-ID Agent, WildFire Appliance (WF-500), and WildFire Cloud.  \n\nWe have determined that some configurations of Panorama appliances with PAN-OS 9.0, PAN-OS 9.1, and PAN-OS 10.0 are impacted by CVE-2021-44228 and CVE-2021-45046 through the use of Elasticsearch. Fixes were released on December 20, 2021 to address both vulnerabilities on impacted PAN-OS versions. Panorama appliances are not impacted by CVE-2021-45105 and CVE-2021-44832. \n\nNOTE: PAN-OS 8.1 and PAN-OS 10.1 versions for Panorama are not impacted by these issues. All versions of PAN-OS for firewalls and WildFire appliances are not affected.\n\nThese vulnerabilities impact Exact Data Matching (EDM) CLI application versions 1.0 - 2.0 provided by Enterprise Data Loss Prevention (DLP). Enterprise DLP is not affected by these issues.\n\nThe Palo Alto Networks Product Security Assurance team has completed evaluation of all products and services for these vulnerabilities. All cloud services with known possible impact have been remediated.\n\nAt this time, our guidance and criteria for impacted Panorama appliances remain the same for all related vulnerabilities. The Exact Data Matching (EDM) CLI application should now be upgraded to EDM CLI version 2.1 or later versions.","supportingMedia":[{"type":"text/html","base64":true,"value":"<pre>Apache Log4j Java library is vulnerable to a remote code execution vulnerability CVE-2021-44228, known as Log4Shell, and related vulnerabilities CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832. Log4Shell allows remote unauthenticated attackers with the ability to inject text into log messages to execute arbitrary code loaded from malicious servers with the privileges of the process utilizing Log4j.\n\nThese products and services are not affected by Log4Shell: Bridgecrew, Cortex Data Lake, Cortex XDR agents, Cortex XSOAR, Cortex Xpanse, Enterprise Data Loss Prevention (DLP), Expedition, the GlobalProtect app, IoT Security, Okyo Garde, PAN-DB Private Cloud, PAN-OS software running on firewalls including VM and CN series, Prisma Access, Prisma Cloud, Prisma Cloud Compute, Prisma SD-WAN (CloudGenix), SaaS Security, Traps, User-ID Agent, WildFire Appliance (WF-500), and WildFire Cloud.  \n\nWe have determined that some configurations of Panorama appliances with PAN-OS 9.0, PAN-OS 9.1, and PAN-OS 10.0 are impacted by CVE-2021-44228 and CVE-2021-45046 through the use of Elasticsearch. Fixes were released on December 20, 2021 to address both vulnerabilities on impacted PAN-OS versions. Panorama appliances are not impacted by CVE-2021-45105 and CVE-2021-44832. \n\nNOTE: PAN-OS 8.1 and PAN-OS 10.1 versions for Panorama are not impacted by these issues. All versions of PAN-OS for firewalls and WildFire appliances are not affected.\n\nThese vulnerabilities impact Exact Data Matching (EDM) CLI application versions 1.0 - 2.0 provided by Enterprise Data Loss Prevention (DLP). Enterprise DLP is not affected by these issues.\n\nThe Palo Alto Networks Product Security Assurance team has completed evaluation of all products and services for these vulnerabilities. All cloud services with known possible impact have been remediated.\n\nAt this time, our guidance and criteria for impacted Panorama appliances remain the same for all related vulnerabilities. The Exact Data Matching (EDM) CLI application should now be upgraded to EDM CLI version 2.1 or later versions.</pre>"}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2021-44228","tags":["x_refsource_CONFIRM"]},{"url":"https://unit42.paloaltonetworks.com/apache-log4j-vulnerability-cve-2021-44228/","tags":["x_refsource_CONFIRM"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"version":"4.0","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"HIGH","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","exploitMaturity":"NOT_DEFINED","baseSeverity":"CRITICAL","baseScore":10,"threatSeverity":"CRITICAL","threatScore":10,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"},"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseSeverity":"CRITICAL","baseScore":9.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}}],"configurations":[{"lang":"en","value":"Vulnerabilities CVE-2021-44228 and CVE-2021-45046 are applicable to Panorama hardware appliances and virtual appliances that have Elasticsearch software running. Appliances that are run in Panorama mode or Log Collector mode, and have also been part of a Collector Group, are impacted. You can determine if the appliance is part of a Collector Group by visiting 'Panorama > Managed Collectors' from the web interface and verify that Elasticsearch is running on the appliance by checking the command ‘show system software status | match elasticsearch’ from the CLI.\n\nAppliances running in Management Only mode or Legacy mode, including those used for Prisma Access, are not impacted.","supportingMedia":[{"type":"text/html","base64":false,"value":"Vulnerabilities CVE-2021-44228 and CVE-2021-45046 are applicable to Panorama hardware appliances and virtual appliances that have Elasticsearch software running. Appliances that are run in Panorama mode or Log Collector mode, and have also been part of a Collector Group, are impacted. You can determine if the appliance is part of a Collector Group by visiting 'Panorama > Managed Collectors' from the web interface and verify that Elasticsearch is running on the appliance by checking the command ‘show system software status | match elasticsearch’ from the CLI.\n\nAppliances running in Management Only mode or Legacy mode, including those used for Prisma Access, are not impacted."}]}],"workarounds":[{"lang":"en","value":"For each Panorama hardware appliance and virtual appliance running in Panorama mode or Log Collector mode, that has also been part of a Collector Group, must be removed from their Collector Group in ‘Panorama > Collector Group > Custom-CG-Name > General' from the web interface. Once affected appliances are removed from all groups, a Panorama commit and Collector Group push for all affected Collector Groups must be performed. The Collector Groups should not be deleted before performing the Collector Group push for the affected Collector Groups, else the Collector Group push will fail to remove the appliances.\n\nNOTE: When this workaround is applied, logging and reporting features in Panorama will not work. All logs stored on the appliance will be lost once it is removed from the Collector Group.\n\nFinally, all appliances that were part of the Collector Group need to be restarted to stop the use of Elasticsearch. This eliminates the exposure to CVE-2021-44228 and CVE-2021-45046.\n\nYou can restart the appliance by visiting ‘Panorama > Operations > Device Operations > Reboot Panorama’  from the web interface or by using the command ‘request restart system’ from the CLI.\nOnce these steps are completed, you can verify that Elasticsearch has stopped and the appliance’s exposure to CVE-2021-44228 and CVE-2021-45046 has been removed, by running the command ‘show system software status | match elasticsearch’ from the CLI.\n\nManaged PAN-OS firewalls can be configured to forward logs to other servers until Panorama log collection functionality is restored. Alternate Log Forwarding options are detailed here: https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-web-interface-help/objects/objects-log-forwarding.html\n\nFollow the security best practices listed in ‘Protecting Panorama and Log Collector Inbound and Outbound Communications’ to reduce the risk of successful exploitation of CVE-2021-44228 and CVE-2021-45046 on Panorama appliances: https://live.paloaltonetworks.com/t5/general-articles/protecting-panorama-and-log-collector-inbound-and-outbound/ta-p/454071\n\nAdditionally, use ACLs to limit network access to Panorama to only trusted users and trusted networks and IP addresses. Use App-ID for ‘ldap’ and ‘rmi-iiop’ to block all LDAP and RMI traffic to and from untrusted networks or unexpected sources.\n\nNo other workarounds or mitigations are available for Palo Alto Networks products at this time.","supportingMedia":[{"type":"text/html","base64":false,"value":"For each Panorama hardware appliance and virtual appliance running in Panorama mode or Log Collector mode, that has also been part of a Collector Group, must be removed from their Collector Group in ‘Panorama > Collector Group > Custom-CG-Name > General' from the web interface. Once affected appliances are removed from all groups, a Panorama commit and Collector Group push for all affected Collector Groups must be performed. The Collector Groups should not be deleted before performing the Collector Group push for the affected Collector Groups, else the Collector Group push will fail to remove the appliances.\n\nNOTE: When this workaround is applied, logging and reporting features in Panorama will not work. All logs stored on the appliance will be lost once it is removed from the Collector Group.\n\nFinally, all appliances that were part of the Collector Group need to be restarted to stop the use of Elasticsearch. This eliminates the exposure to CVE-2021-44228 and CVE-2021-45046.\n\nYou can restart the appliance by visiting ‘Panorama > Operations > Device Operations > Reboot Panorama’  from the web interface or by using the command ‘request restart system’ from the CLI.\nOnce these steps are completed, you can verify that Elasticsearch has stopped and the appliance’s exposure to CVE-2021-44228 and CVE-2021-45046 has been removed, by running the command ‘show system software status | match elasticsearch’ from the CLI.\n\nManaged PAN-OS firewalls can be configured to forward logs to other servers until Panorama log collection functionality is restored. Alternate Log Forwarding options are detailed here: https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-web-interface-help/objects/objects-log-forwarding.html\n\nFollow the security best practices listed in ‘Protecting Panorama and Log Collector Inbound and Outbound Communications’ to reduce the risk of successful exploitation of CVE-2021-44228 and CVE-2021-45046 on Panorama appliances: https://live.paloaltonetworks.com/t5/general-articles/protecting-panorama-and-log-collector-inbound-and-outbound/ta-p/454071\n\nAdditionally, use ACLs to limit network access to Panorama to only trusted users and trusted networks and IP addresses. Use App-ID for ‘ldap’ and ‘rmi-iiop’ to block all LDAP and RMI traffic to and from untrusted networks or unexpected sources.\n\nNo other workarounds or mitigations are available for Palo Alto Networks products at this time."}]}],"solutions":[{"lang":"en","value":"These issues are fixed in PAN-OS 9.0.15, PAN-OS 9.1.12-h3, PAN-OS 10.0.8-h8, and all later PAN-OS versions for Panorama hardware and virtual appliances.\n\nNOTE: Though PAN-OS 10.1 is not impacted by the these vulnerabilities, the responsible Log4j code was removed for additional assurance from PAN-OS 10.1 versions for Panorama appliances starting with PAN-OS 10.1.4.\n\nIf Panorama is running an impacted version of PAN-OS, and you would prefer to upgrade to PAN-OS 10.1, upgrade all appliances in affected Collector Groups to the latest PAN-OS 10.1 Preferred release (PAN-OS 10.1.3-h1 at time of publication) to remediate these issues.\n\nNOTE: Prisma Access customers should refer to the Prisma Access and Panorama version compatibility document before upgrading Panorama: https://docs.paloaltonetworks.com/compatibility-matrix/prisma-access/prisma-access-and-panorama-version-compatibility.html\n\nNOTE: Downgrading to PAN-OS 10.0 or earlier PAN-OS versions is not currently supported once Panorama is upgraded to PAN-OS 10.1. \n\nWorkarounds are available that eliminate the exposure for these older versions of Panorama until they can be upgraded to a fixed version.\n\nFor Enterprise Data Loss Prevention customers, these issues are fixed in Exact Data Matching (EDM) CLI application version 2.1 and all later EDM CLI versions.\n\nNo updates for other Palo Alto Networks products are required at this time.\n\nCortex XSOAR customers that have opted to deploy Elasticsearch in their environment should refer to the Elasticsearch announcement (ESA-2021-31) for remediation information. Elasticsearch 7.16 is not supported with Cortex XSOAR:\n\nhttps://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476\n\nEnable signatures for unique threat IDs 91991, 91994, 91995, 92001, and 92007 to block a number of known attacks against CVE-2021-44228 and CVE-2021-45046 across the network.\n\nThese signatures block the first stage of the attack. Suitable egress filtering is key to blocking the second stage of the attack. Use App-ID for ‘ldap’ and ‘rmi-iiop’ to block all LDAP and RMI to or from untrusted networks and unexpected sources.\n\nSSL decryption needs to be enabled on the firewall to block known attacks over HTTPS.\n\nCustomers with log4j in their environments should upgrade or apply workarounds suggested by respective vendors, and not rely only on the Threat Prevention signatures.\n\nSee https://unit42.paloaltonetworks.com/apache-log4j-vulnerability-cve-2021-44228/ for more details on the Palo Alto Networks product capabilities to protect against attacks that exploit this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"These issues are fixed in PAN-OS 9.0.15, PAN-OS 9.1.12-h3, PAN-OS 10.0.8-h8, and all later PAN-OS versions for Panorama hardware and virtual appliances.\n\nNOTE: Though PAN-OS 10.1 is not impacted by the these vulnerabilities, the responsible Log4j code was removed for additional assurance from PAN-OS 10.1 versions for Panorama appliances starting with PAN-OS 10.1.4.\n\nIf Panorama is running an impacted version of PAN-OS, and you would prefer to upgrade to PAN-OS 10.1, upgrade all appliances in affected Collector Groups to the latest PAN-OS 10.1 Preferred release (PAN-OS 10.1.3-h1 at time of publication) to remediate these issues.\n\nNOTE: Prisma Access customers should refer to the Prisma Access and Panorama version compatibility document before upgrading Panorama: https://docs.paloaltonetworks.com/compatibility-matrix/prisma-access/prisma-access-and-panorama-version-compatibility.html\n\nNOTE: Downgrading to PAN-OS 10.0 or earlier PAN-OS versions is not currently supported once Panorama is upgraded to PAN-OS 10.1. \n\nWorkarounds are available that eliminate the exposure for these older versions of Panorama until they can be upgraded to a fixed version.\n\nFor Enterprise Data Loss Prevention customers, these issues are fixed in Exact Data Matching (EDM) CLI application version 2.1 and all later EDM CLI versions.\n\nNo updates for other Palo Alto Networks products are required at this time.\n\nCortex XSOAR customers that have opted to deploy Elasticsearch in their environment should refer to the Elasticsearch announcement (ESA-2021-31) for remediation information. Elasticsearch 7.16 is not supported with Cortex XSOAR:\n\nhttps://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476\n\nEnable signatures for unique threat IDs 91991, 91994, 91995, 92001, and 92007 to block a number of known attacks against CVE-2021-44228 and CVE-2021-45046 across the network.\n\nThese signatures block the first stage of the attack. Suitable egress filtering is key to blocking the second stage of the attack. Use App-ID for ‘ldap’ and ‘rmi-iiop’ to block all LDAP and RMI to or from untrusted networks and unexpected sources.\n\nSSL decryption needs to be enabled on the firewall to block known attacks over HTTPS.\n\nCustomers with log4j in their environments should upgrade or apply workarounds suggested by respective vendors, and not rely only on the Threat Prevention signatures.\n\nSee https://unit42.paloaltonetworks.com/apache-log4j-vulnerability-cve-2021-44228/ for more details on the Palo Alto Networks product capabilities to protect against attacks that exploit this issue."}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of evidence showing the exploitation of these vulnerabilities against Panorama hardware appliances, Panorama virtual appliances, or the Exact Data Matching CLI application.\n\nMore information about the vulnerability's exploitation in the wild can be found in the Unit 42 threat brief: https://unit42.paloaltonetworks.com/apache-log4j-vulnerability-cve-2021-44228/","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of evidence showing the exploitation of these vulnerabilities against Panorama hardware appliances, Panorama virtual appliances, or the Exact Data Matching CLI application.\n\nMore information about the vulnerability's exploitation in the wild can be found in the Unit 42 threat brief: https://unit42.paloaltonetworks.com/apache-log4j-vulnerability-cve-2021-44228/"}]}],"timeline":[{"time":"2022-01-22T02:30:00.000Z","lang":"eng","value":"Panorama appliances are not impacted by CVE-2021-44832 and a new EDM CLI application fix is available"},{"time":"2021-12-30T00:30:00.000Z","lang":"eng","value":"Traps is confirmed to be unaffected"},{"time":"2021-12-29T01:00:00.000Z","lang":"eng","value":"Update for related vulnerability CVE-2021-44832"},{"time":"2021-12-22T23:30:00.000Z","lang":"eng","value":"Clarified how Log4j was fixed in FAQ. Added note about deletion of Log4j code in PAN-OS 10.1.4"},{"time":"2021-12-21T00:00:00.000Z","lang":"eng","value":"Fixes are available for impacted Panorama appliances. Updates around related vulnerability CVE-2021-45105"},{"time":"2021-12-18T03:00:00.000Z","lang":"eng","value":"Update for related vulnerability CVE-2021-45046. Guidance for impacted products remains the same"},{"time":"2021-12-18T00:00:00.000Z","lang":"eng","value":"Added confirmation that PAN-DB Private Cloud is unaffected"},{"time":"2021-12-17T06:45:00.000Z","lang":"eng","value":"Clarifications made for Panorama appliances. Exact Data Maching CLI application is confirmed to be affected"},{"time":"2021-12-16T22:20:00.000Z","lang":"eng","value":"Added ETAs for PAN-OS fixed versions and additional information"},{"time":"2021-12-16T17:30:00.000Z","lang":"eng","value":"Clarification that there is no evidence of active Panorama exploitation"},{"time":"2021-12-15T20:25:00.000Z","lang":"eng","value":"Some versions of Panorama are confirmed to be susceptible to remote code execution. Evaluation of all products and services is complete"},{"time":"2021-12-14T21:12:00.000Z","lang":"eng","value":"UserID-Agent is confirmed to be unaffected"},{"time":"2021-12-14T07:30:00.000Z","lang":"eng","value":"The impact of the vulnerability on Panorama hardware and virtual appliances is under investigation"},{"time":"2021-12-14T04:00:00.000Z","lang":"eng","value":"Prisma Access and Okyo Garde are confirmed to be unaffected. Context for Panorama's Log4j usage"},{"time":"2021-12-13T19:40:00.000Z","lang":"eng","value":"Product status and Threat Prevention coverage updates"},{"time":"2021-12-12T18:34:00.000Z","lang":"eng","value":"Bridgecrew is confirmed to be unaffected"},{"time":"2021-12-11T04:14:00.000Z","lang":"eng","value":"Panorama is confirmed to be unaffected (Update: 12/15: new information is available that changes this evaluation)"},{"time":"2021-12-11T00:00:00.000Z","lang":"eng","value":"WildFire Appliance (WF-500) is confirmed to be unaffected"},{"time":"2021-12-10T21:45:00.000Z","lang":"eng","value":"Initial publication"}],"source":{"defect":["PAN-184592"],"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.0.9"},"x_affectedList":["PAN-OS 10.0.8-h7","PAN-OS 10.0.8-h6","PAN-OS 10.0.8-h5","PAN-OS 10.0.8-h4","PAN-OS 10.0.8-h3","PAN-OS 10.0.8-h2","PAN-OS 10.0.8-h1","PAN-OS 10.0.8","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.14-h4","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","Exact Data Matching CLI"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3064","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-11-10T00:00:00","dateReserved":"2021-11-10T00:00:00","dateUpdated":"2021-11-15T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Memory Corruption Vulnerability in GlobalProtect Portal and Gateway Interfaces","datePublic":"2021-11-10T17:00:00.000Z","providerMetadata":{"dateUpdated":"2021-11-10T17:10:30","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A memory corruption vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to disrupt system processes and potentially execute arbitrary code with root privileges. The attacker must have network access to the GlobalProtect interface to exploit this issue.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A memory corruption vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to disrupt system processes and potentially execute arbitrary code with root privileges. The attacker must have network access to the GlobalProtect interface to exploit this issue.</pre>"}]},{"lang":"en","value":"This issue impacts PAN-OS 8.1 versions earlier than PAN-OS 8.1.17.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts PAN-OS 8.1 versions earlier than PAN-OS 8.1.17.</pre>"}]},{"lang":"en","value":"Prisma Access customers are not impacted by this issue.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Prisma Access customers are not impacted by this issue.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0.*","status":"unaffected"},{"version":"9.1.*","status":"unaffected"},{"version":"10.0.*","status":"unaffected"},{"version":"10.1.*","status":"unaffected"},{"version":"8.1","status":"affected","lessThan":"8.1.17","versionType":"custom","changes":[{"at":"8.1.17","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"2.2 All","status":"unaffected"},{"version":"2.1 All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3064"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks the Randori Attack Team (https://twitter.com/RandoriAttack) for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-121 Stack-based Buffer Overflow","cweId":"CWE-121"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-96528"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect portal or gateway enabled. You can verify whether you have a GlobalProtect portal or gateway configured by checking for entries in 'Network > GlobalProtect > Portals' and in 'Network > GlobalProtect > Gateways' from the web interface.","supportingMedia":{"value":"This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect portal or gateway enabled. You can verify whether you have a GlobalProtect portal or gateway configured by checking for entries in 'Network > GlobalProtect > Portals' and in 'Network > GlobalProtect > Gateways' from the web interface.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Enable signatures for Unique Threat IDs 91820 and 91855 on traffic destined for GlobalProtect portal and gateway interfaces to block attacks against CVE-2021-3064.\n\nIt is not necessary to enable SSL decryption to detect and block attacks against this issue.","supportingMedia":{"value":"Enable signatures for Unique Threat IDs 91820 and 91855 on traffic destined for GlobalProtect portal and gateway interfaces to block attacks against CVE-2021-3064.\n\nIt is not necessary to enable SSL decryption to detect and block attacks against this issue.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.17 and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.17 and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-11-10T17:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-11-15T20:00:00.000Z","lang":"eng","value":"Added to FAQ to clarify fix timeline"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3058","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-11-10T00:00:00","dateReserved":"2021-11-10T00:00:00","dateUpdated":"2021-11-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS Command Injection Vulnerability in Web Interface XML API","datePublic":"2021-11-10T17:00:00.000Z","providerMetadata":{"dateUpdated":"2021-11-10T17:10:21","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permissions to use XML API the ability to execute arbitrary OS commands to escalate privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permissions to use XML API the ability to execute arbitrary OS commands to escalate privileges.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.3.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.3.</pre>"}]},{"lang":"en","value":"This issue does not impact Prisma Access firewalls.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue does not impact Prisma Access firewalls.</pre>"}]}],"x_affectedList":["PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.1","status":"affected","lessThan":"10.1.3","versionType":"custom","changes":[{"at":"10.1.3","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.14-h3","versionType":"custom","changes":[{"at":"9.0.14-h3","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.20-h1","versionType":"custom","changes":[{"at":"8.1.20-h1","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.11-h2","versionType":"custom","changes":[{"at":"9.1.11-h2","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.8","versionType":"custom","changes":[{"at":"10.0.8","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"2.1 All","status":"unaffected"},{"version":"2.2 All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3058"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks CJ, an external security researcher, for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-176653"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This vulnerability is only applicable to PAN-OS firewalls configured to use the XML API.","supportingMedia":{"value":"This vulnerability is only applicable to PAN-OS firewalls configured to use the XML API.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Enable signatures for Unique Threat ID 91715 on traffic processed by the firewall to block attacks against CVE-2021-3058.\n\nThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"Enable signatures for Unique Threat ID 91715 on traffic processed by the firewall to block attacks against CVE-2021-3058.\n\nThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.20-h1, PAN-OS 9.0.14-h3, PAN-OS 9.1.11-h2, PAN-OS 10.0.8, PAN-OS 10.1.3, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.20-h1, PAN-OS 9.0.14-h3, PAN-OS 9.1.11-h2, PAN-OS 10.0.8, PAN-OS 10.1.3, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-11-10T18:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3063","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-11-10T00:00:00","dateReserved":"2021-11-10T00:00:00","dateUpdated":"2021-12-09T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Denial-of-Service (DoS) Vulnerability in GlobalProtect Portal and Gateway Interfaces","datePublic":"2021-11-10T17:00:00.000Z","providerMetadata":{"dateUpdated":"2021-11-10T17:10:29","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An improper handling of exceptional conditions vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to send specifically crafted traffic to a GlobalProtect interface that causes the service to stop responding. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An improper handling of exceptional conditions vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to send specifically crafted traffic to a GlobalProtect interface that causes the service to stop responding. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.21;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h4;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h3;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8-h4;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.3.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.21;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h4;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h3;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8-h4;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.3.</pre>"}]},{"lang":"en","value":"Prisma Access customers are not impacted by this issue.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Prisma Access customers are not impacted by this issue.</pre>"}]}],"x_affectedList":["PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.8-h3","PAN-OS 10.0.8-h2","PAN-OS 10.0.8-h1","PAN-OS 10.0.8","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.20-h1","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.21","versionType":"custom","changes":[{"at":"8.1.21","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.14-h4","versionType":"custom","changes":[{"at":"9.0.14-h4","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.8-h4","versionType":"custom","changes":[{"at":"10.0.8-h4","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.3","versionType":"custom","changes":[{"at":"10.1.3","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.11-h3","versionType":"custom","changes":[{"at":"9.1.11-h3","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"2.2 All","status":"unaffected"},{"version":"2.1 All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3063"}],"credits":[{"lang":"en","value":" This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-755 Improper Handling of Exceptional Conditions","cweId":"CWE-755"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-180032"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect portal or gateway enabled. You can verify whether you have a GlobalProtect portal or gateway configured by checking for entries in 'Network > GlobalProtect > Portals' and in 'Network > GlobalProtect > Gateways' from the web interface.","supportingMedia":{"value":"This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect portal or gateway enabled. You can verify whether you have a GlobalProtect portal or gateway configured by checking for entries in 'Network > GlobalProtect > Portals' and in 'Network > GlobalProtect > Gateways' from the web interface.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Enable signatures for Unique Threat IDs 91820 and 91855 on traffic destined for GlobalProtect interfaces to block attacks against CVE-2021-3063.\n\nIt is not necessary to enable SSL decryption to detect and block attacks against this issue.","supportingMedia":{"value":"Enable signatures for Unique Threat IDs 91820 and 91855 on traffic destined for GlobalProtect interfaces to block attacks against CVE-2021-3063.\n\nIt is not necessary to enable SSL decryption to detect and block attacks against this issue.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.21, PAN-OS 9.0.14-h4, PAN-OS 9.1.11-h3, PAN-OS 10.0.8-h4, PAN-OS 10.1.3, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.21, PAN-OS 9.0.14-h4, PAN-OS 9.1.11-h3, PAN-OS 10.0.8-h4, PAN-OS 10.1.3, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-11-11T02:00:00.000Z","lang":"eng","value":"PAN-OS 10.0.8-h4 is now available"},{"time":"2021-11-10T17:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-12-09T17:16:00.000Z","lang":"eng","value":"Fixed the discovery status as this was internally found."}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3059","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-11-10T00:00:00","dateReserved":"2021-11-10T00:00:00","dateUpdated":"2021-11-17T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS Command Injection Vulnerability When Performing Dynamic Updates","datePublic":"2021-11-10T17:00:00.000Z","providerMetadata":{"dateUpdated":"2021-11-10T17:10:23","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS command injection vulnerability in the Palo Alto Networks PAN-OS management interface exists when performing dynamic updates. This vulnerability enables a man-in-the-middle attacker to execute arbitrary OS commands to escalate privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS command injection vulnerability in the Palo Alto Networks PAN-OS management interface exists when performing dynamic updates. This vulnerability enables a man-in-the-middle attacker to execute arbitrary OS commands to escalate privileges.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.3.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.3.</pre>"}]},{"lang":"en","value":"Prisma Access customers are not impacted by this issue.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Prisma Access customers are not impacted by this issue.</pre>"}]}],"x_affectedList":["PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.0","status":"affected","lessThan":"10.0.8","versionType":"custom","changes":[{"at":"10.0.8","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.3","versionType":"custom","changes":[{"at":"10.1.3","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.20-h1","versionType":"custom","changes":[{"at":"8.1.20-h1","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.14-h3","versionType":"custom","changes":[{"at":"9.0.14-h3","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.11-h2","versionType":"custom","changes":[{"at":"9.1.11-h2","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"2.2 All","status":"unaffected"},{"version":"2.1 All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3059"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks CJ, an external security researcher, for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-176618"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only to firewalls and Panoramas that receive dynamic updates from an update server.\n\nTo verify this on firewalls not managed by Panorama ‘Device > Dynamic Updates’ from the web interface.\n\nTo verify this on Panorama review ‘Panorama > Dynamic Updates’ from the web interface.\n\nTo verify this for Panorama managed firewalls review ‘Panorama > Device Deployment > Dynamic Updates’ from the Panorama web interface.\n\nFirewalls that only receive content updates pushed from Panoramas are not susceptible to this issue.","supportingMedia":{"value":"This issue is applicable only to firewalls and Panoramas that receive dynamic updates from an update server.\n\nTo verify this on firewalls not managed by Panorama ‘Device > Dynamic Updates’ from the web interface.\n\nTo verify this on Panorama review ‘Panorama > Dynamic Updates’ from the web interface.\n\nTo verify this for Panorama managed firewalls review ‘Panorama > Device Deployment > Dynamic Updates’ from the Panorama web interface.\n\nFirewalls that only receive content updates pushed from Panoramas are not susceptible to this issue.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Updating dynamic content from a local file will prevent exposure to this vulnerability until you are able to upgrade PAN-OS firewalls and Panorama to a fixed version. You can disable scheduled dynamic updates in the web interface.\n\nPush content updates from Panorama to the managed firewalls until you are able to upgrade PAN-OS to a fixed version. The process of upgrading dynamic content on managed devices is referenced here:\nhttps://docs.paloaltonetworks.com/pan-os/10-0/pan-os-web-interface-help/panorama-web-interface/panorama-managed-devices-summary/firewall-software-and-content-updates.html","supportingMedia":{"value":"Updating dynamic content from a local file will prevent exposure to this vulnerability until you are able to upgrade PAN-OS firewalls and Panorama to a fixed version. You can disable scheduled dynamic updates in the web interface.\n\nPush content updates from Panorama to the managed firewalls until you are able to upgrade PAN-OS to a fixed version. The process of upgrading dynamic content on managed devices is referenced here:\nhttps://docs.paloaltonetworks.com/pan-os/10-0/pan-os-web-interface-help/panorama-web-interface/panorama-managed-devices-summary/firewall-software-and-content-updates.html","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.20-h1, PAN-OS 9.0.14-h3, PAN-OS 9.1.11-h2, PAN-OS 10.0.8, PAN-OS 10.1.3, and all later PAN-OS versions.\n","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.20-h1, PAN-OS 9.0.14-h3, PAN-OS 9.1.11-h2, PAN-OS 10.0.8, PAN-OS 10.1.3, and all later PAN-OS versions.\n","type":"text/html","base64":false}}],"timeline":[{"time":"2021-11-10T18:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-11-12T00:00:00.000Z","lang":"eng","value":"Prisma Access is not impacted"},{"time":"2021-11-17T22:20:00.000Z","lang":"eng","value":"Updated workaround and required configuration"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3062","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-11-10T00:00:00","dateReserved":"2021-11-10T00:00:00","dateUpdated":"2021-11-17T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Improper Access Control Vulnerability Exposing AWS Instance Metadata Endpoint to GlobalProtect Users","datePublic":"2021-11-10T17:00:00.000Z","providerMetadata":{"dateUpdated":"2021-11-10T17:10:27","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An improper access control vulnerability in PAN-OS software enables an attacker with authenticated access to GlobalProtect portals and gateways to connect to the EC2 instance metadata endpoint for VM-Series firewalls hosted on Amazon AWS.\n\nExploitation of this vulnerability enables an attacker to perform any operations allowed by the EC2 role in AWS.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An improper access control vulnerability in PAN-OS software enables an attacker with authenticated access to GlobalProtect portals and gateways to connect to the EC2 instance metadata endpoint for VM-Series firewalls hosted on Amazon AWS.\n\nExploitation of this vulnerability enables an attacker to perform any operations allowed by the EC2 role in AWS.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20 VM-Series firewalls;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11 VM-Series firewalls;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14 VM-Series firewalls;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8 VM-Series firewalls.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20 VM-Series firewalls;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11 VM-Series firewalls;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14 VM-Series firewalls;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8 VM-Series firewalls.</pre>"}]},{"lang":"en","value":"Prisma Access customers are not impacted by this issue.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Prisma Access customers are not impacted by this issue.</pre>"}]}],"x_affectedList":["PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.1.*","status":"unaffected"},{"version":"9.1","status":"affected","lessThan":"9.1.11","versionType":"custom","changes":[{"at":"9.1.11","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.20","versionType":"custom","changes":[{"at":"8.1.20","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.14","versionType":"custom","changes":[{"at":"9.0.14","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.8","versionType":"custom","changes":[{"at":"10.0.8","status":"unaffected"}]}],"platforms":["VM-Series"]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"2.1 All","status":"unaffected"},{"version":"2.2 All","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3062"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Matthew Flanagan of Computer Systems Australia (CSA) and Suresh Kumar Ponnusamy of Freshworks for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-284 Improper Access Control","cweId":"CWE-284"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-164422"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect portal or gateway enabled. You can verify whether you have a GlobalProtect portal or gateway configured by checking for entries in 'Network > GlobalProtect > Portals' and in 'Network > GlobalProtect > Gateways' on the web interface.","supportingMedia":{"value":"This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect portal or gateway enabled. You can verify whether you have a GlobalProtect portal or gateway configured by checking for entries in 'Network > GlobalProtect > Portals' and in 'Network > GlobalProtect > Gateways' on the web interface.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"There are no known workarounds for this issue.","supportingMedia":{"value":"There are no known workarounds for this issue.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.11, PAN-OS 10.0.8, and all later PAN-OS versions","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.11, PAN-OS 10.0.8, and all later PAN-OS versions","type":"text/html","base64":false}}],"timeline":[{"time":"2021-11-10T17:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-11-17T22:40:00.000Z","lang":"eng","value":"Updated credit"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"cveId":"CVE-2021-3056","assignerOrgId":"00000000-0000-4000-9000-000000000000","assignerShortName":"palo_alto","dateUpdated":"2021-11-10T00:00:00.000Z","serial":1,"dateReserved":"2021-11-10T08:00:00.000Z","datePublished":"2021-11-10T08:00:00.000Z","state":"PUBLISHED"},"containers":{"cna":{"providerMetadata":{"orgId":"00000000-0000-4000-9000-000000000000","shortName":"palo_alto","dateUpdated":"2021-11-11T01:10:00.000Z"},"title":"PAN-OS: Memory Corruption Vulnerability in GlobalProtect Clientless VPN During SAML Authentication","datePublic":"2021-11-10T17:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-120","description":"CWE-120 Buffer Overflow","type":"CWE"}]}],"impacts":[{"descriptions":[{"lang":"en","value":""}]}],"affected":[{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"status":"unaffected","version":"2.2","versionType":"custom"},{"status":"affected","version":"2.1","changes":[{"at":"2.1","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"status":"unaffected","version":"10.1.0","versionType":"custom"},{"status":"affected","version":"10.0.0","lessThan":"10.0.1","changes":[{"at":"10.0.1","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"9.1.0","lessThan":"9.1.9","changes":[{"at":"9.1.9","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"9.0.0","lessThan":"9.0.14","changes":[{"at":"9.0.14","status":"unaffected"}],"versionType":"custom"},{"status":"affected","version":"8.1.0","lessThan":"8.1.20","changes":[{"at":"8.1.20","status":"unaffected"}],"versionType":"custom"}],"defaultStatus":"unaffected"}],"cpeApplicability":[{"operator":"OR","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.0","versionEndExcluding":"10.0.1"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"9.1.0","versionEndExcluding":"9.1.9"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.0.14"},{"vulnerable":true,"criteria":"cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"8.1.0","versionEndExcluding":"8.1.20"}]}]}],"descriptions":[{"lang":"en","value":"A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables an authenticated attacker to execute arbitrary code with root user privileges during SAML authentication.\n\nThis issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.9;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.1.\n\nPrisma Access customers with Prisma Access 2.1 Preferred firewalls are impacted by this issue.","supportingMedia":[{"type":"text/html","base64":true,"value":"A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables an authenticated attacker to execute arbitrary code with root user privileges during SAML authentication.<br><br>This issue impacts:<br>PAN-OS 8.1 versions earlier than PAN-OS 8.1.20;<br>PAN-OS 9.0 versions earlier than PAN-OS 9.0.14;<br>PAN-OS 9.1 versions earlier than PAN-OS 9.1.9;<br>PAN-OS 10.0 versions earlier than PAN-OS 10.0.1.<br><br>Prisma Access customers with Prisma Access 2.1 Preferred firewalls are impacted by this issue."}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2021-3056","tags":["x_refsource_CONFIRM"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseSeverity":"HIGH","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}}],"configurations":[{"lang":"en","value":"This issue is applicable only to PAN-OS firewall configurations with the Clientless VPN feature and SAML authentication enabled for GlobalProtect Portal.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is applicable only to PAN-OS firewall configurations with the Clientless VPN feature and SAML authentication enabled for GlobalProtect Portal."}]}],"workarounds":[{"lang":"en","value":"Enable signatures for Unique Threat ID 91585 on traffic processed by the firewall to block attacks against CVE-2021-3056.","supportingMedia":[{"type":"text/html","base64":false,"value":"Enable signatures for Unique Threat ID 91585 on traffic processed by the firewall to block attacks against CVE-2021-3056."}]}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.9, PAN-OS 10.0.1, and all later PAN-OS versions.\nThis issue is fixed in Prisma Access 2.2 Preferred and all later Prisma Access versions.","supportingMedia":[{"type":"text/html","base64":false,"value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.9, PAN-OS 10.0.1, and all later PAN-OS versions.<br>This issue is fixed in Prisma Access 2.2 Preferred and all later Prisma Access versions."}]}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}]}],"timeline":[{"time":"2021-11-10T17:00:00.000Z","lang":"eng","value":"Initial publication"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom of Palo Alto Networks during an internal security review.","type":"finder"}],"source":{"defect":["PAN-149501"],"discovery":"INTERNAL"},"x_generator":{"engine":"Vulnogram 0.0.9"},"x_affectedList":["Prisma Access 2.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3060","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-11-10T00:00:00","dateReserved":"2021-11-10T00:00:00","dateUpdated":"2022-08-06T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS Command Injection in Simple Certificate Enrollment Protocol (SCEP)","datePublic":"2021-11-10T17:00:00.000Z","providerMetadata":{"dateUpdated":"2021-11-10T17:10:24","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS command injection vulnerability in the Simple Certificate Enrollment Protocol (SCEP) feature of PAN-OS software allows an unauthenticated network-based attacker with specific knowledge of the firewall configuration to execute arbitrary code with root user privileges. The attacker must have network access to the GlobalProtect interfaces to exploit this issue.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS command injection vulnerability in the Simple Certificate Enrollment Protocol (SCEP) feature of PAN-OS software allows an unauthenticated network-based attacker with specific knowledge of the firewall configuration to execute arbitrary code with root user privileges. The attacker must have network access to the GlobalProtect interfaces to exploit this issue.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.3.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.8;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.3.</pre>"}]},{"lang":"en","value":"Prisma Access customers with Prisma Access 2.1 Preferred and Prisma Access 2.1 Innovation firewalls are impacted by this issue.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Prisma Access customers with Prisma Access 2.1 Preferred and Prisma Access 2.1 Innovation firewalls are impacted by this issue.</pre>"}]}],"x_affectedList":["Prisma Access 2.1","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.20","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.20-h1","versionType":"custom","changes":[{"at":"8.1.20-h1","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.14-h3","versionType":"custom","changes":[{"at":"9.0.14-h3","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.11-h2","versionType":"custom","changes":[{"at":"9.1.11-h2","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.8","versionType":"custom","changes":[{"at":"10.0.8","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.3","versionType":"custom","changes":[{"at":"10.1.3","status":"unaffected"}]}]},{"vendor":"Palo Alto Networks","product":"Prisma Access","versions":[{"version":"2.1 Preferred","status":"affected"},{"version":"2.2 All","status":"unaffected"},{"version":"2.1 Innovation","status":"affected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3060"},{"tags":["x_refsource_CONFIRM"],"url":"https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/certificate-management/configure-the-master-key.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://docs.paloaltonetworks.com/prisma/prisma-access/innovation/2-1/prisma-access-panorama-admin/prepare-the-prisma-access-infrastructure/get-started-with-prisma-access-overview.html"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks CJ, an external security researcher, for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-176661"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only to GlobalProtect portal and gateway configurations that are configured with a SCEP profile and when the default master key was not changed.\n\nYou can determine if your configuration has a SCEP profile by selecting 'Device > Certificate Management > SCEP' from the web interface.\n\nNote: The SCEP profile does not need to be enabled for the firewall to be at risk; it need only exist in the configuration to be a risk even if disabled.\n\nYou know you are using the default master key when the master key was not explicitly configured on the firewall. Review the master key configuration by selecting 'Device > Master Key and Diagnostics' from the web interface and change the key if needed.\n","supportingMedia":{"value":"This issue is applicable only to GlobalProtect portal and gateway configurations that are configured with a SCEP profile and when the default master key was not changed.\n\nYou can determine if your configuration has a SCEP profile by selecting 'Device > Certificate Management > SCEP' from the web interface.\n\nNote: The SCEP profile does not need to be enabled for the firewall to be at risk; it need only exist in the configuration to be a risk even if disabled.\n\nYou know you are using the default master key when the master key was not explicitly configured on the firewall. Review the master key configuration by selecting 'Device > Master Key and Diagnostics' from the web interface and change the key if needed.\n","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Changing the master key for the firewall prevents exploitation of this vulnerability. This is a security best practice for both PAN-OS and Prisma Access customers.\n\nDocumentation for configuring the master key is available at: https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/certificate-management/configure-the-master-key.html. Please note the special requirements for high-availability (HA) and Panorama-managed environments.\n\nAdditional information is available for Prisma Access customers at: https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-admin/prepare-the-prisma-access-infrastructure/get-started-with-prisma-access-overview.\n\nRemove all configured SCEP profiles from the firewall to completely eliminate any risk of exploitation related to this issue. You can view any existing SCEP profiles configured on the firewall by selecting 'Device > Certificate Management > SCEP' from the web interface.\n\nThis issue requires the attacker to have network access to the GlobalProtect interface.\n\nIn addition to these workarounds, you should enable signatures for Unique Threat ID 91526 on traffic destined for GlobalProtect interfaces to further mitigate the risk of attacks against CVE-2021-3060. SSL decryption is not necessary to detect attacks against this issue.","supportingMedia":{"value":"Changing the master key for the firewall prevents exploitation of this vulnerability. This is a security best practice for both PAN-OS and Prisma Access customers.\n\nDocumentation for configuring the master key is available at: https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/certificate-management/configure-the-master-key.html. Please note the special requirements for high-availability (HA) and Panorama-managed environments.\n\nAdditional information is available for Prisma Access customers at: https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-admin/prepare-the-prisma-access-infrastructure/get-started-with-prisma-access-overview.\n\nRemove all configured SCEP profiles from the firewall to completely eliminate any risk of exploitation related to this issue. You can view any existing SCEP profiles configured on the firewall by selecting 'Device > Certificate Management > SCEP' from the web interface.\n\nThis issue requires the attacker to have network access to the GlobalProtect interface.\n\nIn addition to these workarounds, you should enable signatures for Unique Threat ID 91526 on traffic destined for GlobalProtect interfaces to further mitigate the risk of attacks against CVE-2021-3060. SSL decryption is not necessary to detect attacks against this issue.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue at time of publication. However, a proof of concept script for this issue is publicly available.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue at time of publication. However, a proof of concept script for this issue is publicly available.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.20-h1, PAN-OS 9.0.14-h3, PAN-OS 9.1.11-h2, PAN-OS 10.0.8, PAN-OS 10.1.3, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.20-h1, PAN-OS 9.0.14-h3, PAN-OS 9.1.11-h2, PAN-OS 10.0.8, PAN-OS 10.1.3, and all later PAN-OS versions.","type":"text/html","base64":false}},{"lang":"en","value":"This issue is fixed in Prisma Access 2.2 Preferred and all later Prisma Access versions."}],"timeline":[{"time":"2021-11-10T17:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2022-08-06T00:15:00.000Z","lang":"eng","value":"Updated Prisma Access documentation link; added a note about a public proof of concept script."}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3054","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-09-08T00:00:00","dateReserved":"2021-09-08T00:00:00","dateUpdated":"2021-09-12T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Unsigned Code Execution During Plugin Installation Race Condition Vulnerability","datePublic":"2021-09-08T16:00:00.000Z","providerMetadata":{"dateUpdated":"2021-09-08T17:10:21","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permission to upload plugins to execute arbitrary code with root user privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permission to upload plugins to execute arbitrary code with root user privileges.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.7;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.2.\n\nThis issue does not affect Prisma Access.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.11;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.7;\nPAN-OS 10.1 versions earlier than PAN-OS 10.1.2.\n\nThis issue does not affect Prisma Access.</pre>"}]}],"x_affectedList":["PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.20","versionType":"custom","changes":[{"at":"8.1.20","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.14","versionType":"custom","changes":[{"at":"9.0.14","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.7","versionType":"custom","changes":[{"at":"10.0.7","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.11","versionType":"custom","changes":[{"at":"9.1.11","status":"unaffected"}]},{"version":"10.1","status":"affected","lessThan":"10.1.2","versionType":"custom","changes":[{"at":"10.1.2","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3054"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Praetorian for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition","cweId":"CWE-367"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-138727"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Enable signatures for Unique Threat ID 91572 on traffic processed by the firewall to block attacks against CVE-2021-3054.\n\nThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"Enable signatures for Unique Threat ID 91572 on traffic processed by the firewall to block attacks against CVE-2021-3054.\n\nThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.11, PAN-OS 10.0.7, PAN-OS 10.1.2, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.11, PAN-OS 10.0.7, PAN-OS 10.1.2, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-09-08T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-09-12T16:00:00.000Z","lang":"eng","value":"Added threat prevention workaround for the vulnerability"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-10188","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-09-08T00:00:00","dateReserved":"2021-09-08T00:00:00","dateUpdated":"2021-09-08T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Impact of Telnet Remote-Code-Execution (RCE) Vulnerability (CVE-2020-10188)","datePublic":"2021-09-08T16:00:00.000Z","providerMetadata":{"dateUpdated":"2021-11-08T11:09:32","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code.\n\nThe Telnet-based administrative management service is disabled by default and this issue is not exploitable if this service is disabled.\n\nThis issue does not impact SSH or HTTPS management interfaces. This issue does not affect Prisma Access.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code.\n\nThe Telnet-based administrative management service is disabled by default and this issue is not exploitable if this service is disabled.\n\nThis issue does not impact SSH or HTTPS management interfaces. This issue does not affect Prisma Access.</pre>"}]}],"x_affectedList":["PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.1.*","status":"unaffected"},{"version":"8.1","status":"affected","lessThan":"8.1.20","versionType":"custom","changes":[{"at":"8.1.20","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.14","versionType":"custom","changes":[{"at":"9.0.14","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.9","versionType":"custom","changes":[{"at":"9.1.9","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.6","versionType":"custom","changes":[{"at":"10.0.6","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-10188"}],"credits":[{"lang":"en","value":"This issue was found by an external researcher in the upstream Telnet code."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-120 Buffer Overflow","cweId":"CWE-120"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-158262"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This issue is exploitable only if the Telnet service is enabled and is accessible to attackers.","supportingMedia":{"value":"This issue is exploitable only if the Telnet service is enabled and is accessible to attackers.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Disabling the Telnet-based administrative management service completely eliminates risks of exploitation of this issue.\n\nThis issue requires the attacker to have network access to the PAN-OS Telnet interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.\n\nIf the Telnet-based administrative management service is required and you cannot immediately upgrade your PAN-OS software, enable signatures for Unique Threat ID 59125 on traffic destined for the Telnet interface to block attacks against CVE-2020-10188.","supportingMedia":{"value":"Disabling the Telnet-based administrative management service completely eliminates risks of exploitation of this issue.\n\nThis issue requires the attacker to have network access to the PAN-OS Telnet interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.\n\nIf the Telnet-based administrative management service is required and you cannot immediately upgrade your PAN-OS software, enable signatures for Unique Threat ID 59125 on traffic destined for the Telnet interface to block attacks against CVE-2020-10188.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue targeting Palo Alto Networks products.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue targeting Palo Alto Networks products.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.9, PAN-OS 10.0.6, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.9, PAN-OS 10.0.6, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-09-08T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3052","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-09-08T00:00:00","dateReserved":"2021-09-08T00:00:00","dateUpdated":"2021-09-12T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Reflected Cross-Site Scripting (XSS) in Web Interface","datePublic":"2021-09-08T16:00:00.000Z","providerMetadata":{"dateUpdated":"2021-09-08T17:10:18","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A reflected cross-site scripting (XSS) vulnerability in the Palo Alto Network PAN-OS web interface enables an authenticated network-based attacker to mislead another authenticated PAN-OS administrator to click on a specially crafted link that performs arbitrary actions in the PAN-OS web interface as the targeted authenticated administrator.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A reflected cross-site scripting (XSS) vulnerability in the Palo Alto Network PAN-OS web interface enables an authenticated network-based attacker to mislead another authenticated PAN-OS administrator to click on a specially crafted link that performs arbitrary actions in the PAN-OS web interface as the targeted authenticated administrator.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than 8.1.20;\nPAN-OS 9.0 versions earlier than 9.0.14;\nPAN-OS 9.1 versions earlier than 9.1.10;\nPAN-OS 10.0 versions earlier than 10.0.2.\n\nThis issue does not affect Prisma Access.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than 8.1.20;\nPAN-OS 9.0 versions earlier than 9.0.14;\nPAN-OS 9.1 versions earlier than 9.1.10;\nPAN-OS 10.0 versions earlier than 10.0.2.\n\nThis issue does not affect Prisma Access.</pre>"}]}],"x_affectedList":["PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.1.*","status":"unaffected"},{"version":"9.0","status":"affected","lessThan":"9.0.14","versionType":"custom","changes":[{"at":"9.0.14","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.20","versionType":"custom","changes":[{"at":"8.1.20","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.10","versionType":"custom","changes":[{"at":"9.1.10","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.2","versionType":"custom","changes":[{"at":"10.0.2","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3052"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Cristian Mocanu and Dan Marin of Deloitte for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-79 Cross-site Scripting (XSS)","cweId":"CWE-79"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-150337"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Enable signatures for Unique Threat IDs 91573, 91574, 91575, 91576 on traffic destined for the web interface to block attacks against CVE-2021-3052.\n\nThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"Enable signatures for Unique Threat IDs 91573, 91574, 91575, 91576 on traffic destined for the web interface to block attacks against CVE-2021-3052.\n\nThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 9.0.14, PAN-OS 8.1.20, PAN-OS 9.1.10, PAN-OS 10.0.2, PAN-OS 10.1.0, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 9.0.14, PAN-OS 8.1.20, PAN-OS 9.1.10, PAN-OS 10.0.2, PAN-OS 10.1.0, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-09-08T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-09-12T16:00:00.000Z","lang":"eng","value":"Added threat prevention workaround for the vulnerability"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3053","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-09-08T00:00:00","dateReserved":"2021-09-08T00:00:00","dateUpdated":"2021-09-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Exceptional Condition Denial-of-Service (DoS)","datePublic":"2021-09-08T16:00:00.000Z","providerMetadata":{"dateUpdated":"2021-09-08T17:10:19","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An improper handling of exceptional conditions vulnerability exists in the Palo Alto Networks PAN-OS dataplane that enables an unauthenticated network-based attacker to send specifically crafted traffic through the firewall that causes the service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An improper handling of exceptional conditions vulnerability exists in the Palo Alto Networks PAN-OS dataplane that enables an unauthenticated network-based attacker to send specifically crafted traffic through the firewall that causes the service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.9;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.5.\n\nThis issue does not affect Prisma Access.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.20;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.14;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.9;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.5.\n\nThis issue does not affect Prisma Access.</pre>"}]}],"x_affectedList":["PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.19","PAN-OS 8.1.18","PAN-OS 8.1.17","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.1.*","status":"unaffected"},{"version":"8.1","status":"affected","lessThan":"8.1.20","versionType":"custom","changes":[{"at":"8.1.20","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.14","versionType":"custom","changes":[{"at":"9.0.14","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.9","versionType":"custom","changes":[{"at":"9.1.9","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.5","versionType":"custom","changes":[{"at":"10.0.5","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3053"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-755 Improper Handling of Exceptional Conditions","cweId":"CWE-755"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-158723"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only if GTP security is configured on the firewall.","supportingMedia":{"value":"This issue is applicable only if GTP security is configured on the firewall.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Enable signatures for Unique Threat ID 91593 on traffic processed by the firewall to block attacks against CVE-2021-3053.","supportingMedia":{"value":"Enable signatures for Unique Threat ID 91593 on traffic processed by the firewall to block attacks against CVE-2021-3053.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.9, PAN-OS 10.0.5, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.9, PAN-OS 10.0.5, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-09-08T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-09-13T16:00:00.000Z","lang":"eng","value":"Added required configuration for exposure and threat prevention workaround for the vulnerability"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-3050","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2021-08-11T00:00:00","dateReserved":"2021-08-11T00:00:00","dateUpdated":"2021-08-11T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS Command Injection Vulnerability in Web Interface","datePublic":"2021-08-11T16:00:00.000Z","providerMetadata":{"dateUpdated":"2021-08-11T17:10:20","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to execute arbitrary OS commands to escalate privileges.\n\nThis issue impacts:\nPAN-OS 9.0 version 9.0.10 through PAN-OS 9.0.14;\nPAN-OS 9.1 version 9.1.4 through PAN-OS 9.1.10;\nPAN-OS 10.0 version 10.0.7 and earlier PAN-OS 10.0 versions;\nPAN-OS 10.1 version 10.1.0 through PAN-OS 10.1.1.\n\nPrisma Access firewalls and firewalls running PAN-OS 8.1 versions are not impacted by this issue.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to execute arbitrary OS commands to escalate privileges.\n\nThis issue impacts:\nPAN-OS 9.0 version 9.0.10 through PAN-OS 9.0.14;\nPAN-OS 9.1 version 9.1.4 through PAN-OS 9.1.10;\nPAN-OS 10.0 version 10.0.7 and earlier PAN-OS 10.0 versions;\nPAN-OS 10.1 version 10.1.0 through PAN-OS 10.1.1.\n\nPrisma Access firewalls and firewalls running PAN-OS 8.1 versions are not impacted by this issue.\n</pre>"}]}],"x_affectedList":["PAN-OS 10.1.6-h6","PAN-OS 10.1.6-h5","PAN-OS 10.1.6-h4","PAN-OS 10.1.6-h3","PAN-OS 10.1.6-h2","PAN-OS 10.1.6-h1","PAN-OS 10.1.6","PAN-OS 10.1.5-h2","PAN-OS 10.1.5-h1","PAN-OS 10.1.5","PAN-OS 10.1.4-h4","PAN-OS 10.1.4-h3","PAN-OS 10.1.4-h2","PAN-OS 10.1.4-h1","PAN-OS 10.1.4","PAN-OS 10.1.3","PAN-OS 10.1.2","PAN-OS 10.1.1","PAN-OS 10.1.0","PAN-OS 10.1","PAN-OS 10.0.11-h1","PAN-OS 10.0.11","PAN-OS 10.0.10","PAN-OS 10.0.9","PAN-OS 10.0.8-h8","PAN-OS 10.0.8-h7","PAN-OS 10.0.8-h6","PAN-OS 10.0.8-h5","PAN-OS 10.0.8-h4","PAN-OS 10.0.8-h3","PAN-OS 10.0.8-h2","PAN-OS 10.0.8-h1","PAN-OS 10.0.8","PAN-OS 10.0.7","PAN-OS 10.0.6","PAN-OS 10.0.5","PAN-OS 10.0.4","PAN-OS 10.0.3","PAN-OS 10.0.2","PAN-OS 10.0.1","PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.14-h4","PAN-OS 9.1.14-h3","PAN-OS 9.1.14-h2","PAN-OS 9.1.14-h1","PAN-OS 9.1.14","PAN-OS 9.1.13-h3","PAN-OS 9.1.13-h2","PAN-OS 9.1.13-h1","PAN-OS 9.1.13","PAN-OS 9.1.12-h3","PAN-OS 9.1.12-h2","PAN-OS 9.1.12-h1","PAN-OS 9.1.12","PAN-OS 9.1.11-h3","PAN-OS 9.1.11-h2","PAN-OS 9.1.11-h1","PAN-OS 9.1.11","PAN-OS 9.1.10","PAN-OS 9.1.9","PAN-OS 9.1.8","PAN-OS 9.1.7","PAN-OS 9.1.6","PAN-OS 9.1.5","PAN-OS 9.1.4","PAN-OS 9.1","PAN-OS 9.0.16-h3","PAN-OS 9.0.16-h2","PAN-OS 9.0.16-h1","PAN-OS 9.0.16","PAN-OS 9.0.15","PAN-OS 9.0.14-h4","PAN-OS 9.0.14-h3","PAN-OS 9.0.14-h2","PAN-OS 9.0.14-h1","PAN-OS 9.0.14","PAN-OS 9.0.13","PAN-OS 9.0.12","PAN-OS 9.0.11","PAN-OS 9.0.10","PAN-OS 9.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1.*","status":"unaffected"},{"version":"9.0.10","status":"affected","lessThan":"9.0*","versionType":"custom","changes":[{"at":"9.0.15","status":"unaffected"}]},{"version":"9.1.4","status":"affected","lessThan":"9.1*","versionType":"custom","changes":[{"at":"9.1.11","status":"unaffected"}]},{"version":"10.0.0","status":"affected","lessThan":"10.0*","versionType":"custom","changes":[{"at":"10.0.8","status":"unaffected"}]},{"version":"10.1.0","status":"affected","lessThan":"10.1*","versionType":"custom","changes":[{"at":"10.1.2","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2021-3050"}],"credits":[{"lang":"en","value":"This issue was found by an external security researcher."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-174326"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Enable signatures for Unique Threat ID 91439 on traffic destined for the web interface to block attacks against CVE-2021-3050.\n\nThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.\n","supportingMedia":{"value":"Enable signatures for Unique Threat ID 91439 on traffic destined for the web interface to block attacks against CVE-2021-3050.\n\nThis issue requires the attacker to have authenticated access to the PAN-OS web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.\n","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.  However, exploits for this issue are publicly available.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.  However, exploits for this issue are publicly available.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"We intend to fix this issue in PAN-OS 9.0.15 (ETA November 2021), PAN-OS 9.1.11 (ETA September 2021), PAN-OS 10.0.8 (ETA September 2021), PAN-OS 10.1.2 (ETA September 2021) and all later PAN-OS versions.","supportingMedia":{"value":"We intend to fix this issue in PAN-OS 9.0.15 (ETA November 2021), PAN-OS 9.1.11 (ETA September 2021), PAN-OS 10.0.8 (ETA September 2021), PAN-OS 10.1.2 (ETA September 2021) and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-08-11T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2022","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-11-11T00:00:00","dateReserved":"2020-11-11T00:00:00","dateUpdated":"2020-11-11T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Panorama session disclosure during context switch into managed device","datePublic":"2020-11-11T17:00:00.000Z","providerMetadata":{"dateUpdated":"2020-11-12T00:05:20","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An information exposure vulnerability exists in Palo Alto Networks Panorama software that discloses the token for the Panorama web interface administrator's session to a managed device when the Panorama administrator performs a context switch into that device. This vulnerability allows an attacker to gain privileged access to the Panorama web interface. An attacker requires some knowledge of managed firewalls to exploit this issue.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An information exposure vulnerability exists in Palo Alto Networks Panorama software that discloses the token for the Panorama web interface administrator's session to a managed device when the Panorama administrator performs a context switch into that device. This vulnerability allows an attacker to gain privileged access to the Panorama web interface. An attacker requires some knowledge of managed firewalls to exploit this issue.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.17;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.11;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.5.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.17;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.11;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.5.</pre>"}]}],"x_affectedList":["PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"10.0.*","status":"unaffected"},{"version":"8.1","status":"affected","lessThan":"8.1.17","versionType":"custom","changes":[{"at":"8.1.17","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.11","versionType":"custom","changes":[{"at":"9.0.11","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.5","versionType":"custom","changes":[{"at":"9.1.5","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2022"}],"credits":[{"lang":"en","value":"This issue was found by Ben Nott of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-200 Information Exposure","cweId":"CWE-200"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-125218"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"This issue is not applicable when custom certificate authentication is enabled between Panorama and managed firewalls. See https://docs.paloaltonetworks.com/panorama/10-0/panorama-admin/set-up-panorama/set-up-authentication-using-custom-certificates.html","supportingMedia":{"value":"This issue is not applicable when custom certificate authentication is enabled between Panorama and managed firewalls. See https://docs.paloaltonetworks.com/panorama/10-0/panorama-admin/set-up-panorama/set-up-authentication-using-custom-certificates.html","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"This issue can be completely mitigated by enabling custom certificate authentication between Panorama and managed firewalls. See https://docs.paloaltonetworks.com/panorama/10-0/panorama-admin/set-up-panorama/set-up-authentication-using-custom-certificates.html","supportingMedia":{"value":"This issue can be completely mitigated by enabling custom certificate authentication between Panorama and managed firewalls. See https://docs.paloaltonetworks.com/panorama/10-0/panorama-admin/set-up-panorama/set-up-authentication-using-custom-certificates.html","type":"text/html","base64":false}},{"lang":"en","value":"This issue impacts the management web interface of appliances running PAN-OS software and is strongly mitigated by following best practices for securing the interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com/best-practices"}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.17, PAN-OS 9.0.11, PAN-OS 9.1.5, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.17, PAN-OS 9.0.11, PAN-OS 9.1.5, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-11-11T17:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2050","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-11-11T00:00:00","dateReserved":"2020-11-11T00:00:00","dateUpdated":"2020-11-19T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Authentication bypass vulnerability in GlobalProtect client certificate verification","datePublic":"2020-11-11T17:00:00.000Z","providerMetadata":{"dateUpdated":"2020-11-12T00:05:22","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an attacker to bypass all client certificate checks with an invalid certificate. A remote attacker can successfully authenticate as any user and gain access to restricted VPN network resources when the gateway or portal is configured to rely entirely on certificate-based authentication.\n\nImpacted features that use SSL VPN with client certificate verification are:\n  GlobalProtect Gateway,\n  GlobalProtect Portal,\n  GlobalProtect Clientless VPN,\n  GlobalProtect Large Scale VPN\n\nIn configurations where client certificate verification is used in conjunction with other authentication methods, the protections added by the certificate check are ignored as a result of this issue.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an attacker to bypass all client certificate checks with an invalid certificate. A remote attacker can successfully authenticate as any user and gain access to restricted VPN network resources when the gateway or portal is configured to rely entirely on certificate-based authentication.\n\nImpacted features that use SSL VPN with client certificate verification are:\n  GlobalProtect Gateway,\n  GlobalProtect Portal,\n  GlobalProtect Clientless VPN,\n  GlobalProtect Large Scale VPN\n\nIn configurations where client certificate verification is used in conjunction with other authentication methods, the protections added by the certificate check are ignored as a result of this issue.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.17;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.11;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.5;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.1.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.17;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.11;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.5;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.1.</pre>"}]}],"x_affectedList":["PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.4","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.10","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.16","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.17","versionType":"custom","changes":[{"at":"8.1.17","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.11","versionType":"custom","changes":[{"at":"9.0.11","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.5","versionType":"custom","changes":[{"at":"9.1.5","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.1","versionType":"custom","changes":[{"at":"10.0.1","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2050"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":8.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-285 Improper Authorization","cweId":"CWE-285"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-146650"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"This issue is only applicable to PAN-OS appliances using the GlobalProtect VPN, gateway, or portal configured to allow users to authenticate with client certificate authentication.\n\nThis issue can not be exploited if client certificate authentication is not in use.\n\nOther forms of authentication are not impacted by this issue.\n","supportingMedia":{"value":"This issue is only applicable to PAN-OS appliances using the GlobalProtect VPN, gateway, or portal configured to allow users to authenticate with client certificate authentication.\n\nThis issue can not be exploited if client certificate authentication is not in use.\n\nOther forms of authentication are not impacted by this issue.\n","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59884 on traffic destined for the GlobalProtect portal, gateway, or VPN will block attacks against CVE-2020-2050.\n\nThis issue can be mitigated by configuring GlobalProtect to require users to authenticate with their credentials. Other authentication methods are not impacted by this issue.","supportingMedia":{"value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59884 on traffic destined for the GlobalProtect portal, gateway, or VPN will block attacks against CVE-2020-2050.\n\nThis issue can be mitigated by configuring GlobalProtect to require users to authenticate with their credentials. Other authentication methods are not impacted by this issue.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.17, PAN-OS 9.0.11, PAN-OS 9.1.5, PAN-OS 10.0.1, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.17, PAN-OS 9.0.11, PAN-OS 9.1.5, PAN-OS 10.0.1, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-11-11T17:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2020-11-13T00:42:00.000Z","lang":"eng","value":"New workaround is available."},{"time":"2020-11-19T21:00:00.000Z","lang":"eng","value":"Updated to mention LSVPN and IPSec based VPN is not affected."}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2000","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-11-11T00:00:00","dateReserved":"2020-11-11T00:00:00","dateUpdated":"2020-11-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection and memory corruption vulnerability","datePublic":"2020-11-11T17:00:00.000Z","providerMetadata":{"dateUpdated":"2020-11-12T00:05:20","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS command injection and memory corruption vulnerability in the PAN-OS management web interface that allows authenticated administrators to disrupt system processes and potentially execute arbitrary code and OS commands with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS command injection and memory corruption vulnerability in the PAN-OS management web interface that allows authenticated administrators to disrupt system processes and potentially execute arbitrary code and OS commands with root privileges.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.16;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.10;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.4;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.1.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.16;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.10;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.4;\nPAN-OS 10.0 versions earlier than PAN-OS 10.0.1.\n</pre>"}]}],"x_affectedList":["PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.16","versionType":"custom","changes":[{"at":"8.1.16","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.10","versionType":"custom","changes":[{"at":"9.0.10","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.4","versionType":"custom","changes":[{"at":"9.1.4","status":"unaffected"}]},{"version":"10.0","status":"affected","lessThan":"10.0.1","versionType":"custom","changes":[{"at":"10.0.1","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2000"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]},{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]},{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-121 Stack-based Buffer Overflow","cweId":"CWE-121"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-149822","PAN-150013","PAN-150170","CYR-14134","CYR-14135"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59888, and 59891 on a firewall protecting the management interface will block attacks against CVE-2020-2000.\n\nThis issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59888, and 59891 on a firewall protecting the management interface will block attacks against CVE-2020-2000.\n\nThis issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.10, PAN-OS 9.1.4, PAN-OS 10.0.1, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.10, PAN-OS 9.1.4, PAN-OS 10.0.1, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-11-11T17:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2020-11-13T00:47:00.000Z","lang":"eng","value":"Added a new workaround"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2042","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-09-09T00:00:00","dateReserved":"2020-09-09T00:00:00","dateUpdated":"2020-09-09T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Buffer overflow in the management web interface","datePublic":"2020-09-09T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-09-09T16:45:28","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A buffer overflow vulnerability in the PAN-OS management web interface allows authenticated administrators to disrupt system processes and potentially execute arbitrary code with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A buffer overflow vulnerability in the PAN-OS management web interface allows authenticated administrators to disrupt system processes and potentially execute arbitrary code with root privileges.</pre>"}]},{"lang":"en","value":"This issue impacts only PAN-OS 10.0 versions earlier than PAN-OS 10.0.1.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts only PAN-OS 10.0 versions earlier than PAN-OS 10.0.1.\n</pre>"}]}],"x_affectedList":["PAN-OS 10.0.0","PAN-OS 10.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.1.*","status":"unaffected"},{"version":"9.0.*","status":"unaffected"},{"version":"8.1.*","status":"unaffected"},{"version":"10.0","status":"affected","lessThan":"10.0.1","versionType":"custom","changes":[{"at":"10.0.1","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2042"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-121 Stack-based Buffer Overflow","cweId":"CWE-121"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-145797","PAN-150409"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 10.0.1 and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 10.0.1 and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-09-09T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2038","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-09-09T00:00:00","dateReserved":"2020-09-09T00:00:00","dateUpdated":"2021-02-12T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection vulnerability in the management web interface","datePublic":"2020-09-09T16:00:00.000Z","providerMetadata":{"dateUpdated":"2022-09-16T15:06:18","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 9.0 versions earlier than 9.0.10;\nPAN-OS 9.1 versions earlier than 9.1.4;\nPAN-OS 10.0 versions earlier than 10.0.1.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 9.0 versions earlier than 9.0.10;\nPAN-OS 9.1 versions earlier than 9.1.4;\nPAN-OS 10.0 versions earlier than 10.0.1.</pre>"}]}],"x_affectedList":["PAN-OS 10.0.0","PAN-OS 10.0","PAN-OS 9.1.3-h1","PAN-OS 9.1.3","PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1.*","status":"unaffected"},{"version":"10.0","status":"affected","lessThan":"10.0.1","versionType":"custom","changes":[{"at":"10.0.1","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.10","versionType":"custom","changes":[{"at":"9.0.10","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.4","versionType":"custom","changes":[{"at":"9.1.4","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2038"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Mikhail Klyuchnikov and Nikita Abramov of Positive Technologies for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-101484"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59954 on traffic destined for the GlobalProtect portal, gateway, or VPN will block attacks against CVE-2020-2038.\n\nThis issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59954 on traffic destined for the GlobalProtect portal, gateway, or VPN will block attacks against CVE-2020-2038.\n\nThis issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n\nPalo Alto Networks is aware of publicly available information that may help construct proof of concept exploits for these issues.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n\nPalo Alto Networks is aware of publicly available information that may help construct proof of concept exploits for these issues.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 9.0.10, PAN-OS 9.1.4, PAN-OS 10.0.1, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 9.0.10, PAN-OS 9.1.4, PAN-OS 10.0.1, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2021-02-12T20:00:00.000Z","lang":"eng","value":"Updated the availability of exploitation resources"},{"time":"2020-09-09T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2037","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-09-09T00:00:00","dateReserved":"2020-09-09T00:00:00","dateUpdated":"2021-02-12T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection vulnerability in the management web interface","datePublic":"2020-09-09T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-09-09T16:45:26","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.16;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.10;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.3.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.16;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.10;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.3.</pre>"}]}],"x_affectedList":["PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.9-h1","PAN-OS 9.0.9","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.16","versionType":"custom","changes":[{"at":"8.1.16","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.10","versionType":"custom","changes":[{"at":"9.0.10","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.3","versionType":"custom","changes":[{"at":"9.1.3","status":"unaffected"}]},{"version":"10.0.0","status":"unaffected","lessThan":"10.0*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2037"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Mikhail Klyuchnikov of Positive Technologies, and Nicholas Newsom of Palo Alto Networks for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-128761"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59971 on traffic destined for the GlobalProtect portal, gateway, or VPN will block attacks against CVE-2020-2037.\n\nThis issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59971 on traffic destined for the GlobalProtect portal, gateway, or VPN will block attacks against CVE-2020-2037.\n\nThis issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n\nPalo Alto Networks is aware of publicly available information that may help construct proof of concept exploits for these issues.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n\nPalo Alto Networks is aware of publicly available information that may help construct proof of concept exploits for these issues.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.10, PAN-OS 9.1.3, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.10, PAN-OS 9.1.3, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-09-09T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-02-12T20:00:00.000Z","lang":"eng","value":"Updated the availability of exploitation resources"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2036","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-09-09T00:00:00","dateReserved":"2020-09-09T00:00:00","dateUpdated":"2021-02-12T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Reflected Cross-Site Scripting (XSS) vulnerability in management web interface","datePublic":"2020-09-09T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-09-09T18:16:56","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A reflected cross-site scripting (XSS) vulnerability exists in the PAN-OS management web interface. A remote attacker able to convince an administrator with an active authenticated session on the firewall management interface to click on a crafted link to that management web interface could potentially execute arbitrary JavaScript code in the administrator's browser and perform administrative actions.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A reflected cross-site scripting (XSS) vulnerability exists in the PAN-OS management web interface. A remote attacker able to convince an administrator with an active authenticated session on the firewall management interface to click on a crafted link to that management web interface could potentially execute arbitrary JavaScript code in the administrator's browser and perform administrative actions.</pre>"}]},{"lang":"en","value":"This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.16;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.9.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts:\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.16;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.9.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0","status":"affected","lessThan":"9.0.9","versionType":"custom","changes":[{"at":"9.0.9","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"},{"version":"8.1","status":"affected","lessThan":"8.1.16","versionType":"custom","changes":[{"at":"8.1.16","status":"unaffected"}]},{"version":"10.0.0","status":"unaffected","lessThan":"10.0*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2036"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Mikhail Klyuchnikov and Nikita Abramov of Positive Technologies and Ben Nott of Palo Alto Networks for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-79 Cross-site Scripting (XSS)","cweId":"CWE-79"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-116720"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59968 on traffic destined for the GlobalProtect portal, gateway, or VPN will block attacks against CVE-2020-2036.\n\nAdministrators should use caution when they are authenticated to the firewall management web interface and not click or open links from unsolicited sources.  \n\nThis issue impacts the management web interface of PAN-OS. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. \nPlease review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 59968 on traffic destined for the GlobalProtect portal, gateway, or VPN will block attacks against CVE-2020-2036.\n\nAdministrators should use caution when they are authenticated to the firewall management web interface and not click or open links from unsolicited sources.  \n\nThis issue impacts the management web interface of PAN-OS. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. \nPlease review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n\nPalo Alto Networks is aware of publicly available information that may help construct proof of concept exploits for these issues.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n\nPalo Alto Networks is aware of publicly available information that may help construct proof of concept exploits for these issues.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.9, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.9, and all later PAN-OS versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-09-09T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2021-02-12T20:00:00.000Z","lang":"eng","value":"Updated the availability of exploitation resources"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2041","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-09-09T00:00:00","dateReserved":"2020-09-09T00:00:00","dateUpdated":"2020-09-09T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Management web interface denial-of-service (DoS)","datePublic":"2020-09-09T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-09-09T16:45:28","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An insecure configuration of the appweb daemon of Palo Alto Networks PAN-OS 8.1 allows a remote unauthenticated user to send a specifically crafted request to the device that causes the appweb service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode.\n\nThis issue impacts all versions of PAN-OS 8.0, and PAN-OS 8.1 versions earlier than 8.1.16.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An insecure configuration of the appweb daemon of Palo Alto Networks PAN-OS 8.1 allows a remote unauthenticated user to send a specifically crafted request to the device that causes the appweb service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode.\n\nThis issue impacts all versions of PAN-OS 8.0, and PAN-OS 8.1 versions earlier than 8.1.16.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.15-h3","PAN-OS 8.1.15-h2","PAN-OS 8.1.15-h1","PAN-OS 8.1.15","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0.*","status":"unaffected"},{"version":"9.1.*","status":"unaffected"},{"version":"10.0.*","status":"unaffected"},{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.16","versionType":"custom","changes":[{"at":"8.1.16","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2041"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-16 Configuration","cweId":"CWE-16"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-151978"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue impacts the management web interface of PAN-OS. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue impacts the management web interface of PAN-OS. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.16 and all later PAN-OS versions.\n\nPAN-OS 7.1 and PAN-OS 8.0 are end-of-life and are no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.16 and all later PAN-OS versions.\n\nPAN-OS 7.1 and PAN-OS 8.0 are end-of-life and are no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-09-09T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2040","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-09-09T00:00:00","dateReserved":"2020-09-09T00:00:00","dateUpdated":"2020-09-09T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Buffer overflow when Captive Portal or Multi-Factor Authentication (MFA) is enabled","datePublic":"2020-09-09T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-09-09T16:45:27","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A buffer overflow vulnerability in PAN-OS allows an unauthenticated attacker to disrupt system processes and potentially execute arbitrary code with root privileges by sending a malicious request to the Captive Portal or Multi-Factor Authentication interface.\nThis issue impacts:\nAll versions of PAN-OS 8.0;\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.15;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.9;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.3.\n\nThis issue does not impact the GlobalProtect VPN or the PAN-OS management web interfaces.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A buffer overflow vulnerability in PAN-OS allows an unauthenticated attacker to disrupt system processes and potentially execute arbitrary code with root privileges by sending a malicious request to the Captive Portal or Multi-Factor Authentication interface.\nThis issue impacts:\nAll versions of PAN-OS 8.0;\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.15;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.9;\nPAN-OS 9.1 versions earlier than PAN-OS 9.1.3.\n\nThis issue does not impact the GlobalProtect VPN or the PAN-OS management web interfaces.</pre>"}]}],"x_affectedList":["PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"9.0","status":"affected","lessThan":"9.0.9","versionType":"custom","changes":[{"at":"9.0.9","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.3","versionType":"custom","changes":[{"at":"9.1.3","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.15","versionType":"custom","changes":[{"at":"8.1.15","status":"unaffected"}]},{"version":"10.0.0","status":"unaffected","lessThan":"10.0*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2040"}],"credits":[{"lang":"en","value":"This issue was found by Yamata Li of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-120 Buffer Overflow","cweId":"CWE-120"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-145149","PAN-145150","PAN-145151","PAN-145195"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only where either Captive Portal is enabled or Multi-Factor Authentication (MFA) is configured as per https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/authentication/configure-multi-factor-authentication.html","supportingMedia":{"value":"This issue is applicable only where either Captive Portal is enabled or Multi-Factor Authentication (MFA) is configured as per https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/authentication/configure-multi-factor-authentication.html","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures in content update version 8317 will block attacks against CVE-2020-2040.","supportingMedia":{"value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures in content update version 8317 will block attacks against CVE-2020-2040.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.15, PAN-OS 9.0.9, PAN-OS 9.1.3, and all later PAN-OS versions.\n\nAll Prisma Access services are now upgraded to resolve this issue and are no longer vulnerable.\n\nPAN-OS 7.1 and 8.0 are end-of-life and are no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.15, PAN-OS 9.0.9, PAN-OS 9.1.3, and all later PAN-OS versions.\n\nAll Prisma Access services are now upgraded to resolve this issue and are no longer vulnerable.\n\nPAN-OS 7.1 and 8.0 are end-of-life and are no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-09-09T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2034","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-07-08T00:00:00","dateReserved":"2020-07-08T00:00:00","dateUpdated":"2020-07-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection vulnerability in GlobalProtect portal","datePublic":"2020-07-08T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-07-08T16:35:17","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network-based attacker to execute arbitrary OS commands with root privileges. An attacker would require some level of specific information about the configuration of an impacted firewall or perform brute-force attacks to exploit this issue. This issue cannot be exploited if the GlobalProtect portal feature is not enabled.\nThis issue impacts PAN-OS 9.1 versions earlier than PAN-OS 9.1.3; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; all versions of PAN-OS 8.0 and PAN-OS 7.1.\nPrisma Access services are not impacted by this vulnerability. Firewalls that were upgraded to the latest versions of PAN-OS to resolve CVE-2020-2021 are not vulnerable to this issue.\nPalo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network-based attacker to execute arbitrary OS commands with root privileges. An attacker would require some level of specific information about the configuration of an impacted firewall or perform brute-force attacks to exploit this issue. This issue cannot be exploited if the GlobalProtect portal feature is not enabled.\nThis issue impacts PAN-OS 9.1 versions earlier than PAN-OS 9.1.3; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; all versions of PAN-OS 8.0 and PAN-OS 7.1.\nPrisma Access services are not impacted by this vulnerability. Firewalls that were upgraded to the latest versions of PAN-OS to resolve CVE-2020-2021 are not vulnerable to this issue.\nPalo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n</pre>"}]}],"x_affectedList":["PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1.*","status":"affected"},{"version":"9.1","status":"affected","lessThan":"9.1.3","versionType":"custom","changes":[{"at":"9.1.3","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.9","versionType":"custom","changes":[{"at":"9.0.9","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.15","versionType":"custom","changes":[{"at":"8.1.15","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2034"}],"credits":[{"lang":"en","value":"This issue was found by Yamata Li of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-145587"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only where GlobalProtect portal is enabled.","supportingMedia":{"value":"This issue is applicable only where GlobalProtect portal is enabled.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 58658 on traffic destined for the GlobalProtect portal will block attacks against CVE-2020-2034.","supportingMedia":{"value":"Until PAN-OS software is upgraded to a fixed version, enabling signatures for Unique Threat ID 58658 on traffic destined for the GlobalProtect portal will block attacks against CVE-2020-2034.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.15, PAN-OS 9.0.9, PAN-OS 9.1.3, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.15, PAN-OS 9.0.9, PAN-OS 9.1.3, and all later PAN-OS versions.","type":"text/html","base64":false}},{"lang":"en","value":"PAN-OS 7.1 and PAN-OS 8.0 are end-of-life (as of June 30, 2020 and October 31, 2019 respectively) and are no longer covered by our Product Security Assurance policies."}],"timeline":[{"time":"2020-07-08T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2020-07-10T06:07:00.000Z","lang":"eng","value":"Updated workaround section with Threat Prevention signature."}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2030","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-07-08T00:00:00","dateReserved":"2020-07-08T00:00:00","dateUpdated":"2020-07-08T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection vulnerability in the management interface","datePublic":"2020-07-08T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-07-08T16:35:16","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges.</pre>"}]},{"lang":"en","value":"This issue impacts PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; and all versions of PAN-OS 7.1 and PAN-OS 8.0.\n\nThis issue does not impact PAN-OS 9.0, PAN-OS 9.1, or Prisma Access services.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue impacts PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; and all versions of PAN-OS 7.1 and PAN-OS 8.0.\n\nThis issue does not impact PAN-OS 9.0, PAN-OS 9.1, or Prisma Access services.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.15","versionType":"custom","changes":[{"at":"8.1.15","status":"unaffected"}]},{"version":"9.0.0","status":"unaffected","lessThan":"9.0*","versionType":"custom"},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2030"}],"credits":[{"lang":"en","value":"This issue was found by Jin Chen of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-100226","PAN-102677"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue impacts the PAN-OS management interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue impacts the PAN-OS management interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.15 and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.15 and all later PAN-OS versions.","type":"text/html","base64":false}},{"lang":"en","value":"PAN-OS 7.1 and PAN-OS 8.0 are end-of-life (as of June 30, 2020 and October 31, 2019 respectively) and are no longer covered by our Product Security Assurance policies."}],"timeline":[{"time":"2020-07-08T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2021","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-06-29T00:00:00","dateReserved":"2020-06-29T00:00:00","dateUpdated":"2020-06-29T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Authentication Bypass in SAML Authentication","datePublic":"2020-06-29T15:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-29T15:10:11","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"When Security Assertion Markup Language (SAML) authentication is enabled and the 'Validate Identity Provider Certificate' option is disabled (unchecked), improper verification of signatures in PAN-OS SAML authentication enables an unauthenticated network-based attacker to access protected resources. The attacker must have network access to the vulnerable server to exploit this vulnerability.\n\nThis issue affects PAN-OS 9.1 versions earlier than PAN-OS 9.1.3; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15, and all versions of PAN-OS 8.0 (EOL). This issue does not affect PAN-OS 7.1.\n\nThis issue cannot be exploited if SAML is not used for authentication. \n\nThis issue cannot be exploited if the 'Validate Identity Provider Certificate' option is enabled (checked) in the SAML Identity Provider Server Profile.\n\nResources that can be protected by SAML-based single sign-on (SSO) authentication are: \n  GlobalProtect Gateway,\n  GlobalProtect Portal,\n  GlobalProtect Clientless VPN,\n  Authentication and Captive Portal,\n  PAN-OS next-generation firewalls (PA-Series, VM-Series) and Panorama web interfaces,\n  Prisma Access\n\nIn the case of GlobalProtect Gateways, GlobalProtect Portal, Clientless VPN, Captive Portal, and Prisma Access, an unauthenticated attacker with network access to the affected servers can gain access to protected resources if allowed by configured authentication and Security policies. There is no impact on the integrity and availability of the gateway, portal, or VPN server. An attacker cannot inspect or tamper with sessions of regular users. In the worst case, this is a critical severity vulnerability with a CVSS Base Score of 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N).\n\nIn the case of PAN-OS and Panorama web interfaces, this issue allows an unauthenticated attacker with network access to the PAN-OS or Panorama web interfaces to log in as an administrator and perform administrative actions. In the worst-case scenario, this is a critical severity vulnerability with a CVSS Base Score of 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). If the web interfaces are only accessible to a restricted management network, then the issue is lowered to a CVSS Base Score of 9.6 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).\n\nPalo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>When Security Assertion Markup Language (SAML) authentication is enabled and the 'Validate Identity Provider Certificate' option is disabled (unchecked), improper verification of signatures in PAN-OS SAML authentication enables an unauthenticated network-based attacker to access protected resources. The attacker must have network access to the vulnerable server to exploit this vulnerability.\n\nThis issue affects PAN-OS 9.1 versions earlier than PAN-OS 9.1.3; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15, and all versions of PAN-OS 8.0 (EOL). This issue does not affect PAN-OS 7.1.\n\nThis issue cannot be exploited if SAML is not used for authentication. \n\nThis issue cannot be exploited if the 'Validate Identity Provider Certificate' option is enabled (checked) in the SAML Identity Provider Server Profile.\n\nResources that can be protected by SAML-based single sign-on (SSO) authentication are: \n  GlobalProtect Gateway,\n  GlobalProtect Portal,\n  GlobalProtect Clientless VPN,\n  Authentication and Captive Portal,\n  PAN-OS next-generation firewalls (PA-Series, VM-Series) and Panorama web interfaces,\n  Prisma Access\n\nIn the case of GlobalProtect Gateways, GlobalProtect Portal, Clientless VPN, Captive Portal, and Prisma Access, an unauthenticated attacker with network access to the affected servers can gain access to protected resources if allowed by configured authentication and Security policies. There is no impact on the integrity and availability of the gateway, portal, or VPN server. An attacker cannot inspect or tamper with sessions of regular users. In the worst case, this is a critical severity vulnerability with a CVSS Base Score of 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N).\n\nIn the case of PAN-OS and Panorama web interfaces, this issue allows an unauthenticated attacker with network access to the PAN-OS or Panorama web interfaces to log in as an administrator and perform administrative actions. In the worst-case scenario, this is a critical severity vulnerability with a CVSS Base Score of 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). If the web interfaces are only accessible to a restricted management network, then the issue is lowered to a CVSS Base Score of 9.6 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).\n\nPalo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n</pre>"}]}],"x_affectedList":["PAN-OS 9.1.2-h1","PAN-OS 9.1.2","PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.8","PAN-OS 9.0.7","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.14-h2","PAN-OS 8.1.14-h1","PAN-OS 8.1.14","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"unaffected"},{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.15","versionType":"custom","changes":[{"at":"8.1.15","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.9","versionType":"custom","changes":[{"at":"9.0.9","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.3","versionType":"custom","changes":[{"at":"9.1.3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2021"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Salman Khan from the Cyber Risk and Resilience Team and Cameron Duck from the Identity Services Team at Monash University for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-347 Improper Verification of Cryptographic Signature","cweId":"CWE-347"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-148988"],"discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This issue is applicable only where SAML authentication is enabled and the 'Validate Identity Provider Certificate' option is disabled (unchecked) in the SAML Identity Provider Server Profile.\nThis issue cannot be exploited if SAML is not used for authentication.\nThis issue cannot be exploited if the 'Validate Identity Provider Certificate' option is enabled in the SAML Identity Provider Server Profile.\nDetailed descriptions of how to check for the configuration required for exposure and mitigate them are listed in the knowledge base article https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UXK.\nTo check whether SAML authentication is enabled on a firewall, see the configuration under Device > Server Profiles > SAML Identity Provider.\nTo check whether SAML authentication is enabled for Panorama administrator authentication, see the configuration under Panorama> Server Profiles > SAML Identity Provider\nTo check whether SAML authentication is enabled for firewalls managed by Panorama, see the configuration under Device > [template]> Server Profiles > SAML Identity Provider.\nAny unauthorized access is logged in the system logs based on the configuration; however, it can be difficult to distinguish between valid and malicious logins or sessions.\n","supportingMedia":{"value":"This issue is applicable only where SAML authentication is enabled and the 'Validate Identity Provider Certificate' option is disabled (unchecked) in the SAML Identity Provider Server Profile.\nThis issue cannot be exploited if SAML is not used for authentication.\nThis issue cannot be exploited if the 'Validate Identity Provider Certificate' option is enabled in the SAML Identity Provider Server Profile.\nDetailed descriptions of how to check for the configuration required for exposure and mitigate them are listed in the knowledge base article https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UXK.\nTo check whether SAML authentication is enabled on a firewall, see the configuration under Device > Server Profiles > SAML Identity Provider.\nTo check whether SAML authentication is enabled for Panorama administrator authentication, see the configuration under Panorama> Server Profiles > SAML Identity Provider\nTo check whether SAML authentication is enabled for firewalls managed by Panorama, see the configuration under Device > [template]> Server Profiles > SAML Identity Provider.\nAny unauthorized access is logged in the system logs based on the configuration; however, it can be difficult to distinguish between valid and malicious logins or sessions.\n","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Using a different authentication method and disabling SAML authentication will completely mitigate the issue.\nUntil an upgrade can be performed, applying both these mitigations (a) and (b) eliminates the configuration required for exposure to this vulnerability:\n\n(a) Ensure that the 'Identity Provider Certificate' is configured. Configuring the 'Identity Provider Certificate' is an essential part of a secure SAML authentication configuration.\n\n(b) If the identity provider (IdP) certificate is a certificate authority (CA) signed certificate, then ensure that the 'Validate Identity Provider Certificate' option is enabled in the SAML Identity Provider Server Profile. Many popular IdPs  generate self-signed IdP certificates by default and the 'Validate Identity Provider Certificate' option cannot be enabled. Additional steps may be required to use a certificate signed by a CA. This certificate can be signed by an internal enterprise CA, the CA on the PAN-OS, or a public CA. Instructions to configure a CA-issued certificate on IdPs are available at https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UXP.\n\nUpgrading to a fixed version of PAN-OS software prevents any future configuration changes related to SAML that inadvertently expose protected services to attacks.\n","supportingMedia":{"value":"Using a different authentication method and disabling SAML authentication will completely mitigate the issue.\nUntil an upgrade can be performed, applying both these mitigations (a) and (b) eliminates the configuration required for exposure to this vulnerability:\n\n(a) Ensure that the 'Identity Provider Certificate' is configured. Configuring the 'Identity Provider Certificate' is an essential part of a secure SAML authentication configuration.\n\n(b) If the identity provider (IdP) certificate is a certificate authority (CA) signed certificate, then ensure that the 'Validate Identity Provider Certificate' option is enabled in the SAML Identity Provider Server Profile. Many popular IdPs  generate self-signed IdP certificates by default and the 'Validate Identity Provider Certificate' option cannot be enabled. Additional steps may be required to use a certificate signed by a CA. This certificate can be signed by an internal enterprise CA, the CA on the PAN-OS, or a public CA. Instructions to configure a CA-issued certificate on IdPs are available at https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UXP.\n\nUpgrading to a fixed version of PAN-OS software prevents any future configuration changes related to SAML that inadvertently expose protected services to attacks.\n","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n","supportingMedia":{"value":"Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.\n","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.15, PAN-OS 9.0.9, PAN-OS 9.1.3, and all later versions.\n\nImportant: Ensure that the signing certificate for your SAML Identity Provider is configured as the 'Identity Provider Certificate' before you upgrade to a fixed version to ensure that your users can continue to authenticate successfully. Configuring the 'Identity Provider Certificate' is an essential part of a secure SAML authentication configuration. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/authentication/configure-saml-authentication\n\nDetails of all actions required before and after upgrading PAN-OS are available in https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UXK. \n\nTo eliminate unauthorized sessions on GlobalProtect portals and gateways, Prisma Access managed through Panorama, change the certificate used to encrypt and decrypt the Authentication Override cookie on the GlobalProtect portal and gateways using the Panorama or firewall web interface. Refer to this article for configuring Authentication override cookies: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UXy\n\nRestarting firewalls and Panorama eliminates any unauthorized sessions on the web interface.\nTo clear any unauthorized user sessions in Captive Portal take the following steps: \nRun the following command \n    show user ip-user-mapping all type SSO\nFor all the IPs returned, run these two commands to clear the users:\n    clear user-cache-mp <above ips>\n    clear user-cache <above ips>\nPAN-OS 8.0 is end-of-life (as of October 31, 2019) and is no longer covered by our Product Security Assurance policies.\nAll Prisma Access services have been upgraded to resolve this issue and are no longer vulnerable. Prisma Access customers do not require any changes to SAML or IdP configurations.\n","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.15, PAN-OS 9.0.9, PAN-OS 9.1.3, and all later versions.\n\nImportant: Ensure that the signing certificate for your SAML Identity Provider is configured as the 'Identity Provider Certificate' before you upgrade to a fixed version to ensure that your users can continue to authenticate successfully. Configuring the 'Identity Provider Certificate' is an essential part of a secure SAML authentication configuration. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/authentication/configure-saml-authentication\n\nDetails of all actions required before and after upgrading PAN-OS are available in https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UXK. \n\nTo eliminate unauthorized sessions on GlobalProtect portals and gateways, Prisma Access managed through Panorama, change the certificate used to encrypt and decrypt the Authentication Override cookie on the GlobalProtect portal and gateways using the Panorama or firewall web interface. Refer to this article for configuring Authentication override cookies: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UXy\n\nRestarting firewalls and Panorama eliminates any unauthorized sessions on the web interface.\nTo clear any unauthorized user sessions in Captive Portal take the following steps: \nRun the following command \n    show user ip-user-mapping all type SSO\nFor all the IPs returned, run these two commands to clear the users:\n    clear user-cache-mp <above ips>\n    clear user-cache <above ips>\nPAN-OS 8.0 is end-of-life (as of October 31, 2019) and is no longer covered by our Product Security Assurance policies.\nAll Prisma Access services have been upgraded to resolve this issue and are no longer vulnerable. Prisma Access customers do not require any changes to SAML or IdP configurations.\n","type":"text/html","base64":false}}],"timeline":[{"time":"2020-06-29T15:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2027","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-06-10T00:00:00","dateReserved":"2020-06-10T00:00:00","dateUpdated":"2020-06-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Buffer overflow in authd authentication response","datePublic":"2020-06-10T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-10T17:28:15","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A buffer overflow vulnerability in the authd component of the PAN-OS management server allows authenticated administrators to disrupt system processes and potentially execute arbitrary code with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A buffer overflow vulnerability in the authd component of the PAN-OS management server allows authenticated administrators to disrupt system processes and potentially execute arbitrary code with root privileges.</pre>"}]},{"lang":"en","value":"This issue affects:\nAll versions of PAN-OS 7.1 and PAN-OS 8.0;\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.13;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.7.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\nAll versions of PAN-OS 7.1 and PAN-OS 8.0;\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.13;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.7.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"affected"},{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2027"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-121 Stack-based Buffer Overflow","cweId":"CWE-121"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["CYR-10833"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and you can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and you can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7, PAN-OS 9.1.0, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7, PAN-OS 9.1.0, and all later PAN-OS versions.","type":"text/html","base64":false}},{"lang":"en","value":"PAN-OS 8.0 is end-of-life (as of October 31, 2019) and is no longer covered by our Product Security Assurance policies.\nPAN-OS 7.1 is on extended support until June 30, 2020, and we are considering updates only for critical security vulnerability fixes.\n"}],"timeline":[{"time":"2020-06-10T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2028","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-06-10T00:00:00","dateReserved":"2020-06-10T00:00:00","dateUpdated":"2020-06-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection vulnerability in FIPS-CC mode certificate verification","datePublic":"2020-06-10T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-10T17:28:28","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS Command Injection vulnerability in PAN-OS management server allows authenticated administrators to execute arbitrary OS commands with root privileges when uploading a new certificate in FIPS-CC mode.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS Command Injection vulnerability in PAN-OS management server allows authenticated administrators to execute arbitrary OS commands with root privileges when uploading a new certificate in FIPS-CC mode.</pre>"}]},{"lang":"en","value":"This issue affects:\nAll versions of PAN-OS 7.1 and PAN-OS 8.0;\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.13;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.7.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\nAll versions of PAN-OS 7.1 and PAN-OS 8.0;\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.13;\nPAN-OS 9.0 versions earlier than PAN-OS 9.0.7.\n</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"affected"},{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2028"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-125804"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and you can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and you can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7, PAN-OS 9.1.0, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7, PAN-OS 9.1.0, and all later PAN-OS versions.","type":"text/html","base64":false}},{"lang":"en","value":"PAN-OS 8.0 is end-of-life (as of October 31, 2019) and is no longer covered by our Product Security Assurance policies.\nPAN-OS 7.1 is on extended support until June 30, 2020, and we are considering updates only for critical security vulnerability fixes."}],"timeline":[{"time":"2020-06-10T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2029","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-06-10T00:00:00","dateReserved":"2020-06-10T00:00:00","dateUpdated":"2020-06-10T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection vulnerability in management interface certificate generator","datePublic":"2020-06-10T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-10T17:28:40","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS Command Injection vulnerability in the PAN-OS web management interface allows authenticated administrators to execute arbitrary OS commands with root privileges by sending a malicious request to generate new certificates for use in the PAN-OS configuration.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS Command Injection vulnerability in the PAN-OS web management interface allows authenticated administrators to execute arbitrary OS commands with root privileges by sending a malicious request to generate new certificates for use in the PAN-OS configuration.</pre>"}]},{"lang":"en","value":"This issue affects:\nAll versions of PAN-OS 8.0;\nPAN-OS 7.1 versions earlier than PAN-OS 7.1.26;\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.13.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\nAll versions of PAN-OS 8.0;\nPAN-OS 7.1 versions earlier than PAN-OS 7.1.26;\nPAN-OS 8.1 versions earlier than PAN-OS 8.1.13.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0.0","status":"unaffected","lessThan":"9.0*","versionType":"custom"},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2029"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Przemysław Kowalski of STM Solutions for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-124621"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and you can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and you can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, and all later PAN-OS versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, and all later PAN-OS versions.","type":"text/html","base64":false}},{"lang":"en","value":"PAN-OS 8.0 is end-of-life (as of October 31, 2019) and is no longer covered by our Product Security Assurance policies.\nPAN-OS 7.1 is on extended support until June 30, 2020, and we are considering updates only for critical security vulnerability fixes.\n"}],"timeline":[{"time":"2020-06-10T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2012","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Panorama: XML external entity reference ('XXE') vulnerability leads the to information leak","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-10T17:23:19","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"Improper restriction of XML external entity reference ('XXE') vulnerability in Palo Alto Networks Panorama management service allows remote unauthenticated attackers with network access to the Panorama management interface to read arbitrary files on the system.\n\nThis issue affects:\nAll versions of PAN-OS for Panorama 7.1 and 8.0;\nPAN-OS for Panorama 8.1 versions earlier than 8.1.13;\nPAN-OS for Panorama 9.0 versions earlier than 9.0.7.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Improper restriction of XML external entity reference ('XXE') vulnerability in Palo Alto Networks Panorama management service allows remote unauthenticated attackers with network access to the Panorama management interface to read arbitrary files on the system.\n\nThis issue affects:\nAll versions of PAN-OS for Panorama 7.1 and 8.0;\nPAN-OS for Panorama 8.1 versions earlier than 8.1.13;\nPAN-OS for Panorama 9.0 versions earlier than 9.0.7.\n</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2012"}],"credits":[{"lang":"en","value":"This issue was found by Ben Nott of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-611 Improper Restriction of XML External Entity Reference ('XXE')","cweId":"CWE-611"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-119810"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7, PAN-OS 9.1.0, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7, PAN-OS 9.1.0, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2010","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Authenticated user command injection vulnerability","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-10T17:22:50","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS command injection vulnerability in PAN-OS management interface allows an authenticated administrator to execute arbitrary OS commands with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS command injection vulnerability in PAN-OS management interface allows an authenticated administrator to execute arbitrary OS commands with root privileges.</pre>"}]},{"lang":"en","value":"This issue affects:\nAll versions of PAN-OS 7.1 and 8.0;\nPAN-OS 8.1 versions earlier than 8.1.14;\nPAN-OS 9.0 versions earlier than 9.0.7.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\nAll versions of PAN-OS 7.1 and 8.0;\nPAN-OS 8.1 versions earlier than 8.1.14;\nPAN-OS 9.0 versions earlier than 9.0.7.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1.*","status":"affected"},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.14","versionType":"custom","changes":[{"at":"8.1.14","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2010"}],"credits":[{"lang":"en","value":"This issue was discovered by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-126362"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, PAN-OS 9.1.0, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, PAN-OS 9.1.0, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2009","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Panorama SD WAN arbitrary file creation","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-13T19:07:14","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An external control of filename vulnerability in the SD WAN component of Palo Alto Networks PAN-OS Panorama allows an authenticated administrator to send a request that results in the creation and write of an arbitrary file on all firewalls managed by the Panorama. In some cases this results in arbitrary code execution with root permissions.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An external control of filename vulnerability in the SD WAN component of Palo Alto Networks PAN-OS Panorama allows an authenticated administrator to send a request that results in the creation and write of an arbitrary file on all firewalls managed by the Panorama. In some cases this results in arbitrary code execution with root permissions.</pre>"}]},{"lang":"en","value":"This issue affects:\n\nAll versions of PAN-OS 7.1 and 8.0;\n\nPAN-OS 8.1 versions earlier than 8.1.14;\n\nPAN-OS 9.0 versions earlier than 9.0.7.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\n\nAll versions of PAN-OS 7.1 and 8.0;\n\nPAN-OS 8.1 versions earlier than 8.1.14;\n\nPAN-OS 9.0 versions earlier than 9.0.7.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"affected"},{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.14","versionType":"custom","changes":[{"at":"8.1.14","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2009"}],"credits":[{"lang":"en","value":"This issue was found by Nicholas Newsom and Jin Chen of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-73 External Control of File Name or Path","cweId":"CWE-73"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-130361"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2013","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Panorama context switch session cookie disclosure","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-14T15:40:56","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A cleartext transmission of sensitive information vulnerability in Palo Alto Networks PAN-OS Panorama that discloses an authenticated PAN-OS administrator's PAN-OS session cookie. When an administrator issues a context switch request into a managed firewall with an affected PAN-OS Panorama version, their PAN-OS session cookie is transmitted over cleartext to the firewall. An attacker with the ability to intercept this network traffic between the firewall and Panorama can access the administrator's account and further manipulate devices managed by Panorama.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A cleartext transmission of sensitive information vulnerability in Palo Alto Networks PAN-OS Panorama that discloses an authenticated PAN-OS administrator's PAN-OS session cookie. When an administrator issues a context switch request into a managed firewall with an affected PAN-OS Panorama version, their PAN-OS session cookie is transmitted over cleartext to the firewall. An attacker with the ability to intercept this network traffic between the firewall and Panorama can access the administrator's account and further manipulate devices managed by Panorama.</pre>"}]},{"lang":"en","value":"This issue affects:\n\nPAN-OS 7.1 versions earlier than 7.1.26;\n\nPAN-OS 8.1 versions earlier than 8.1.13;\n\nPAN-OS 9.0 versions earlier than 9.0.6;\n\nPAN-OS 9.1 versions earlier than 9.1.1;\n\nAll version of PAN-OS 8.0;","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\n\nPAN-OS 7.1 versions earlier than 7.1.26;\n\nPAN-OS 8.1 versions earlier than 8.1.13;\n\nPAN-OS 9.0 versions earlier than 9.0.6;\n\nPAN-OS 9.1 versions earlier than 9.1.1;\n\nAll version of PAN-OS 8.0;</pre>"}]}],"x_affectedList":["PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"9.0","status":"affected","lessThan":"9.0.6","versionType":"custom","changes":[{"at":"9.0.6","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.1","versionType":"custom","changes":[{"at":"9.1.1","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2013"}],"credits":[{"lang":"en","value":"This issue was found by Ben Nott of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.3,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-319 Cleartext Transmission of Sensitive Information","cweId":"CWE-319"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-125122"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"One possible vulnerability mitigation is to shorten the length of administrator session idle timeout. This reduces the likelihood the exposed administrator’s session cookie is valid at time of attack.","supportingMedia":{"value":"One possible vulnerability mitigation is to shorten the length of administrator session idle timeout. This reduces the likelihood the exposed administrator’s session cookie is valid at time of attack.","type":"text/html","base64":false}},{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com"}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, PAN-OS 9.1.1, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, PAN-OS 9.1.1, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2018","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Panorama authentication bypass vulnerability","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-14T15:40:56","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An authentication bypass vulnerability in the Panorama context switching feature allows an attacker with network access to a Panorama's management interface to gain privileged access to managed firewalls. An attacker requires some knowledge of managed firewalls to exploit this issue. \nThis issue does not affect Panorama configured with custom certificates authentication for communication between Panorama and managed devices.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An authentication bypass vulnerability in the Panorama context switching feature allows an attacker with network access to a Panorama's management interface to gain privileged access to managed firewalls. An attacker requires some knowledge of managed firewalls to exploit this issue. \nThis issue does not affect Panorama configured with custom certificates authentication for communication between Panorama and managed devices.</pre>"}]},{"lang":"en","value":"This issue affects:\n\nPAN-OS 7.1 versions earlier than 7.1.26;\n\nPAN-OS 8.1 versions earlier than 8.1.12;\n\nPAN-OS 9.0 versions earlier than 9.0.6;\n\nAll versions of PAN-OS 8.0.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\n\nPAN-OS 7.1 versions earlier than 7.1.26;\n\nPAN-OS 8.1 versions earlier than 8.1.12;\n\nPAN-OS 9.0 versions earlier than 9.0.6;\n\nAll versions of PAN-OS 8.0.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.12","versionType":"custom","changes":[{"at":"8.1.12","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.6","versionType":"custom","changes":[{"at":"9.0.6","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2018"}],"credits":[{"lang":"en","value":"This issue was found by Ben Nott of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-287 Improper Authentication","cweId":"CWE-287"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-123661"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue can be completely mitigated by enabling custom certificates authentication between Panorama and managed firewalls. See https://docs.paloaltonetworks.com/panorama/8-0/panorama-admin/set-up-panorama/set-up-authentication-using-custom-certificates.html\n\nThis issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","supportingMedia":{"value":"This issue can be completely mitigated by enabling custom certificates authentication between Panorama and managed firewalls. See https://docs.paloaltonetworks.com/panorama/8-0/panorama-admin/set-up-panorama/set-up-authentication-using-custom-certificates.html\n\nThis issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.12, PAN-OS 9.0.6, and all later PAN-OS versions.\n\nUpgrading Panorama to a fixed version is sufficient to resolve the issue.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.12, PAN-OS 9.0.6, and all later PAN-OS versions.\n\nUpgrading Panorama to a fixed version is sufficient to resolve the issue.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2002","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Spoofed Kerberos key distribution center authentication bypass","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-14T15:40:56","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An authentication bypass by spoofing vulnerability exists in the authentication daemon and User-ID components of Palo Alto Networks PAN-OS by failing to verify the integrity of the Kerberos key distribution center (KDC) before authenticating users. This affects all forms of authentication that use a Kerberos authentication profile. A man-in-the-middle type of attacker with the ability to intercept communication between PAN-OS and KDC can login to PAN-OS as an administrator. ","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An authentication bypass by spoofing vulnerability exists in the authentication daemon and User-ID components of Palo Alto Networks PAN-OS by failing to verify the integrity of the Kerberos key distribution center (KDC) before authenticating users. This affects all forms of authentication that use a Kerberos authentication profile. A man-in-the-middle type of attacker with the ability to intercept communication between PAN-OS and KDC can login to PAN-OS as an administrator. </pre>"}]},{"lang":"en","value":"This issue affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.6;\nAll version of PAN-OS 8.0.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.6;\nAll version of PAN-OS 8.0.\n</pre>"}]}],"x_affectedList":["PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.6","versionType":"custom","changes":[{"at":"9.0.6","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2002"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Yoav Iellin, Yaron Kassner, and Rotem Zach from Silverfort for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-290 Authentication Bypass by Spoofing","cweId":"CWE-290"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-118957"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"Ensure that PAN-OS communicates to Kerberos server over a secured network with access restricted to trusted users.\n\nPlease review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","supportingMedia":{"value":"Ensure that PAN-OS communicates to Kerberos server over a secured network with access restricted to trusted users.\n\nPlease review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2001","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-09-11T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Panorama External control of file vulnerability leads to privilege escalation","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-14T15:40:56","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An external control of path and data vulnerability in the Palo Alto Networks PAN-OS Panorama XSLT processing logic that allows an unauthenticated user with network access to PAN-OS management interface to write attacker supplied file on the system and elevate privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An external control of path and data vulnerability in the Palo Alto Networks PAN-OS Panorama XSLT processing logic that allows an unauthenticated user with network access to PAN-OS management interface to write attacker supplied file on the system and elevate privileges.</pre>"}]},{"lang":"en","value":"This issue affects:\n\nAll PAN-OS 7.1 Panorama and 8.0 Panorama versions;\n\nPAN-OS 8.1 versions earlier than 8.1.12 on Panorama;\n\nPAN-OS 9.0 versions earlier than 9.0.6 on Panorama.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\n\nAll PAN-OS 7.1 Panorama and 8.0 Panorama versions;\n\nPAN-OS 8.1 versions earlier than 8.1.12 on Panorama;\n\nPAN-OS 9.0 versions earlier than 9.0.6 on Panorama.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.12","versionType":"custom","changes":[{"at":"8.1.12","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.6","versionType":"custom","changes":[{"at":"9.0.6","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2001"}],"credits":[{"lang":"en","value":"This issue was found by Ben Nott of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-123 Write-what-where Condition","cweId":"CWE-123"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-120397"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue impacts the management web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","supportingMedia":{"value":"This issue impacts the management web interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.12, PAN-OS 9.0.6, and all later PAN-OS versions.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.12, PAN-OS 9.0.6, and all later PAN-OS versions.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2020-09-11T22:06:00.000Z","lang":"eng","value":"Added workaround section"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2017","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: DOM-Based cross site scripting vulnerability in management web interface","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-10T17:24:05","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A DOM-Based Cross Site Scripting Vulnerability exists in PAN-OS and Panorama Management Web Interfaces.\nA remote attacker able to convince an authenticated administrator to click on a crafted link to PAN-OS and Panorama Web Interfaces could execute arbitrary JavaScript code in the administrator's browser and perform administrative actions.\n\nThis issue affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.6;\nAll versions of PAN-OS 8.0.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A DOM-Based Cross Site Scripting Vulnerability exists in PAN-OS and Panorama Management Web Interfaces.\nA remote attacker able to convince an authenticated administrator to click on a crafted link to PAN-OS and Panorama Web Interfaces could execute arbitrary JavaScript code in the administrator's browser and perform administrative actions.\n\nThis issue affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.6;\nAll versions of PAN-OS 8.0.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.6","versionType":"custom","changes":[{"at":"9.0.6","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2017"}],"credits":[{"lang":"en","value":"This issue was found by Chris Ganas of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-79 Cross-site Scripting (XSS)","cweId":"CWE-79"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-121058"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, PAN-OS 9.1.0, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, PAN-OS 9.1.0, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2014","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS injection vulnerability in PAN-OS management server","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-13T19:07:14","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS Command Injection vulnerability in PAN-OS management server allows authenticated users to inject and execute arbitrary shell commands with root privileges.\n\nThis issue affects:\nAll versions of PAN-OS 7.1 and 8.0;\nPAN-OS 8.1 versions earlier than 8.1.14;\nPAN-OS 9.0 versions earlier than 9.0.7.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS Command Injection vulnerability in PAN-OS management server allows authenticated users to inject and execute arbitrary shell commands with root privileges.\n\nThis issue affects:\nAll versions of PAN-OS 7.1 and 8.0;\nPAN-OS 8.1 versions earlier than 8.1.14;\nPAN-OS 9.0 versions earlier than 9.0.7.\n</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.14","versionType":"custom","changes":[{"at":"8.1.14","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2014"}],"credits":[{"lang":"en","value":"This issue was found by Ben Nott of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-127118"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, PAN-OS 9.1.0 and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, PAN-OS 9.1.0 and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2020-0006","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Nginx software upgraded to resolve multiple vulnerabilities","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"Nginx software included with PAN-OS has been upgraded to resolve multiple vulnerabilities.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Nginx software included with PAN-OS has been upgraded to resolve multiple vulnerabilities.</pre>"}]},{"lang":"en","value":"This issue affects:\n\nAll PAN-OS 7.1 and 8.0 versions;\n\nPAN-OS 8.1 versions earlier than 8.1.14;\n\nPAN-OS 9.0 versions earlier than 9.0.7.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\n\nAll PAN-OS 7.1 and 8.0 versions;\n\nPAN-OS 8.1 versions earlier than 8.1.14;\n\nPAN-OS 9.0 versions earlier than 9.0.7.</pre>"}]},{"lang":"en","value":"The resolved vulnerabilities include:","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The resolved vulnerabilities include:</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"affected"},{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.14","versionType":"custom","changes":[{"at":"8.1.14","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2012"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-476 NULL Pointer Dereference","cweId":"CWE-476"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-117480"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"Issues that affect the management interface of PAN-OS are strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","supportingMedia":{"value":"Issues that affect the management interface of PAN-OS are strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"These issues are fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"These issues are fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2006","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Buffer overflow in management server payload parser","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-13T19:07:14","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A stack-based buffer overflow vulnerability in the management server component of PAN-OS that allows an authenticated user to potentially execute arbitrary code with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A stack-based buffer overflow vulnerability in the management server component of PAN-OS that allows an authenticated user to potentially execute arbitrary code with root privileges.</pre>"}]},{"lang":"en","value":"This issue affects:\n\nAll versions of PAN-OS 7.1 and 8.0;\n\nPAN-OS 8.1 versions earlier than 8.1.14.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\n\nAll versions of PAN-OS 7.1 and 8.0;\n\nPAN-OS 8.1 versions earlier than 8.1.14.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"affected"},{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.14","versionType":"custom","changes":[{"at":"8.1.14","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2006"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks Jin Chen of Palo Alto Networks for discovering and reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-121 Stack-based Buffer Overflow","cweId":"CWE-121"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-100855"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.14 and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.14 and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2020-0005","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OpenSSH software upgraded to resolve multiple vulnerabilities","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"OpenSSH software included with PAN-OS has been upgraded to resolve security vulnerability CVE-2016-10012. Additionally, code changes have been made to the server component of the OpenSSH software included in PAN-OS in response to CVE-2015-8325 and CVE-2016-1908 though PAN-OS is not impacted by these issues.\n\nThis issues affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.1;\nAll versions of PAN-OS 8.0.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>OpenSSH software included with PAN-OS has been upgraded to resolve security vulnerability CVE-2016-10012. Additionally, code changes have been made to the server component of the OpenSSH software included in PAN-OS in response to CVE-2015-8325 and CVE-2016-1908 though PAN-OS is not impacted by these issues.\n\nThis issues affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.1;\nAll versions of PAN-OS 8.0.\n</pre>"}]}],"x_affectedList":["PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.1","versionType":"custom","changes":[{"at":"9.0.1","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2020-0005"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-111061"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.1, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.1, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2008","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection or arbitrary file deletion vulnerability","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-13T19:07:14","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS command injection and external control of filename vulnerability in Palo Alto Networks PAN-OS allows authenticated administrators to execute code with root privileges or delete arbitrary system files and impact the system's integrity or cause a denial of service condition.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS command injection and external control of filename vulnerability in Palo Alto Networks PAN-OS allows authenticated administrators to execute code with root privileges or delete arbitrary system files and impact the system's integrity or cause a denial of service condition.</pre>"}]},{"lang":"en","value":"This issue affects:\nAll versions of PAN-OS 7.1 and 8.0;\nPAN-OS 8.1 versions earlier than 8.1.14.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\nAll versions of PAN-OS 7.1 and 8.0;\nPAN-OS 8.1 versions earlier than 8.1.14.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.14","versionType":"custom","changes":[{"at":"8.1.14","status":"unaffected"}]},{"version":"9.0.0","status":"unaffected","lessThan":"9.0*","versionType":"custom"},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2008"}],"credits":[{"lang":"en","value":"This issue was found by Jin Chen of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-73 External Control of File Name or Path","cweId":"CWE-73"}]},{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-102688"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.14 and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.14 and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2015","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Buffer overflow in the management server","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-10T17:23:49","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A buffer overflow vulnerability in the PAN-OS management server allows authenticated users to crash system processes or potentially execute arbitrary code with root privileges.\n\nThis issue affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.7;\nPAN-OS 9.1 versions earlier than 9.1.1;\nAll versions of PAN-OS 8.0.\n\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A buffer overflow vulnerability in the PAN-OS management server allows authenticated users to crash system processes or potentially execute arbitrary code with root privileges.\n\nThis issue affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.7;\nPAN-OS 9.1 versions earlier than 9.1.1;\nAll versions of PAN-OS 8.0.\n\n</pre>"}]}],"x_affectedList":["PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.1","versionType":"custom","changes":[{"at":"9.1.1","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2015"}],"credits":[{"lang":"en","value":"This issue was discovered by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-120 Buffer Overflow","cweId":"CWE-120"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-100734"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.7, PAN-OS 9.1.1, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.7, PAN-OS 9.1.1, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2005","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: GlobalProtect Clientless VPN session hijacking","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-14T15:40:56","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A cross-site scripting (XSS) vulnerability exists when visiting malicious websites with the Palo Alto Networks GlobalProtect Clientless VPN that can compromise the user's active session.\nThis issue affects:\n\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.7;\nAll versions of PAN-OS 8.0.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A cross-site scripting (XSS) vulnerability exists when visiting malicious websites with the Palo Alto Networks GlobalProtect Clientless VPN that can compromise the user's active session.\nThis issue affects:\n\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.7;\nAll versions of PAN-OS 8.0.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2005"}],"credits":[{"lang":"en","value":"This issue was discovered by Ron Masas of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":7.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-79 Cross-site Scripting (XSS)","cweId":"CWE-79"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["GPCON-551"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"This issue only affects firewalls configured with GlobalProtect Clientless VPN.","supportingMedia":{"value":"This issue only affects firewalls configured with GlobalProtect Clientless VPN.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Configure GlobalProtect Clientless VPN to only access known trusted websites, and block access all other websites.","supportingMedia":{"value":"Configure GlobalProtect Clientless VPN to only access known trusted websites, and block access all other websites.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.7, and all later versions of PAN-OS.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.7, and all later versions of PAN-OS.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2007","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: OS command injection in management server","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-13T19:07:14","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An OS command injection vulnerability in the management server component of PAN-OS allows an authenticated user to potentially execute arbitrary commands with root privileges.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An OS command injection vulnerability in the management server component of PAN-OS allows an authenticated user to potentially execute arbitrary commands with root privileges.</pre>"}]},{"lang":"en","value":"This issue affects:\n\nAll PAN-OS 7.1 and 8.0 versions;\n\nPAN-OS 8.1 versions earlier than 8.1.14;\n\nPAN-OS 9.0 versions earlier than 9.0.7. ","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\n\nAll PAN-OS 7.1 and 8.0 versions;\n\nPAN-OS 8.1 versions earlier than 8.1.14;\n\nPAN-OS 9.0 versions earlier than 9.0.7. </pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"affected"},{"version":"8.0.*","status":"affected"},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.14","versionType":"custom","changes":[{"at":"8.1.14","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2007"}],"credits":[{"lang":"en","value":"This issue was found by Jin Chen of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-102682"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 9.0.7 and later PAN-OS 9.0 versions; PAN-OS 8.1.14 and later PAN-OS 8.1 versions; and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"This issue is fixed in PAN-OS 9.0.7 and later PAN-OS 9.0 versions; PAN-OS 8.1.14 and later PAN-OS 8.1 versions; and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2011","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-20T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Panorama registration denial of service","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-13T19:07:14","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An improper input validation vulnerability in the configuration daemon of Palo Alto Networks PAN-OS Panorama allows for a remote unauthenticated user to send a specifically crafted registration request to the device that causes the configuration service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS Panorama services by restarting the device and putting it into maintenance mode.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An improper input validation vulnerability in the configuration daemon of Palo Alto Networks PAN-OS Panorama allows for a remote unauthenticated user to send a specifically crafted registration request to the device that causes the configuration service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS Panorama services by restarting the device and putting it into maintenance mode.</pre>"}]},{"lang":"en","value":"This issue affects:\n\nAll versions of PAN-OS 7.1 and 8.0;\n\nPAN-OS 8.1 versions earlier than 8.1.14;\n\nPAN-OS 9.0 versions earlier than 9.0.7;","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\n\nAll versions of PAN-OS 7.1 and 8.0;\n\nPAN-OS 8.1 versions earlier than 8.1.14;\n\nPAN-OS 9.0 versions earlier than 9.0.7;</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.13","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.26","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"affected"},{"version":"8.0.*","status":"affected"},{"version":"8.1","status":"affected","lessThan":"8.1.14","versionType":"custom","changes":[{"at":"8.1.14","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2011"}],"credits":[{"lang":"en","value":"This issue was found by Ben Nott of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-118226"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issues affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","supportingMedia":{"value":"This issues affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, PAN-OS 9.1.0 and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.7, PAN-OS 9.1.0 and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2020-05-20T19:00:00.000Z","lang":"eng","value":"Removed 9.1.0 from affected releases"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-2016","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-05-13T00:00:00","dateReserved":"2020-05-13T00:00:00","dateUpdated":"2020-05-13T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Temporary file race condition vulnerability in PAN-OS leads to local privilege escalation","datePublic":"2020-05-13T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-06-10T17:24:03","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A race condition due to insecure creation of a file in a temporary directory vulnerability in PAN-OS allows for root privilege escalation from a limited linux user account.\n\nThis allows an attacker who has escaped the restricted shell as a low privilege administrator, possibly by exploiting another vulnerability, to escalate privileges to become root user.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A race condition due to insecure creation of a file in a temporary directory vulnerability in PAN-OS allows for root privilege escalation from a limited linux user account.\n\nThis allows an attacker who has escaped the restricted shell as a low privilege administrator, possibly by exploiting another vulnerability, to escalate privileges to become root user.</pre>"}]},{"lang":"en","value":"This issue affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.6;\nAll versions of PAN-OS 8.0.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>This issue affects:\nPAN-OS 7.1 versions earlier than 7.1.26;\nPAN-OS 8.1 versions earlier than 8.1.13;\nPAN-OS 9.0 versions earlier than 9.0.6;\nAll versions of PAN-OS 8.0.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.20","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.25","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0.*","status":"affected"},{"version":"7.1","status":"affected","lessThan":"7.1.26","versionType":"custom","changes":[{"at":"7.1.26","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.6","versionType":"custom","changes":[{"at":"9.0.6","status":"unaffected"}]},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-2016"}],"credits":[{"lang":"en","value":"Palo Alto Networks thanks the UK's National Cyber Security Centre (NCSC) for discovering and reporting this issue."},{"lang":"en","value":"Palo Alto Networks thanks the NCC Group for finding this issue independently during a contracted PAN-OS security assessment."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-377 Insecure Temporary File","cweId":"CWE-377"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-128248"],"discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any exploitation of this issue.","supportingMedia":{"value":"Palo Alto Networks is not aware of any exploitation of this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, PAN-OS 9.1.0, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","supportingMedia":{"value":"This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, PAN-OS 9.1.0, and all later PAN-OS versions.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-05-13T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-1992","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-04-08T00:00:00","dateReserved":"2020-04-08T00:00:00","dateUpdated":"2020-04-08T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS on PA-7000 Series: Varrcvr daemon network-based denial of service or privilege escalation","datePublic":"2020-04-08T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-04-08T18:41:58","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A format string vulnerability in the Varrcvr daemon of PAN-OS on PA-7000 Series devices with a Log Forwarding Card (LFC) allows remote attackers to crash the daemon creating a denial of service condition or potentially execute code with root privileges.\n\nThis issue affects Palo Alto Networks PAN-OS 9.0 versions before 9.0.7; PAN-OS 9.1 versions before 9.1.2 on PA-7000 Series devices with an LFC installed and configured.\n\nThis issue requires WildFire services to be configured and enabled.\n\nThis issue does not affect PAN-OS 8.1 and earlier releases.\n\nThis issue does not affect any other PA Series firewalls.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A format string vulnerability in the Varrcvr daemon of PAN-OS on PA-7000 Series devices with a Log Forwarding Card (LFC) allows remote attackers to crash the daemon creating a denial of service condition or potentially execute code with root privileges.\n\nThis issue affects Palo Alto Networks PAN-OS 9.0 versions before 9.0.7; PAN-OS 9.1 versions before 9.1.2 on PA-7000 Series devices with an LFC installed and configured.\n\nThis issue requires WildFire services to be configured and enabled.\n\nThis issue does not affect PAN-OS 8.1 and earlier releases.\n\nThis issue does not affect any other PA Series firewalls.</pre>"}]}],"x_affectedList":["PAN-OS 9.1.1","PAN-OS 9.1.0-h3","PAN-OS 9.1.0-h2","PAN-OS 9.1.0-h1","PAN-OS 9.1.0","PAN-OS 9.1","PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]},{"version":"9.1","status":"affected","lessThan":"9.1.2","versionType":"custom","changes":[{"at":"9.1.2","status":"unaffected"}]}],"platforms":["PA-7000 series with LFC"]},{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1.*","status":"unaffected"},{"version":"8.0.*","status":"unaffected"},{"version":"7.1.*","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-1992"}],"credits":[{"lang":"en","value":"This issue was found by a customer."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-134 Use of Externally-Controlled Format String","cweId":"CWE-134"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-135103"],"discovery":"USER"},"configurations":[{"lang":"en","value":"This issue requires WildFire services to be configured and enabled.","supportingMedia":{"value":"This issue requires WildFire services to be configured and enabled.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"There are no viable workarounds for this issue.","supportingMedia":{"value":"There are no viable workarounds for this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 9.0.7, PAN-OS 9.1.2 and all later versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 9.0.7, PAN-OS 9.1.2 and all later versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-04-08T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-1990","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-04-08T00:00:00","dateReserved":"2020-04-08T00:00:00","dateUpdated":"2020-04-08T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Buffer overflow in the management server","datePublic":"2020-04-08T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-04-08T18:41:58","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A stack-based buffer overflow vulnerability in the management server component of PAN-OS allows an authenticated user to upload a corrupted PAN-OS configuration and potentially execute code with root privileges.\n\nThis issue affects Palo Alto Networks PAN-OS 8.1 versions before 8.1.13; 9.0 versions before 9.0.7.\nThis issue does not affect PAN-OS 7.1.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A stack-based buffer overflow vulnerability in the management server component of PAN-OS allows an authenticated user to upload a corrupted PAN-OS configuration and potentially execute code with root privileges.\n\nThis issue affects Palo Alto Networks PAN-OS 8.1 versions before 8.1.13; 9.0 versions before 9.0.7.\nThis issue does not affect PAN-OS 7.1.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.6","PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1.*","status":"unaffected"},{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.7","versionType":"custom","changes":[{"at":"9.0.7","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-1990"}],"credits":[{"lang":"en","value":"This issue was discovered by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-121 Stack-based Buffer Overflow","cweId":"CWE-121"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-121319"],"discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"These issues affect the management interface of PAN-OS and are strongly mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 9.0 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","supportingMedia":{"value":"These issues affect the management interface of PAN-OS and are strongly mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 9.0 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7 and all later versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7 and all later versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-04-08T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-1979","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-03-11T00:00:00","dateReserved":"2020-03-11T00:00:00","dateUpdated":"2020-05-12T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: A format string vulnerability in PAN-OS log daemon (logd) on Panorama allows local privilege escalation","datePublic":"2020-03-11T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-05-13T19:07:13","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A format string vulnerability in the PAN-OS log daemon (logd) on Panorama allows a network based attacker with knowledge of registered firewall devices and access to Panorama management interfaces to execute arbitrary code, bypassing the restricted shell and escalating privileges.\nThis issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13 on Panorama.\nThis issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A format string vulnerability in the PAN-OS log daemon (logd) on Panorama allows a network based attacker with knowledge of registered firewall devices and access to Panorama management interfaces to execute arbitrary code, bypassing the restricted shell and escalating privileges.\nThis issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13 on Panorama.\nThis issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0.0","status":"unaffected","lessThan":"9.0*","versionType":"custom"},{"version":"7.1.0","status":"unaffected","lessThan":"7.1*","versionType":"custom"},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-1979"}],"credits":[{"lang":"en","value":"This issue was discovered by Nicholas Newsom of Palo Alto Networks during an internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-134 Use of Externally-Controlled Format String","cweId":"CWE-134"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-97584"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"This issue affects the management interface of Panorama and is mitigated by following best practices for securing the Panorama management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 8.1 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.","supportingMedia":{"value":"This issue affects the management interface of Panorama and is mitigated by following best practices for securing the Panorama management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 8.1 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.13 and all later PAN-OS 8.1 versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.13 and all later PAN-OS 8.1 versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-03-11T16:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2020-05-12T16:00:00.000Z","lang":"eng","value":"Updated attack vector, description and acknowledgement."}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-1981","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-03-11T00:00:00","dateReserved":"2020-03-11T00:00:00","dateUpdated":"2020-03-11T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Predictable temporary filename vulnerability allows local privilege escalation","datePublic":"2020-03-11T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-03-11T18:58:14","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A predictable temporary filename vulnerability in PAN-OS allows local privilege escalation.\nThis issue allows a local attacker who bypassed the restricted shell to execute commands as a low privileged user and gain root access on the PAN-OS hardware or virtual appliance.\nThis issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13.\nThis issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A predictable temporary filename vulnerability in PAN-OS allows local privilege escalation.\nThis issue allows a local attacker who bypassed the restricted shell to execute commands as a low privileged user and gain root access on the PAN-OS hardware or virtual appliance.\nThis issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13.\nThis issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"7.1.0","status":"unaffected","lessThan":"7.1*","versionType":"custom"},{"version":"9.0.0","status":"unaffected","lessThan":"9.0*","versionType":"custom"},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-1981"}],"credits":[{"lang":"en","value":"This issue was found during an internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-377 Insecure Temporary File","cweId":"CWE-377"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-103038"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 8.1 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 8.1 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.13 and all later PAN-OS 8.1 versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.13 and all later PAN-OS 8.1 versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-03-11T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-1980","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2020-03-11T00:00:00","dateReserved":"2020-03-11T00:00:00","dateUpdated":"2020-03-11T00:00:00.000000Z"},"containers":{"cna":{"title":"PAN-OS: Shell injection vulnerability in PAN-OS CLI allows execution of shell commands","datePublic":"2020-03-11T16:00:00.000Z","providerMetadata":{"dateUpdated":"2020-03-11T18:58:17","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A shell command injection vulnerability in the PAN-OS CLI allows a local authenticated user to escape the restricted shell and escalate privileges.\nThis issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13.\nThis issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A shell command injection vulnerability in the PAN-OS CLI allows a local authenticated user to escape the restricted shell and escalate privileges.\nThis issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13.\nThis issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.12","PAN-OS 8.1.11","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThan":"8.1.13","versionType":"custom","changes":[{"at":"8.1.13","status":"unaffected"}]},{"version":"9.0.0","status":"unaffected","lessThan":"9.0*","versionType":"custom"},{"version":"9.1.0","status":"unaffected","lessThan":"9.1*","versionType":"custom"},{"version":"7.1.0","status":"unaffected","lessThan":"7.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2020-1980"}],"credits":[{"lang":"en","value":"This issue was discovered during an internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')","cweId":"CWE-77"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-102674"],"discovery":"INTERNAL"},"configurations":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS and is mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 8.1 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS and is mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 8.1 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in PAN-OS 8.1.13, and all later versions.","supportingMedia":{"value":"This issue is fixed in PAN-OS 8.1.13, and all later versions.","type":"text/html","base64":false}}],"timeline":[{"time":"2020-03-11T16:00:00.000Z","lang":"eng","value":"Initial publication"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-17440","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-12-19T19:35:00.000Z","dateReserved":"2019-12-19T19:35:00.000Z"},"containers":{"cna":{"title":"PAN-OS on PA-7000 Series: Improper restriction of communication to Log Forwarding Card (LFC) allows root access","datePublic":"2019-12-19T19:35:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:48","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"Improper restriction of communications to Log Forwarding Card (LFC) on PA-7000 Series devices with second-generation Switch Management Card (SMC) may allow an attacker with network access to the LFC to gain root access to PAN-OS.\nThis issue affects PAN-OS 9.0 versions prior to 9.0.5-h3 on PA-7080 and PA-7050 devices with an LFC installed and configured.\nThis issue does not affect PA-7000 Series deployments using the first-generation SMC and the Log Processing Card (LPC).\nThis issue does not affect any other PA series devices.\nThis issue does not affect devices without an LFC.\nThis issue does not affect PAN-OS 8.1 or prior releases.\nThis issue only affected a very limited number of customers and we undertook individual outreach to help them upgrade. At the time of publication, all identified customers have upgraded SW or content and are not impacted.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Improper restriction of communications to Log Forwarding Card (LFC) on PA-7000 Series devices with second-generation Switch Management Card (SMC) may allow an attacker with network access to the LFC to gain root access to PAN-OS.\nThis issue affects PAN-OS 9.0 versions prior to 9.0.5-h3 on PA-7080 and PA-7050 devices with an LFC installed and configured.\nThis issue does not affect PA-7000 Series deployments using the first-generation SMC and the Log Processing Card (LPC).\nThis issue does not affect any other PA series devices.\nThis issue does not affect devices without an LFC.\nThis issue does not affect PAN-OS 8.1 or prior releases.\nThis issue only affected a very limited number of customers and we undertook individual outreach to help them upgrade. At the time of publication, all identified customers have upgraded SW or content and are not impacted.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.5","PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0","status":"affected","lessThan":"9.0.5-h3","versionType":"custom","changes":[{"at":"9.0.6, 9.0.5-h3","status":"unaffected"}]}],"platforms":["PA-7000 Series with 2nd Generation SMC"]},{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.0","status":"unaffected"},{"version":"8.1","status":"unaffected"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-17440"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Ayad (Ed) Sleiman, Head of Information Security at King Abdullah University of Science and Technology (KAUST) and his team for discovering and responsibly reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-923 Improper Restriction of Communication Channel to Intended Endpoints","cweId":"CWE-923"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-134242"],"advisory":"PAN-SA-2019-0040","discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"(1) Content update 8218-5815 can be applied without requiring a software update. Once the content update is installed please ensure that next PAN-OS upgrade is to a fixed version (9.0.5-h3 or later). Do not upgrade or downgrade to an affected release, as it can reintroduce the vulnerability.\n(2) Configure security policies to prevent network sessions destined to LFC.\n(3) Ensure that LFC is only connected to a secured administrative network with access restricted to trusted users.\n(4) Disable or disconnect LFC from the network until fixes can be applied.","supportingMedia":{"value":"(1) Content update 8218-5815 can be applied without requiring a software update. Once the content update is installed please ensure that next PAN-OS upgrade is to a fixed version (9.0.5-h3 or later). Do not upgrade or downgrade to an affected release, as it can reintroduce the vulnerability.\n(2) Configure security policies to prevent network sessions destined to LFC.\n(3) Ensure that LFC is only connected to a secured administrative network with access restricted to trusted users.\n(4) Disable or disconnect LFC from the network until fixes can be applied.","type":"text/html","base64":false}}],"exploits":[{"lang":"en","value":"Palo Alto Networks is not aware of any exploitation of this issue.\n","supportingMedia":{"value":"Palo Alto Networks is not aware of any exploitation of this issue.\n","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue is fixed in 9.0.5-h3 and all subsequent releases. Content update 8218-5815 also fixes the issue.","supportingMedia":{"value":"This issue is fixed in 9.0.5-h3 and all subsequent releases. Content update 8218-5815 also fixes the issue.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-17437","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-12-04T17:00:00.000Z","dateReserved":"2019-12-04T17:00:00.000Z"},"containers":{"cna":{"title":"PAN-OS: Custom-role users may escalate privileges","datePublic":"2019-12-04T17:00:00.000Z","providerMetadata":{"dateUpdated":"2019-12-05T14:11:11","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An improper authentication check in Palo Alto Networks PAN-OS may allow an authenticated low privileged non-superuser custom role user to elevate privileges and become superuser.\nThis issue affects PAN-OS 7.1 versions prior to 7.1.25; 8.0 versions prior to 8.0.20; 8.1 versions prior to 8.1.11; 9.0 versions prior to 9.0.5.\nPAN-OS version 7.0 and prior EOL versions have not been evaluated for this issue.\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An improper authentication check in Palo Alto Networks PAN-OS may allow an authenticated low privileged non-superuser custom role user to elevate privileges and become superuser.\nThis issue affects PAN-OS 7.1 versions prior to 7.1.25; 8.0 versions prior to 8.0.20; 8.1 versions prior to 8.1.11; 9.0 versions prior to 9.0.5.\nPAN-OS version 7.0 and prior EOL versions have not been evaluated for this issue.\n</pre>"}]}],"x_affectedList":["PAN-OS 9.0.4","PAN-OS 9.0.3-h3","PAN-OS 9.0.3-h2","PAN-OS 9.0.3-h1","PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.10","PAN-OS 8.1.9-h4","PAN-OS 8.1.9-h3","PAN-OS 8.1.9-h2","PAN-OS 8.1.9-h1","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.19-h1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.24-h1","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1","status":"affected","lessThan":"7.1.25","versionType":"custom","changes":[{"at":"7.1.25","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThan":"8.0.20","versionType":"custom","changes":[{"at":"8.0.20","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThan":"8.1.11","versionType":"custom","changes":[{"at":"8.1.11","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThan":"9.0.5","versionType":"custom","changes":[{"at":"9.0.5","status":"unaffected"}]},{"version":"unspecified","status":"unknown","lessThanOrEqual":"7.0","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-17437"}],"credits":[{"lang":"en","value":"Christophe Schleypen of NCIA / NCIRC"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-280 Improper Handling of Insufficient Permissions or Privileges ","cweId":"CWE-280"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-115697"],"advisory":"PAN-SA-2019-0038","discovery":"EXTERNAL"},"configurations":[{"lang":"en","value":"This issue only affects devices configured with a low privileged custom role user with any combination of roles or privileges.","supportingMedia":{"value":"This issue only affects devices configured with a low privileged custom role user with any combination of roles or privileges.","type":"text/html","base64":false}}],"workarounds":[{"lang":"en","value":"Remove any untrusted custom-role users from the device or disable their access until fixes can be applied. Restrict access to the device to only trusted users.","supportingMedia":{"value":"Remove any untrusted custom-role users from the device or disable their access until fixes can be applied. Restrict access to the device to only trusted users.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"This issue has been resolved in 7.1.25, 8.0.20, 8.1.11, 9.0.5 and all subsequent versions.","supportingMedia":{"value":"This issue has been resolved in 7.1.25, 8.0.20, 8.1.11, 9.0.5 and all subsequent versions.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-1582","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-08-21T22:13:00.000Z","dateReserved":"2019-08-21T22:13:00.000Z"},"containers":{"cna":{"title":"Memory Corruption in PAN-OS","datePublic":"2019-08-21T22:13:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:48","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"Palo Alto Networks is aware of a memory corruption vulnerability in PAN-OS. (Ref: # PAN-123700/ CVE-2019-1582).\nSuccessful exploitation of this issue may allow an administrative user to cause arbitrary memory corruption by rekeying the current client interactive session.\nThis issue affects PAN-OS 8.1.9 and earlier, and PAN-OS 9.0.3 and earlier.  PAN-OS 7.1 and 8.0 are NOT affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks is aware of a memory corruption vulnerability in PAN-OS. (Ref: # PAN-123700/ CVE-2019-1582).\nSuccessful exploitation of this issue may allow an administrative user to cause arbitrary memory corruption by rekeying the current client interactive session.\nThis issue affects PAN-OS 8.1.9 and earlier, and PAN-OS 9.0.3 and earlier.  PAN-OS 7.1 and 8.0 are NOT affected.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.9","versionType":"custom","changes":[{"at":"8.1.9-h4","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThanOrEqual":"9.0.3","versionType":"custom","changes":[{"at":"9.0.3-h3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-1582"}],"credits":[{"lang":"en","value":"This issue was discovered by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-123700"],"advisory":"PAN-SA-2019-0023","discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"These issues affect the management interface of PAN-OS and are strongly mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 9.0 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","supportingMedia":{"value":"These issues affect the management interface of PAN-OS and are strongly mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 9.0 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 8.1.9-h4 and later, and PAN-OS 9.0.3-h3 and later.  ","supportingMedia":{"value":"PAN-OS 8.1.9-h4 and later, and PAN-OS 9.0.3-h3 and later.  ","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-1580","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-08-21T22:13:00.000Z","dateReserved":"2019-08-21T22:13:00.000Z"},"containers":{"cna":{"title":"Memory Corruption in PAN-OS","datePublic":"2019-08-21T22:13:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:48","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"Palo Alto Networks is aware of a memory corruption vulnerability in PAN-OS (Ref: # PAN-123603/CVE-2019-1580).\nSuccessful exploitation will allow a remote, unauthenticated user to craft a message to Secure Shell Daemon (SSHD) and corrupt arbitrary memory.\nThis issue affects PAN-OS 7.1.24 and earlier, PAN-OS 8.0.19 and earlier, PAN-OS 8.1.9 and earlier, and PAN-OS 9.0.3 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks is aware of a memory corruption vulnerability in PAN-OS (Ref: # PAN-123603/CVE-2019-1580).\nSuccessful exploitation will allow a remote, unauthenticated user to craft a message to Secure Shell Daemon (SSHD) and corrupt arbitrary memory.\nThis issue affects PAN-OS 7.1.24 and earlier, PAN-OS 8.0.19 and earlier, PAN-OS 8.1.9 and earlier, and PAN-OS 9.0.3 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.24","versionType":"custom","changes":[{"at":"7.1.24-h1","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.19","versionType":"custom","changes":[{"at":"8.0.19-h1","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.9","versionType":"custom","changes":[{"at":"8.1.9-h4","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThanOrEqual":"9.0.3","versionType":"custom","changes":[{"at":"9.0.3-h3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-1580"}],"credits":[{"lang":"en","value":"This issue was discovered by Nicholas Newsom of Palo Alto Networks during internal security review."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-123603"],"advisory":"PAN-SA-2019-0021","discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"These issues affect the management interface of PAN-OS and are strongly mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 9.0 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","supportingMedia":{"value":"These issues affect the management interface of PAN-OS and are strongly mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 9.0 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.1.24-h1 and later, PAN-OS 8.0.19-h1 and later, PAN-OS 8.1.9-h4 and later, and PAN-OS 9.0.3-h3 and later.","supportingMedia":{"value":"PAN-OS 7.1.24-h1 and later, PAN-OS 8.0.19-h1 and later, PAN-OS 8.1.9-h4 and later, and PAN-OS 9.0.3-h3 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-1581","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-08-21T22:13:00.000Z","dateReserved":"2019-08-21T22:13:00.000Z"},"containers":{"cna":{"title":"Remote code execution in PAN-OS SSH management interface","datePublic":"2019-08-21T22:13:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:48","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"Palo Alto Networks is aware of a remote code execution vulnerability in the PAN-OS SSH device management interface that can lead to unauthenticated remote users with network access to the SSH management interface gaining root access to PAN-OS.  (Ref: # PAN-123564/ CVE-2019-1581).\nSuccessful exploitation will allow a remote, unauthenticated user to execute arbitrary code by crafting and sending a malicious message to the SSH device management interface.  \nThis issue affects PAN-OS 7.1.24 and earlier, PAN-OS 8.0.19 and earlier, PAN-OS 8.1.9 and earlier, and PAN-OS 9.0.3 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks is aware of a remote code execution vulnerability in the PAN-OS SSH device management interface that can lead to unauthenticated remote users with network access to the SSH management interface gaining root access to PAN-OS.  (Ref: # PAN-123564/ CVE-2019-1581).\nSuccessful exploitation will allow a remote, unauthenticated user to execute arbitrary code by crafting and sending a malicious message to the SSH device management interface.  \nThis issue affects PAN-OS 7.1.24 and earlier, PAN-OS 8.0.19 and earlier, PAN-OS 8.1.9 and earlier, and PAN-OS 9.0.3 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.3","PAN-OS 9.0.2-h4","PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.9","PAN-OS 8.1.8-h5","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.19","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.24","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.24","versionType":"custom","changes":[{"at":"7.1.24-h1","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.19","versionType":"custom","changes":[{"at":"8.0.19-h1","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.9","versionType":"custom","changes":[{"at":"8.1.9-h4","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThanOrEqual":"9.0.3","versionType":"custom","changes":[{"at":"9.0.3-h3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-1581"}],"credits":[{"lang":"en","value":"The UK's National Cyber Security Centre (NCSC)"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-123564"],"advisory":"PAN-SA-2019-0022","discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the SSH management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interfaces. Our best practices guidelines reduce the exposure of device management interfaces to potential attacke...","supportingMedia":{"value":"This issue affects the SSH management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interfaces. Our best practices guidelines reduce the exposure of device management interfaces to potential attacke...","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.1.24-h1 and later, PAN-OS 8.0.19-h1 and later, PAN-OS 8.1.9-h4 and later, and PAN-OS 9.0.3-h3 and later.","supportingMedia":{"value":"PAN-OS 7.1.24-h1 and later, PAN-OS 8.0.19-h1 and later, PAN-OS 8.1.9-h4 and later, and PAN-OS 9.0.3-h3 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-1579","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-07-18T20:39:00.000Z","dateReserved":"2019-07-18T20:39:00.000Z"},"containers":{"cna":{"title":"Remote Code Execution in GlobalProtect Portal/Gateway Interface ","datePublic":"2019-07-18T20:39:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:48","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"Palo Alto Networks is aware of the reported remote code execution (RCE) vulnerability in its GlobalProtect portal and GlobalProtect Gateway interface products.  The issue is already addressed in prior maintenance releases.  (Ref: CVE-2019-1579)\nSuccessful exploitation of this issue allows an unauthenticated attacker to execute arbitrary code.  \nThis issue affects PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and  PAN-OS 8.1.2  and earlier releases.  PAN-OS 9.0 is not affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks is aware of the reported remote code execution (RCE) vulnerability in its GlobalProtect portal and GlobalProtect Gateway interface products.  The issue is already addressed in prior maintenance releases.  (Ref: CVE-2019-1579)\nSuccessful exploitation of this issue allows an unauthenticated attacker to execute arbitrary code.  \nThis issue affects PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and  PAN-OS 8.1.2  and earlier releases.  PAN-OS 9.0 is not affected.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.18","versionType":"custom","changes":[{"at":"7.1.19","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.11-h1","versionType":"custom","changes":[{"at":"8.0.12","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.2","versionType":"custom","changes":[{"at":"8.1.3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-1579"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-100913"],"advisory":"PAN-SA-2019-0020","discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"If you have not already upgraded to the available updates listed above and cannot do so now, we recommend that you update to content release 8173, or the latest version, and confirm threat prevention is enabled and enforced on traffic that passes through the GlobalProtect portal and GlobalProtect Gateway interface.  \n\nPlease see the customer advisory for more details here: https://live.paloaltonetworks.com/t5/Customer-Advisories/Action-Recommended-Recent-Security-Advisory-PAN-SA-2019-0020-Ref/ta-p/278505 .  \n\nYou are not affected if you do not have GlobalProtect enabled.\n","supportingMedia":{"value":"If you have not already upgraded to the available updates listed above and cannot do so now, we recommend that you update to content release 8173, or the latest version, and confirm threat prevention is enabled and enforced on traffic that passes through the GlobalProtect portal and GlobalProtect Gateway interface.  \n\nPlease see the customer advisory for more details here: https://live.paloaltonetworks.com/t5/Customer-Advisories/Action-Recommended-Recent-Security-Advisory-PAN-SA-2019-0020-Ref/ta-p/278505 .  \n\nYou are not affected if you do not have GlobalProtect enabled.\n","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.1.19 and later, PAN-OS 8.0.12 and later, and PAN-OS 8.1.3 and later releases.","supportingMedia":{"value":"PAN-OS 7.1.19 and later, PAN-OS 8.0.12 and later, and PAN-OS 8.1.3 and later releases.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-1576","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-07-15T22:15:00.000Z","dateReserved":"2019-07-15T22:15:00.000Z"},"containers":{"cna":{"title":"Command Injection in PAN-OS ","datePublic":"2019-07-15T22:15:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:48","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"A command injection vulnerability exists in the Palo Alto Networks PAN-OS Command Line Interface (CLI). (Ref PAN-111872/ CVE-2019-1576)\nSuccessful exploitation of this issue may allow an authenticated attacker to gain access to a remote shell in PAN-OS, and potentially run with the escalated  user’s permissions.\nThis issue affects PAN-OS 9.0.2 and earlier.  PAN-OS 7.1, PAN-OS 8.0 and PAN-OS 8.1 are NOT affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A command injection vulnerability exists in the Palo Alto Networks PAN-OS Command Line Interface (CLI). (Ref PAN-111872/ CVE-2019-1576)\nSuccessful exploitation of this issue may allow an authenticated attacker to gain access to a remote shell in PAN-OS, and potentially run with the escalated  user’s permissions.\nThis issue affects PAN-OS 9.0.2 and earlier.  PAN-OS 7.1, PAN-OS 8.0 and PAN-OS 8.1 are NOT affected.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0","status":"affected","lessThanOrEqual":"9.0.2","versionType":"custom","changes":[{"at":"9.0.3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-1576"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Joe Graham at Rochester Institute of Technology for reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')","cweId":"CWE-77"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-111872"],"advisory":"PAN-SA-2019-0018","discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 9.0.3 and later","supportingMedia":{"value":"PAN-OS 9.0.3 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-1575","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-07-15T22:15:00.000Z","dateReserved":"2019-07-15T22:15:00.000Z"},"containers":{"cna":{"title":"Information Disclosure in PAN-OS Management API Usage","datePublic":"2019-07-15T22:15:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:48","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An Information Disclosure vulnerability exists in PAN-OS Management API usage (Ref # PAN-107239 and PAN-118869 / CVE-2019-1575)\nSuccessful exploitation may allow for an authenticated user with read-only privileges to extract the API key of the device and the username/password from the XML API (in PAN-OS) and possibly escalate privileges granted to them.\nThis issue affects PAN-OS 7.1.23 and earlier, PAN-OS 8.0.18 and earlier, PAN-OS 8.1.8-h4 and earlier, and PAN-OS 9.0.2 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An Information Disclosure vulnerability exists in PAN-OS Management API usage (Ref # PAN-107239 and PAN-118869 / CVE-2019-1575)\nSuccessful exploitation may allow for an authenticated user with read-only privileges to extract the API key of the device and the username/password from the XML API (in PAN-OS) and possibly escalate privileges granted to them.\nThis issue affects PAN-OS 7.1.23 and earlier, PAN-OS 8.0.18 and earlier, PAN-OS 8.1.8-h4 and earlier, and PAN-OS 9.0.2 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.23","versionType":"custom","changes":[{"at":"7.1.24","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.18","versionType":"custom","changes":[{"at":"8.0.19","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.8-h4","versionType":"custom","changes":[{"at":"8.1.8","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThanOrEqual":"9.0.2","versionType":"custom","changes":[{"at":"9.0.2","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-1575"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Bartłomiej Stasiek of ING Tech Poland, Ruben Jacobi of ON2IT Group, Michael E. Davis - University of Arkansas, and Alycia N. Carey - University of Arkansas for reporting this issue."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-200 Information Exposure","cweId":"CWE-200"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-107239","PAN-118869"],"advisory":"PAN-SA-2019-0019","discovery":"USER"},"workarounds":[{"lang":"en","value":"Please see the detailed FAQ here: https://live.paloaltonetworks.com/t5/Customer-Advisories/Palo-Alto-Networks-Security-Advisory-PAN-SA-2019-0019/ta-p/276661.","supportingMedia":{"value":"Please see the detailed FAQ here: https://live.paloaltonetworks.com/t5/Customer-Advisories/Palo-Alto-Networks-Security-Advisory-PAN-SA-2019-0019/ta-p/276661.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.1.24 and later, PAN-OS 8.0.19 and later, PAN-OS 8.1.8-h5 and later, and PAN-OS 9.0.2-h4 and later.  ","supportingMedia":{"value":"PAN-OS 7.1.24 and later, PAN-OS 8.0.19 and later, PAN-OS 8.1.8-h5 and later, and PAN-OS 9.0.2-h4 and later.  ","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-8912","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-07-15T22:15:00.000Z","dateReserved":"2019-07-15T22:15:00.000Z"},"containers":{"cna":{"title":"Privilege Escalation in PAN-OS","datePublic":"2019-07-15T22:15:00.000Z","providerMetadata":{"dateUpdated":"2020-01-21T19:06:20","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"Palo Alto Networks is aware of a use-after-free (UAF) vulnerability in the Linux kernel's sockfs_setattr. (Ref: PAN-113631/ CVE-2019-8912)\nSuccessful exploitation of this issue may allow an unprivileged local user to escalate their privileges on the system.\nThis issue affects PAN-OS 7.1.23 and earlier, PAN-OS 8.0.17 and earlier, PAN-OS 8.1.8 and earlier, and PAN-OS 9.0.2 and earlier. ","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks is aware of a use-after-free (UAF) vulnerability in the Linux kernel's sockfs_setattr. (Ref: PAN-113631/ CVE-2019-8912)\nSuccessful exploitation of this issue may allow an unprivileged local user to escalate their privileges on the system.\nThis issue affects PAN-OS 7.1.23 and earlier, PAN-OS 8.0.17 and earlier, PAN-OS 8.1.8 and earlier, and PAN-OS 9.0.2 and earlier. </pre>"}]}],"x_affectedList":["PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.23","versionType":"custom","changes":[{"at":"7.1.24","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.17","versionType":"custom","changes":[{"at":"8.0.18","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.8","versionType":"custom","changes":[{"at":"8.1.9","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThanOrEqual":"9.0.2","versionType":"custom","changes":[{"at":"9.0.3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-8912"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-416 Use After Free","cweId":"CWE-416"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-113631"],"advisory":"PAN-SA-2019-0017","discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.1.24 and later, PAN-OS 8.0.18 and later, PAN-OS 8.1.9 and later, and PAN-OS 9.0.3 and later.","supportingMedia":{"value":"PAN-OS 7.1.24 and later, PAN-OS 8.0.18 and later, PAN-OS 8.1.9 and later, and PAN-OS 9.0.3 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2019-0013","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-06-27T23:50:00.000Z","dateReserved":"2019-06-27T23:50:00.000Z"},"containers":{"cna":{"title":"Information about TCP SACK Panic Findings in PAN-OS ","datePublic":"2019-06-27T23:50:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"Palo Alto Networks is aware of recent vulnerability disclosures known as TCP SACK Panic vulnerabilities.  (Ref: PAN-119745/ CVE-2019-11477, CVE-2019-11478, CVE-2019-11479)\nSuccessful exploitation of these issues could allow an unprivileged remote user to trigger a kernel panic in systems running the affected software, resulting in a denial of service.\n\nWhile these issues primary affect the PAN-OS Management Plane (MP),  it is possible for MP services to be exposed via Data Plane (DP) interfaces as a result of Service Route or and Interface Management Profile configurations. Examples include Management Profiles permitting HTTP/HTTPS access to the WebGUI, SSH, or response pages.  In these cases, it is possible that malicious traffic could arrive at the MP kernel through the DP interface.  Devices with unrestricted connectivity to the MP, such as internal hosts, may be able to leverage this issue to impact device performance. \n\nPalo Alto Networks is not affected by CVE-2019-5599.\nThis issue affects PAN-OS 7.1.23 and earlier, PAN-OS 8.0.18 and earlier, PAN-OS 8.1.8-h4 and earlier, and PAN-OS 9.0.2-h3 and earlier.  \n\nGlobalProtect Gateway and GlobalProtect portal are NOT affected by these issues.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks is aware of recent vulnerability disclosures known as TCP SACK Panic vulnerabilities.  (Ref: PAN-119745/ CVE-2019-11477, CVE-2019-11478, CVE-2019-11479)\nSuccessful exploitation of these issues could allow an unprivileged remote user to trigger a kernel panic in systems running the affected software, resulting in a denial of service.\n\nWhile these issues primary affect the PAN-OS Management Plane (MP),  it is possible for MP services to be exposed via Data Plane (DP) interfaces as a result of Service Route or and Interface Management Profile configurations. Examples include Management Profiles permitting HTTP/HTTPS access to the WebGUI, SSH, or response pages.  In these cases, it is possible that malicious traffic could arrive at the MP kernel through the DP interface.  Devices with unrestricted connectivity to the MP, such as internal hosts, may be able to leverage this issue to impact device performance. \n\nPalo Alto Networks is not affected by CVE-2019-5599.\nThis issue affects PAN-OS 7.1.23 and earlier, PAN-OS 8.0.18 and earlier, PAN-OS 8.1.8-h4 and earlier, and PAN-OS 9.0.2-h3 and earlier.  \n\nGlobalProtect Gateway and GlobalProtect portal are NOT affected by these issues.</pre>"}]}],"x_affectedList":["PAN-OS 9.0.2-h3","PAN-OS 9.0.2-h2","PAN-OS 9.0.2-h1","PAN-OS 9.0.2","PAN-OS 9.0.1","PAN-OS 9.0.0","PAN-OS 9.0","PAN-OS 8.1.8-h4","PAN-OS 8.1.8-h3","PAN-OS 8.1.8-h2","PAN-OS 8.1.8-h1","PAN-OS 8.1.8","PAN-OS 8.1.7","PAN-OS 8.1.6-h2","PAN-OS 8.1.6-h1","PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.18","PAN-OS 8.0.17","PAN-OS 8.0.16","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.23","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.23","versionType":"custom","changes":[{"at":"7.1.24","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.18","versionType":"custom","changes":[{"at":"8.0.19","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.8-h4","versionType":"custom","changes":[{"at":"8.1.8-h5","status":"unaffected"}]},{"version":"9.0","status":"affected","lessThanOrEqual":"9.0.2-h3","versionType":"custom","changes":[{"at":"9.0.2-h4","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2019-0013"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-190 Integer Overflow or Wraparound","cweId":"CWE-190"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-119745"],"advisory":"PAN-SA-2019-0013","discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"These issues affect the management interface of PAN-OS and are strongly mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 9.0 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","supportingMedia":{"value":"These issues affect the management interface of PAN-OS and are strongly mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 9.0 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.1.24 and later, PAN-OS 8.0.19 and later, PAN-OS 8.1.8-h5 and later, and PAN-OS 9.0.2-h4 and later","supportingMedia":{"value":"PAN-OS 7.1.24 and later, PAN-OS 8.0.19 and later, PAN-OS 8.1.8-h5 and later, and PAN-OS 9.0.2-h4 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2019-1572","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-03-28T20:05:00.000Z","dateReserved":"2019-03-28T20:05:00.000Z"},"containers":{"cna":{"title":"Authentication Bypass in PAN-OS Management Web Interface","datePublic":"2019-03-28T20:05:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:48","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"descriptions":[{"lang":"en","value":"An Authentication Bypass vulnerability exists in the PAN-OS Management Web Interface.  (Ref # PAN-113675, CVE-2019-1572)\nSuccessful exploitation of this issue may allow an unauthenticated remote user to access php files.\nThis issue affects Only PAN-OS 9.0.0","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An Authentication Bypass vulnerability exists in the PAN-OS Management Web Interface.  (Ref # PAN-113675, CVE-2019-1572)\nSuccessful exploitation of this issue may allow an unauthenticated remote user to access php files.\nThis issue affects Only PAN-OS 9.0.0</pre>"}]}],"x_affectedList":["PAN-OS 9.0.0","PAN-OS 9.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"9.0.0","status":"affected"},{"version":"9.0.1","status":"unaffected","lessThan":"9.0*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-1572"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-287 Improper Authentication","cweId":"CWE-287"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-113675"],"advisory":"PAN-SA-2019-0005","discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the web-based management interface of PAN-OS and is strongly mitigated by following best practices for securing the management interface of PAN-OS. Our best practices guidelines reduce the exposure of the management interface to potential attackers. We recommend that the management interface be isolated and strictly limited only to security administration personnel through either network segmentation or using the IP access control list restriction feature within PAN-OS.  Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","supportingMedia":{"value":"This issue affects the web-based management interface of PAN-OS and is strongly mitigated by following best practices for securing the management interface of PAN-OS. Our best practices guidelines reduce the exposure of the management interface to potential attackers. We recommend that the management interface be isolated and strictly limited only to security administration personnel through either network segmentation or using the IP access control list restriction feature within PAN-OS.  Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 9.0.1 and later","supportingMedia":{"value":"PAN-OS 9.0.1 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2018-14634","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2019-03-20T21:20:00.000Z","dateReserved":"2019-03-20T21:20:00.000Z"},"containers":{"cna":{"title":"Privilege Escalation in PAN-OS","datePublic":"2019-03-20T21:20:00.000Z","providerMetadata":{"dateUpdated":"2021-07-20T14:06:15","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"descriptions":[{"lang":"en","value":"Palo Alto Networks is aware of an integer overflow vulnerability in the Linux kernel's create_elf_tables() function.  (Ref # PAN-105966, CVE-2018-14634)\nSuccessful exploitation of this issue may allow an unprivileged local user to escalate their privileges on the system.  \n\nTo successfully exploit this vulnerability, an attacker would need local user account to access CLI, as well as, an unrelated vulnerability allowing the local user to execute arbitrary code in a chained attack. This combination would result in the execution of malicious code and achieving complete control of the affected system.\n\nThis issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw. \nThis issue affects This only affects 64bit systems with more than 32 GB of available memory.  \n\nThe affected platform and versions are  PAN-OS 7.1.22 and earlier running on M-500 and WF-500;   PAN-OS 8.0.15 and earlier running on PA-5220, PA-5250, PA-5260, M-500 and WF-500;  and PAN-OS 8.1.6 and earlier running on PA-5220, PA-5250, PA-5260, PA-5280, M-500, M-600 and WF-500.   PAN-OS 9.0 is NOT affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks is aware of an integer overflow vulnerability in the Linux kernel's create_elf_tables() function.  (Ref # PAN-105966, CVE-2018-14634)\nSuccessful exploitation of this issue may allow an unprivileged local user to escalate their privileges on the system.  \n\nTo successfully exploit this vulnerability, an attacker would need local user account to access CLI, as well as, an unrelated vulnerability allowing the local user to execute arbitrary code in a chained attack. This combination would result in the execution of malicious code and achieving complete control of the affected system.\n\nThis issue does not affect 32-bit systems as they do not have a large enough address space to exploit this flaw. \nThis issue affects This only affects 64bit systems with more than 32 GB of available memory.  \n\nThe affected platform and versions are  PAN-OS 7.1.22 and earlier running on M-500 and WF-500;   PAN-OS 8.0.15 and earlier running on PA-5220, PA-5250, PA-5260, M-500 and WF-500;  and PAN-OS 8.1.6 and earlier running on PA-5220, PA-5250, PA-5260, PA-5280, M-500, M-600 and WF-500.   PAN-OS 9.0 is NOT affected.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.6","PAN-OS 8.1.5","PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.15","PAN-OS 8.0.14","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.22","PAN-OS 7.1.21","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.22","versionType":"custom","changes":[{"at":"7.1.23","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.15","versionType":"custom","changes":[{"at":"8.0.16","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.6","versionType":"custom","changes":[{"at":"8.1.7","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2018-14634"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-190 Integer Overflow or Wraparound","cweId":"CWE-190"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-105966"],"advisory":"PAN-SA-2019-0006","discovery":"INTERNAL"},"solutions":[{"lang":"en","value":"PAN-OS 7.1.23 and later, PAN-OS 8.0.16 and later, and PAN-OS 8.1.7 and later. ","supportingMedia":{"value":"PAN-OS 7.1.23 and later, PAN-OS 8.0.16 and later, and PAN-OS 8.1.7 and later. ","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2018-0015","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2018-10-12T02:35:00.000Z","dateReserved":"2018-10-12T02:35:00.000Z"},"containers":{"cna":{"title":"OpenSSL Vulnerabilities in PAN-OS ","datePublic":"2018-10-12T02:35:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"The OpenSSL library has been found to contain vulnerabilities CVE-2018-0732, CVE-2018-0737, and CVE-2018-0739.  Palo Alto Networks software makes use of the vulnerable library and is affected. (Ref # PAN-98504/ CVE-2018-0732, CVE-2018-0737, and CVE-2018-0739)\nThe OpenSSL library in use by PAN-OS is patched on a regular basis for security issues.\nThis issue affects PAN-OS 6.1.20 and earlier, PAN-OS 7.1.20 and earlier, PAN-OS 8.0.13 and earlier, and PAN-OS 8.1.3 and earlier.  WF-500 running WF-500 software versions PAN-OS 6.1.20 and earlier, PAN-OS 7.1.20 and earlier, PAN-OS 8.0.13 and earlier, and PAN-OS 8.1.3 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The OpenSSL library has been found to contain vulnerabilities CVE-2018-0732, CVE-2018-0737, and CVE-2018-0739.  Palo Alto Networks software makes use of the vulnerable library and is affected. (Ref # PAN-98504/ CVE-2018-0732, CVE-2018-0737, and CVE-2018-0739)\nThe OpenSSL library in use by PAN-OS is patched on a regular basis for security issues.\nThis issue affects PAN-OS 6.1.20 and earlier, PAN-OS 7.1.20 and earlier, PAN-OS 8.0.13 and earlier, and PAN-OS 8.1.3 and earlier.  WF-500 running WF-500 software versions PAN-OS 6.1.20 and earlier, PAN-OS 7.1.20 and earlier, PAN-OS 8.0.13 and earlier, and PAN-OS 8.1.3 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.13","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.20","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 6.1.20","PAN-OS 6.1.19","PAN-OS 6.1.18","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.20","versionType":"custom"},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.20","versionType":"custom","changes":[{"at":"7.1.21","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.13","versionType":"custom","changes":[{"at":"8.0.14","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.3","versionType":"custom","changes":[{"at":"8.1.4","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2018-0015"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-320","cweId":"CWE-320"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-98504"],"advisory":"PAN-SA-2018-0015","discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.1.21 and later, PAN-OS 8.0.14 and later, PAN-OS 8.1.4 and later, WF-500 running WF-500 software version 8.0.14 and later, and WF-500 running WF-500 software version 8.1.4 and later.  PAN-OS 6.1 will NOT have a fix.    For WF-500 software versions 7.1 and earlier, please consult the WildFire Administrator’s Guide for steps to upgrade the software. An online copy of all available documentation can be found here (https://www.paloaltonetworks.com/documentation).","supportingMedia":{"value":"PAN-OS 7.1.21 and later, PAN-OS 8.0.14 and later, PAN-OS 8.1.4 and later, WF-500 running WF-500 software version 8.0.14 and later, and WF-500 running WF-500 software version 8.1.4 and later.  PAN-OS 6.1 will NOT have a fix.    For WF-500 software versions 7.1 and earlier, please consult the WildFire Administrator’s Guide for steps to upgrade the software. An online copy of all available documentation can be found here (https://www.paloaltonetworks.com/documentation).","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2018-5391","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2018-09-19T20:40:00.000Z","dateReserved":"2018-09-19T20:40:00.000Z"},"containers":{"cna":{"title":"Information about FragmentSmack findings","datePublic":"2018-09-19T20:40:00.000Z","providerMetadata":{"dateUpdated":"2020-04-14T12:06:39","orgId":"37e5125f-f79b-445b-8fad-9564f167944b","shortName":"certcc"},"descriptions":[{"lang":"en","value":"Palo Alto Networks is aware of recent vulnerability disclosure, known as FragmentSmack, that affects Linux kernel 3.9 and later. At this time, our findings show that some Palo Alto Networks devices running specific versions of PAN-OS are vulnerable to this disclosure. (CVE-2018-5391). This security advisory will be updated as more information becomes available or if there are changes in the impact of these vulnerabilities.\nA flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. To exploit this vulnerability a remote attacker could send specially crafted packets that trigger time and calculation expensive fragment reassembly algorithms and cause CPU saturation (a denial of service on the system).  This only affects the Management Plane of PAN-OS.\nThis issue affects PAN-OS 6.1.21 and earlier running on PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series, PA-7050.     PAN-OS 7.1.19 and earlier running on PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series, PA-7050 and PA-7080.     PAN-OS 8.0.12 and earlier running on PA-200, PA-220, PA-500, PA-800 Series, PA-3000 Series, PA-5000 Series, PA-5220, PA-5250, PA-5260, PA-7050 and PA-7080.     PAN-OS 8.1.4 and earlier running on PA-200, PA-220, PA-220R, PA-500, PA-800 Series, PA-3000 Series, PA-3200 Series, PA-5000 Series, PA-5220, PA-5250, PA-5260, PA-5280, PA-7050 and PA-7080.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks is aware of recent vulnerability disclosure, known as FragmentSmack, that affects Linux kernel 3.9 and later. At this time, our findings show that some Palo Alto Networks devices running specific versions of PAN-OS are vulnerable to this disclosure. (CVE-2018-5391). This security advisory will be updated as more information becomes available or if there are changes in the impact of these vulnerabilities.\nA flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. To exploit this vulnerability a remote attacker could send specially crafted packets that trigger time and calculation expensive fragment reassembly algorithms and cause CPU saturation (a denial of service on the system).  This only affects the Management Plane of PAN-OS.\nThis issue affects PAN-OS 6.1.21 and earlier running on PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series, PA-7050.     PAN-OS 7.1.19 and earlier running on PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series, PA-7050 and PA-7080.     PAN-OS 8.0.12 and earlier running on PA-200, PA-220, PA-500, PA-800 Series, PA-3000 Series, PA-5000 Series, PA-5220, PA-5250, PA-5260, PA-7050 and PA-7080.     PAN-OS 8.1.4 and earlier running on PA-200, PA-220, PA-220R, PA-500, PA-800 Series, PA-3000 Series, PA-3200 Series, PA-5000 Series, PA-5220, PA-5250, PA-5260, PA-5280, PA-7050 and PA-7080.</pre>"}]}],"x_affectedList":["PAN-OS 8.1.4","PAN-OS 8.1.3","PAN-OS 8.1.2","PAN-OS 8.1.1","PAN-OS 8.1.0","PAN-OS 8.1","PAN-OS 8.0.12","PAN-OS 8.0.11-h1","PAN-OS 8.0.10","PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.19","PAN-OS 7.1.18","PAN-OS 7.1.17","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 6.1.21","PAN-OS 6.1.20","PAN-OS 6.1.19","PAN-OS 6.1.18","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.21","versionType":"custom","changes":[{"at":"6.1.22","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.19","versionType":"custom","changes":[{"at":"7.1.20","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.12","versionType":"custom","changes":[{"at":"8.0.13","status":"unaffected"}]},{"version":"8.1","status":"affected","lessThanOrEqual":"8.1.4","versionType":"custom","changes":[{"at":"8.1.5","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2018-5391"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-103132"],"advisory":"PAN-SA-2018-0012","discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of PAN-OS. Our best practices guidelines strongly mitigate exposure to this vulnerability and reduce the exposure of the management interface to other potential threats. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/getting-started/best-practices-for-securing-administrative-access.","supportingMedia":{"value":"This issue affects the management interface of PAN-OS. Our best practices guidelines strongly mitigate exposure to this vulnerability and reduce the exposure of the management interface to other potential threats. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://www.paloaltonetworks.com/documentation/81/pan-os/pan-os/getting-started/best-practices-for-securing-administrative-access.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.1.22, PAN-OS 7.1.20 and later, PAN-OS 8.0.13 and later, and PAN-OS 8.1.5 and later. ","supportingMedia":{"value":"PAN-OS 6.1.22, PAN-OS 7.1.20 and later, PAN-OS 8.0.13 and later, and PAN-OS 8.1.5 and later. ","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2018-8715","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2018-07-20T00:30:00.000Z","dateReserved":"2018-07-20T00:30:00.000Z"},"containers":{"cna":{"title":"Denial of Service in PAN-OS Management Web Interface ","datePublic":"2018-07-20T00:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:47","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"Palo Alto Networks makes use of a 3rd-party component impacted by CVE-2018-8715. This issue has been confirmed to present a risk for denial of service to the PAN-OS Management Web Interface. (Ref # PAN-93089, CVE-2018-8715)\nA specially crafted HTTP POST request with an invalid “If-modified\" header field may cause a NULL dereference and cause a denial of service condition. This vulnerability can be triggered without login or authentication and could result in a crash of the management service.\nThis issue affects PAN-OS 6.1.20 and earlier, PAN-OS 7.1.16 and earlier, PAN-OS 8.0.9 and earlier, and PAN-OS 8.1.0.  Global Protect is NOT affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks makes use of a 3rd-party component impacted by CVE-2018-8715. This issue has been confirmed to present a risk for denial of service to the PAN-OS Management Web Interface. (Ref # PAN-93089, CVE-2018-8715)\nA specially crafted HTTP POST request with an invalid “If-modified\" header field may cause a NULL dereference and cause a denial of service condition. This vulnerability can be triggered without login or authentication and could result in a crash of the management service.\nThis issue affects PAN-OS 6.1.20 and earlier, PAN-OS 7.1.16 and earlier, PAN-OS 8.0.9 and earlier, and PAN-OS 8.1.0.  Global Protect is NOT affected.</pre>"}]}],"x_affectedList":["PAN-OS 8.0.9","PAN-OS 8.0.8","PAN-OS 8.0.7","PAN-OS 8.0.6-h3","PAN-OS 8.0.6-h2","PAN-OS 8.0.6-h1","PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.16","PAN-OS 7.1.15","PAN-OS 7.1.14","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 6.1.20","PAN-OS 6.1.19","PAN-OS 6.1.18","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.20","versionType":"custom","changes":[{"at":"6.1.21","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.16","versionType":"custom","changes":[{"at":"7.1.17","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.9","versionType":"custom","changes":[{"at":"8.0.10","status":"unaffected"}]},{"version":"8.1.1","status":"unaffected","lessThan":"8.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2018-8715"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-287 Improper Authentication","cweId":"CWE-287"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-93089"],"advisory":"PAN-SA-2018-0008","discovery":"EXTERNAL"},"workarounds":[{"lang":"en","value":"This issue affects the web-based management interface of PAN-OS and is strongly mitigated by following best practices for securing the management interface of PAN-OS.  Our best practices guidelines reduce the exposure of the management interface to potential attackers.  Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/getting-started/best-practices-for-securing-administrative-access.","supportingMedia":{"value":"This issue affects the web-based management interface of PAN-OS and is strongly mitigated by following best practices for securing the management interface of PAN-OS.  Our best practices guidelines reduce the exposure of the management interface to potential attackers.  Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/getting-started/best-practices-for-securing-administrative-access.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.1.21 and later, PAN-OS 7.1.17 and later, PAN-OS 8.0.10 and later, and PAN-OS 8.1.1 and later.   ","supportingMedia":{"value":"PAN-OS 6.1.21 and later, PAN-OS 7.1.17 and later, PAN-OS 8.0.10 and later, and PAN-OS 8.1.1 and later.   ","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2017-15940","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-12-06T00:15:10.000Z","dateReserved":"2017-12-06T00:15:10.000Z"},"containers":{"cna":{"title":"Command Injection in PAN-OS ","datePublic":"2017-12-06T00:15:10.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:45","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists in the PAN-OS web interface packet capture management that could allow an authenticated user to inject arbitrary commands. (Ref # PAN-81892 / CVE-2017-15940)\nPAN-OS contains a vulnerability that may allow for post authentication command injection\nThis issue affects PAN-OS 6.1.18 and earlier, PAN-OS 7.0.18 and earlier, PAN-OS 7.1.13 and earlier, PAN-OS 8.0.6 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists in the PAN-OS web interface packet capture management that could allow an authenticated user to inject arbitrary commands. (Ref # PAN-81892 / CVE-2017-15940)\nPAN-OS contains a vulnerability that may allow for post authentication command injection\nThis issue affects PAN-OS 6.1.18 and earlier, PAN-OS 7.0.18 and earlier, PAN-OS 7.1.13 and earlier, PAN-OS 8.0.6 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 8.0.6","PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.18","PAN-OS 7.0.17","PAN-OS 7.0.16","PAN-OS 7.0.15","PAN-OS 7.0.14","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.18","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.18","versionType":"custom","changes":[{"at":"6.1.19","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.18","versionType":"custom","changes":[{"at":"7.0.19","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.13","versionType":"custom","changes":[{"at":"7.1.14","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.6","versionType":"custom","changes":[{"at":"8.0.6","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2017-15940"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Won Lae Lee and Hwang, Gyu Won from Samsung for reporting this issue"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')","cweId":"CWE-77"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-81892"],"advisory":"PAN-SA-2017-0028","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Palo Alto Networks has released content update 765 including vulnerability signatures #30998 that can be used as an interim mitigation to protect PAN-OS devices until the device software is upgraded. Note that signatures 30998 must be applied to a firewall rule securing traffic destined for the Management interface. This issue affects the management interface of the device and is strongly mitigated by following best practices for the isolation of management interfaces for security appliances. We recommend that the management interface be isolated and strictly limited only to security administration personnel through either network segmentation or using the IP access control list restriction feature within PAN-OS. An alternative mitigation includes the use of a Panorama central manager and disabling of http and https management on each of the vulnerable appliance, then use the Panorama context switching feature to remotely access the web interface of the device.","supportingMedia":{"value":"Palo Alto Networks has released content update 765 including vulnerability signatures #30998 that can be used as an interim mitigation to protect PAN-OS devices until the device software is upgraded. Note that signatures 30998 must be applied to a firewall rule securing traffic destined for the Management interface. This issue affects the management interface of the device and is strongly mitigated by following best practices for the isolation of management interfaces for security appliances. We recommend that the management interface be isolated and strictly limited only to security administration personnel through either network segmentation or using the IP access control list restriction feature within PAN-OS. An alternative mitigation includes the use of a Panorama central manager and disabling of http and https management on each of the vulnerable appliance, then use the Panorama context switching feature to remotely access the web interface of the device.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.1.19 and later, PAN-OS 7.0.19 and later, PAN-OS 7.1.14 and later, PAN-OS 8.0.6-h3 and later","supportingMedia":{"value":"PAN-OS 6.1.19 and later, PAN-OS 7.0.19 and later, PAN-OS 7.1.14 and later, PAN-OS 8.0.6-h3 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2017-15944","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-12-06T00:05:10.000Z","dateReserved":"2017-12-06T00:05:10.000Z"},"containers":{"cna":{"title":"Vulnerability in PAN-OS and Panorama on Management Interface","datePublic":"2017-12-06T00:05:10.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:45","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"Through the exploitation of a combination of unrelated vulnerabilities, and via the management interface of the device, an attacker could remotely execute code on PAN-OS or Panorama in the context of the highest privileged user. (Ref # PAN-61094 / PAN-80990 / PAN-80993 / PAN-80994 / CVE-2017-15944)\nPAN-OS and Panorama contains multiple vulnerabilities that, when exploited in conjunction could lead to remote code execution prior to authentication.\nThis issue affects PAN-OS 6.1.18 and earlier, PAN-OS 7.0.18 and earlier, and PAN-OS 7.1.13 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Through the exploitation of a combination of unrelated vulnerabilities, and via the management interface of the device, an attacker could remotely execute code on PAN-OS or Panorama in the context of the highest privileged user. (Ref # PAN-61094 / PAN-80990 / PAN-80993 / PAN-80994 / CVE-2017-15944)\nPAN-OS and Panorama contains multiple vulnerabilities that, when exploited in conjunction could lead to remote code execution prior to authentication.\nThis issue affects PAN-OS 6.1.18 and earlier, PAN-OS 7.0.18 and earlier, and PAN-OS 7.1.13 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 7.1.13","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.18","PAN-OS 7.0.17","PAN-OS 7.0.16","PAN-OS 7.0.15","PAN-OS 7.0.14","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.18","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.18","versionType":"custom","changes":[{"at":"6.1.19","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.18","versionType":"custom","changes":[{"at":"7.0.19","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.13","versionType":"custom","changes":[{"at":"7.1.14","status":"unaffected"}]},{"version":"8.0.6","status":"unaffected","lessThan":"8.0*","versionType":"custom","changes":[{"at":"8.0","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2017-15944"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Philip Pettersson for reporting this issue"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"NVD-CWE-noinfo"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-61094","PAN-80990","PAN-80993","PAN-80994"],"advisory":"PAN-SA-2017-0027","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Palo Alto Networks has released content update 756 including vulnerability signatures #40483 and #40484 that can be used as an interim mitigation to protect PAN-OS devices until the device software is upgraded. Note that signatures 40483 and 40484 must be applied to a firewall rule securing traffic destined for the Management interface. This issue affects the management interface of the device and is strongly mitigated by following best practices for the isolation of management interfaces for security appliances. We recommend that the management interface be isolated and strictly limited only to security administration personnel through either network segmentation or using the IP access control list restriction feature within PAN-OS.  An alternative mitigation includes the use of a Panorama central manager and disabling of http and https management on each of the vulnerable appliance, then use the Panorama context switching feature to remotely access the web interface of the device.","supportingMedia":{"value":"Palo Alto Networks has released content update 756 including vulnerability signatures #40483 and #40484 that can be used as an interim mitigation to protect PAN-OS devices until the device software is upgraded. Note that signatures 40483 and 40484 must be applied to a firewall rule securing traffic destined for the Management interface. This issue affects the management interface of the device and is strongly mitigated by following best practices for the isolation of management interfaces for security appliances. We recommend that the management interface be isolated and strictly limited only to security administration personnel through either network segmentation or using the IP access control list restriction feature within PAN-OS.  An alternative mitigation includes the use of a Panorama central manager and disabling of http and https management on each of the vulnerable appliance, then use the Panorama context switching feature to remotely access the web interface of the device.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.1.19 and later, PAN-OS 7.0.19 and later, PAN-OS 7.1.14 and later.  An update in PAN-OS 8.0.6 also includes patches related to this vulnerability, however PAN-OS 8.0 is not remotely exploitable by an unauthenticated user using this vulnerability.","supportingMedia":{"value":"PAN-OS 6.1.19 and later, PAN-OS 7.0.19 and later, PAN-OS 7.1.14 and later.  An update in PAN-OS 8.0.6 also includes patches related to this vulnerability, however PAN-OS 8.0 is not remotely exploitable by an unauthenticated user using this vulnerability.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2017-15942","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-12-06T00:00:00","dateReserved":"2017-12-06T00:00:00","dateUpdated":"2020-05-18T00:00:00.000000Z"},"containers":{"cna":{"title":"Denial of Service Against GlobalProtect","datePublic":"2017-12-06T00:00:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:45","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists in PAN-OS that could lead to denying access to GlobalProtect portal, GlobalProtect gateway or preventing configuration commits. (Ref # PAN-78127 / CVE-2017-15942)\nPAN-OS contains a vulnerability in GlobalProtect that may allow a non-authenticated third party to mount a Denial of Service attack against the GlobalProtect portal, GlobalProtect gateway or preventing configuration commits. This vulnerability is only available when the GlobalProtect gateway or portal is running.\nThis issue affects PAN-OS 6.1.18 and earlier, PAN-OS 7.0.18 and earlier, PAN-OS 7.1.12 and earlier, PAN-OS 8.0.5 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists in PAN-OS that could lead to denying access to GlobalProtect portal, GlobalProtect gateway or preventing configuration commits. (Ref # PAN-78127 / CVE-2017-15942)\nPAN-OS contains a vulnerability in GlobalProtect that may allow a non-authenticated third party to mount a Denial of Service attack against the GlobalProtect portal, GlobalProtect gateway or preventing configuration commits. This vulnerability is only available when the GlobalProtect gateway or portal is running.\nThis issue affects PAN-OS 6.1.18 and earlier, PAN-OS 7.0.18 and earlier, PAN-OS 7.1.12 and earlier, PAN-OS 8.0.5 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 8.0.5","PAN-OS 8.0.4","PAN-OS 8.0.3-h4","PAN-OS 8.0.3-h3","PAN-OS 8.0.3-h2","PAN-OS 8.0.3-h1","PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.12","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.18","PAN-OS 7.0.17","PAN-OS 7.0.16","PAN-OS 7.0.15","PAN-OS 7.0.14","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.18","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.18","versionType":"custom","changes":[{"at":"6.1.19","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.18","versionType":"custom","changes":[{"at":"7.0.19","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.12","versionType":"custom","changes":[{"at":"7.1.13","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.5","versionType":"custom","changes":[{"at":"8.0.6","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2017-15942"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Craig Stephen and Martin Ferris from Net Consulting for reporting this issue to us."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-399 Resource Management Errors","cweId":"CWE-399"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-78127"],"advisory":"PAN-SA-2017-0025","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This vulnerability is only available when the GlobalProtect gateway or portal is running.","supportingMedia":{"value":"This vulnerability is only available when the GlobalProtect gateway or portal is running.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.1.19 and later, PAN-OS 7.0.19 and later, PAN-OS 7.1.13 and later, PAN-OS 8.0.6 and later","supportingMedia":{"value":"PAN-OS 6.1.19 and later, PAN-OS 7.0.19 and later, PAN-OS 7.1.13 and later, PAN-OS 8.0.6 and later","type":"text/html","base64":false}}],"timeline":[{"time":"2017-12-06T00:00:00.000Z","lang":"eng","value":"Initial publication"},{"time":"2020-05-18T16:00:00.000Z","lang":"eng","value":"Updated credit statement"}]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2017-9458","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-08-30T23:00:03.000Z","dateReserved":"2017-08-30T23:00:03.000Z"},"containers":{"cna":{"title":"XML External Entity (XXE) in PAN-OS ","datePublic":"2017-08-30T23:00:03.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:46","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists in PAN-OS’s GlobalProtect internal and external gateway interface that could allow for XML External Entity (XXE) attack. PAN-OS does not properly parse XML input. (Ref # PAN-75688 / CVE-2017-9458)\nSuccessful exploitation of this issue may allow disclosure of information, denial of service or server side request forgery.\r\nThis issue affects PAN-OS 6.1.17 and earlier, PAN-OS 7.0.16 and earlier, PAN-OS 7.1.11 and earlier, PAN-OS 8.0.2 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists in PAN-OS’s GlobalProtect internal and external gateway interface that could allow for XML External Entity (XXE) attack. PAN-OS does not properly parse XML input. (Ref # PAN-75688 / CVE-2017-9458)\nSuccessful exploitation of this issue may allow disclosure of information, denial of service or server side request forgery.\r\nThis issue affects PAN-OS 6.1.17 and earlier, PAN-OS 7.0.16 and earlier, PAN-OS 7.1.11 and earlier, PAN-OS 8.0.2 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.16","PAN-OS 7.0.15","PAN-OS 7.0.14","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.17","versionType":"custom","changes":[{"at":"6.1.18","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.16","versionType":"custom","changes":[{"at":"7.0.17","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.11","versionType":"custom","changes":[{"at":"7.1.12","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.2","versionType":"custom","changes":[{"at":"8.0.3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2017-9458"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Alejandro Iacobelli and Nicolas Videla from Mercadolibre for reporting (CVE-2017-9458).  \r"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-611 Improper Restriction of XML External Entity Reference","cweId":"CWE-611"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-75688"],"advisory":"PAN-SA-2017-0024","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Customers that have not configured GlobalProtect are not affected by this issue.\r","supportingMedia":{"value":"Customers that have not configured GlobalProtect are not affected by this issue.\r","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.1.18 and later, PAN-OS 7.0.17 and later, PAN-OS 7.1.12 and later, PAN-OS 8.0.3 and later\r","supportingMedia":{"value":"PAN-OS 6.1.18 and later, PAN-OS 7.0.17 and later, PAN-OS 7.1.12 and later, PAN-OS 8.0.3 and later\r","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2017-6460","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-07-27T17:15:00.000Z","dateReserved":"2017-07-27T17:15:00.000Z"},"containers":{"cna":{"title":"NTP Vulnerability","datePublic":"2017-07-27T17:15:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:46","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"The Network Time Protocol (NTP) library has been found to contain a vulnerability CVE-2017-6460. Palo Alto Networks software makes use of the vulnerable library and may be affected. This issue only affects the management plane of the firewall. (Ref # PAN-76130 / CVE-2017-6460)\nSuccessful exploitation of this issue requires an attacker to be on the management interface.\nThis issue affects PAN-OS 6.1, PAN-OS 7.0.17 and earlier, PAN-OS 7.1.11 and earlier, PAN-OS 8.0.3 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The Network Time Protocol (NTP) library has been found to contain a vulnerability CVE-2017-6460. Palo Alto Networks software makes use of the vulnerable library and may be affected. This issue only affects the management plane of the firewall. (Ref # PAN-76130 / CVE-2017-6460)\nSuccessful exploitation of this issue requires an attacker to be on the management interface.\nThis issue affects PAN-OS 6.1, PAN-OS 7.0.17 and earlier, PAN-OS 7.1.11 and earlier, PAN-OS 8.0.3 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 8.0.3","PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.11","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.17","PAN-OS 7.0.16","PAN-OS 7.0.15","PAN-OS 7.0.14","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.22","PAN-OS 6.1.21","PAN-OS 6.1.20","PAN-OS 6.1.19","PAN-OS 6.1.18","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1.*","status":"affected"},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.11","versionType":"custom","changes":[{"at":"7.1.12","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.3","versionType":"custom","changes":[{"at":"8.0.4","status":"unaffected"}]},{"version":"7.0.18","status":"unaffected","lessThan":"7.0*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2017-6460"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-76130"],"advisory":"PAN-SA-2017-0022","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.\n","supportingMedia":{"value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.\n","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.0.18 or later, PAN-OS 7.1.12 or later, PAN-OS 8.0.4 or later\n","supportingMedia":{"value":"PAN-OS 7.0.18 or later, PAN-OS 7.1.12 or later, PAN-OS 8.0.4 or later\n","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2017-8390","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-07-20T20:10:04.000Z","dateReserved":"2017-07-20T20:10:04.000Z"},"containers":{"cna":{"title":"Vulnerability in the PAN-OS DNS Proxy","datePublic":"2017-07-20T20:10:04.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:46","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A Remote Code Execution vulnerability exists in the PAN-OS DNS Proxy. This issue affects customers who have DNS Proxy enabled in PAN-OS. This issue affects both the Data and Management planes of the firewall. When DNS Proxy processes a specially crafted fully qualified domain names (FQDN), it is possible to execute code on the firewall. (ref # PAN-77516 / CVE-2017-8390).\nSuccessful exploitation of this issue could allow an attacker to execute code on the firewall.\nThis issue affects PAN-OS 6.1.17 and earlier, PAN-OS 7.0.15 and earlier, PAN-OS 7.1.9 and earlier, PAN-OS 8.0.2 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A Remote Code Execution vulnerability exists in the PAN-OS DNS Proxy. This issue affects customers who have DNS Proxy enabled in PAN-OS. This issue affects both the Data and Management planes of the firewall. When DNS Proxy processes a specially crafted fully qualified domain names (FQDN), it is possible to execute code on the firewall. (ref # PAN-77516 / CVE-2017-8390).\nSuccessful exploitation of this issue could allow an attacker to execute code on the firewall.\nThis issue affects PAN-OS 6.1.17 and earlier, PAN-OS 7.0.15 and earlier, PAN-OS 7.1.9 and earlier, PAN-OS 8.0.2 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.15","PAN-OS 7.0.14","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.17","versionType":"custom","changes":[{"at":"6.1.18","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.15","versionType":"custom","changes":[{"at":"7.0.16","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.9","versionType":"custom","changes":[{"at":"7.1.10","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.2","versionType":"custom","changes":[{"at":"8.0.3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2017-8390"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-77516"],"advisory":"PAN-SA-2017-0021","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Palo Alto Networks recommends disabling DNS Proxy for those customers who are affected and are unable to apply the update.","supportingMedia":{"value":"Palo Alto Networks recommends disabling DNS Proxy for those customers who are affected and are unable to apply the update.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.1.18 and later, PAN-OS 7.0.16 and later, PAN-OS 7.1.10 and later, PAN-OS 8.0.3 and later","supportingMedia":{"value":"PAN-OS 6.1.18 and later, PAN-OS 7.0.16 and later, PAN-OS 7.1.10 and later, PAN-OS 8.0.3 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-10229","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-06-19T20:30:00.000Z","dateReserved":"2017-06-19T20:30:00.000Z"},"containers":{"cna":{"title":"Kernel Vulnerability","datePublic":"2017-06-19T20:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:44","orgId":"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6","shortName":"google_android"},"descriptions":[{"lang":"en","value":"A vulnerability exists in the Linux kernel of PAN-OS that may result in Remote Code Execution. A vulnerability in the Linux kernel networking subsystem for UDP could enable an attacker to execute arbitrary code within the context of the kernel. The Data Plane (DP) of PAN-OS is not affected by this issue since it does not use the vulnerable Linux kernel code. (ref # PAN-77173 / CVE-2016-10229).\nSuccessful exploitation of this issue requires an attacker to be on the management network.\nThis issue affects PAN-OS 6.1.17 and earlier, PAN-OS 7.0, PAN-OS 7.1.10 and earlier, PAN-OS 8.0.2 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists in the Linux kernel of PAN-OS that may result in Remote Code Execution. A vulnerability in the Linux kernel networking subsystem for UDP could enable an attacker to execute arbitrary code within the context of the kernel. The Data Plane (DP) of PAN-OS is not affected by this issue since it does not use the vulnerable Linux kernel code. (ref # PAN-77173 / CVE-2016-10229).\nSuccessful exploitation of this issue requires an attacker to be on the management network.\nThis issue affects PAN-OS 6.1.17 and earlier, PAN-OS 7.0, PAN-OS 7.1.10 and earlier, PAN-OS 8.0.2 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 8.0.2","PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.19","PAN-OS 7.0.18","PAN-OS 7.0.17","PAN-OS 7.0.16","PAN-OS 7.0.15","PAN-OS 7.0.14","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.0.*","status":"affected"},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.17","versionType":"custom","changes":[{"at":"6.1.18","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.10","versionType":"custom","changes":[{"at":"7.1.11","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.2","versionType":"custom","changes":[{"at":"8.0.3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-10229"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-358 Improperly Implemented Security Check for Standard","cweId":"CWE-358"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-77173"],"advisory":"PAN-SA-2017-0018","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.","supportingMedia":{"value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.1.18 and later, PAN-OS 7.1.11 and later, PAN-OS 8.0.3 and later\n","supportingMedia":{"value":"PAN-OS 6.1.18 and later, PAN-OS 7.1.11 and later, PAN-OS 8.0.3 and later\n","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-8610","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-06-07T00:25:00.000Z","dateReserved":"2017-06-07T00:25:00.000Z"},"containers":{"cna":{"title":"OpenSSL Vulnerability ","datePublic":"2017-06-07T00:25:00.000Z","providerMetadata":{"dateUpdated":"2020-10-20T21:14:51","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"descriptions":[{"lang":"en","value":"The OpenSSL library has been found to contain vulnerability CVE-2016-8610. Palo Alto Networks software makes use of the vulnerable library and may be affected. (Ref # PAN-68543 / CVE-2016-8610)\r\nThe OpenSSL library in use by PAN-OS is patched on a regular basis.\nThis issue affects PAN-OS 6.1.17 and earlier, PAN-OS 7.0.15 and earlier, PAN-OS 7.1.10 and earlier\r","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The OpenSSL library has been found to contain vulnerability CVE-2016-8610. Palo Alto Networks software makes use of the vulnerable library and may be affected. (Ref # PAN-68543 / CVE-2016-8610)\r\nThe OpenSSL library in use by PAN-OS is patched on a regular basis.\nThis issue affects PAN-OS 6.1.17 and earlier, PAN-OS 7.0.15 and earlier, PAN-OS 7.1.10 and earlier\r</pre>"}]}],"x_affectedList":["PAN-OS 7.1.10","PAN-OS 7.1.9-h4","PAN-OS 7.1.9-h3","PAN-OS 7.1.9-h2","PAN-OS 7.1.9-h1","PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.15","PAN-OS 7.0.14","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.17","versionType":"custom","changes":[{"at":"6.1.18","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.15","versionType":"custom","changes":[{"at":"7.0.16","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.10","versionType":"custom","changes":[{"at":"7.1.11","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-8610"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-400 Uncontrolled Resource Consumption","cweId":"CWE-400"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-68543"],"advisory":"PAN-SA-2017-0017","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.1.18 and later, PAN-OS 7.0.16 and later, PAN-OS 7.1.11 and later\r","supportingMedia":{"value":"PAN-OS 6.1.18 and later, PAN-OS 7.0.16 and later, PAN-OS 7.1.11 and later\r","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-4971","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-05-23T03:00:03.000Z","dateReserved":"2017-05-23T03:00:03.000Z"},"containers":{"cna":{"title":"WGET Vulnerability","datePublic":"2017-05-23T03:00:03.000Z","providerMetadata":{"dateUpdated":"2021-04-30T16:06:24","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"descriptions":[{"lang":"en","value":"The wget library has been found to contain a vulnerability (CVE 2016-4971). wget allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource. Palo Alto Networks software makes use of the vulnerable library and may be affected. (Ref # PAN-59677/ CVE 2016-4971)\nSuccessfully exploiting this issue would require an attacker to be authenticated on the Management Interface.\nThis issue affects PAN-OS 6.1.16 and earlier, PAN-OS 7.0.14 and earlier, PAN-OS 7.1.9 and earlier, PAN-OS 8.0","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The wget library has been found to contain a vulnerability (CVE 2016-4971). wget allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource. Palo Alto Networks software makes use of the vulnerable library and may be affected. (Ref # PAN-59677/ CVE 2016-4971)\nSuccessfully exploiting this issue would require an attacker to be authenticated on the Management Interface.\nThis issue affects PAN-OS 6.1.16 and earlier, PAN-OS 7.0.14 and earlier, PAN-OS 7.1.9 and earlier, PAN-OS 8.0</pre>"}]}],"x_affectedList":["PAN-OS 7.1.9","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.14","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.16","versionType":"custom","changes":[{"at":"6.1.17","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.14","versionType":"custom","changes":[{"at":"7.0.15","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.9","versionType":"custom","changes":[{"at":"7.1.10","status":"unaffected"}]},{"version":"8.0.1","status":"unaffected","lessThan":"8.0*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-4971"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-254","cweId":"CWE-254"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-59677","2016-4971"],"advisory":"PAN-SA-2017-0016","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.","supportingMedia":{"value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.1.17 and later, PAN-OS 7.0.15 and later, PAN-OS 7.1.10 and later, PAN-OS 8.0.1 and later","supportingMedia":{"value":"PAN-OS 6.1.17 and later, PAN-OS 7.0.15 and later, PAN-OS 7.1.10 and later, PAN-OS 8.0.1 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2017-7945","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-04-28T16:45:03.000Z","dateReserved":"2017-04-28T16:45:03.000Z"},"containers":{"cna":{"title":"Brute force attack on the PAN-OS GlobalProtect external interface ","datePublic":"2017-04-28T16:45:03.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:46","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists in the PAN-OS GlobalProtect external interface that could allow for an attacker to brute force a username on PAN-OS GlobalProtect external Interface. The vulnerability is caused by\rPAN-OS provided different responses when supplying login credentials. (Ref # PAN-72769 / CVE-2017-7945)\r\nSuccessful exploitation of this issue may allow a malicious user to conduct a brute force attack against PAN-OS GlobalProtect external interface.\nThis issue affects PAN-OS 6.1.16 and earlier, PAN-OS 7.0.14 and earlier, PAN-OS 7.1.8 and earlier, PAN-OS 8.0.1 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists in the PAN-OS GlobalProtect external interface that could allow for an attacker to brute force a username on PAN-OS GlobalProtect external Interface. The vulnerability is caused by\rPAN-OS provided different responses when supplying login credentials. (Ref # PAN-72769 / CVE-2017-7945)\r\nSuccessful exploitation of this issue may allow a malicious user to conduct a brute force attack against PAN-OS GlobalProtect external interface.\nThis issue affects PAN-OS 6.1.16 and earlier, PAN-OS 7.0.14 and earlier, PAN-OS 7.1.8 and earlier, PAN-OS 8.0.1 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 8.0.1","PAN-OS 8.0.0","PAN-OS 8.0","PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.14","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.16","versionType":"custom","changes":[{"at":"6.1.17","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.14","versionType":"custom","changes":[{"at":"7.0.15","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.8","versionType":"custom","changes":[{"at":"7.1.9","status":"unaffected"}]},{"version":"8.0","status":"affected","lessThanOrEqual":"8.0.1","versionType":"custom","changes":[{"at":"8.0.2","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2017-7945"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Rich Hansen from Plexus for reporting this issue to us."}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-209 Information Exposure Through an Error Message","cweId":"CWE-209"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-72769"],"advisory":"PAN-SA-2017-0014","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Customers that have not configured GlobalProtect are not affected by this issue.\r","supportingMedia":{"value":"Customers that have not configured GlobalProtect are not affected by this issue.\r","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.1.17 and later, PAN-OS 7.0.15 and later, PAN-OS 7.1.9 and later, PAN-OS 8.0.2 and later","supportingMedia":{"value":"PAN-OS 6.1.17 and later, PAN-OS 7.0.15 and later, PAN-OS 7.1.9 and later, PAN-OS 8.0.2 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2017-3731","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-04-20T18:00:00.000Z","dateReserved":"2017-04-20T18:00:00.000Z"},"containers":{"cna":{"title":"OpenSSL Vulnerability","datePublic":"2017-04-20T18:00:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:45","orgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","shortName":"openssl"},"descriptions":[{"lang":"en","value":"The OpenSSL library has been found to contain vulnerability CVE-2017-3731. Palo Alto Networks software makes use of the vulnerable library and may be affected. (Ref # PAN-73914 / CVE-2017-3731)\nThe OpenSSL library in use by PAN-OS is patched on a regular basis. \nThis issue affects PAN-OS 6.1, PAN-OS 7.0.14 and earlier, PAN-OS 7.1, PAN-OS 8.0\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The OpenSSL library has been found to contain vulnerability CVE-2017-3731. Palo Alto Networks software makes use of the vulnerable library and may be affected. (Ref # PAN-73914 / CVE-2017-3731)\nThe OpenSSL library in use by PAN-OS is patched on a regular basis. \nThis issue affects PAN-OS 6.1, PAN-OS 7.0.14 and earlier, PAN-OS 7.1, PAN-OS 8.0\n</pre>"}]}],"x_affectedList":["PAN-OS 7.0.14","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.1","status":"affected","lessThanOrEqual":"6.1","versionType":"custom"},{"version":"7.0.15","status":"unaffected","lessThan":"7.0*","versionType":"custom"},{"version":"7.1.10","status":"unaffected","lessThan":"7.1*","versionType":"custom"},{"version":"8.0.2","status":"unaffected","lessThan":"8.0*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2017-3731"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-125 Out-of-bounds Read","cweId":"CWE-125"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-73914"],"advisory":"PAN-SA-2017-0012","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.0.15 and later; PAN-OS 7.1.10 and later; PAN-OS 8.0.2 and later\n","supportingMedia":{"value":"PAN-OS 7.0.15 and later; PAN-OS 7.1.10 and later; PAN-OS 8.0.2 and later\n","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2017-7218","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-04-10T17:30:01.000Z","dateReserved":"2017-04-10T17:30:01.000Z"},"containers":{"cna":{"title":"Local Privilege Escalation in the Management Web Interface ","datePublic":"2017-04-10T17:30:01.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:46","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists in the Management Web Interface that could allow for local privilege escalation. The Management Web Interface does not properly validate specific request parameters which can potentially allow executing code with higher privileges.  (Ref # PAN-70426/ CVE-2017-7218)\nSuccessfully exploiting this issue would require an attacker to be authenticated.\nThis issue affects PAN-OS 7.1.8 and earlier\r","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists in the Management Web Interface that could allow for local privilege escalation. The Management Web Interface does not properly validate specific request parameters which can potentially allow executing code with higher privileges.  (Ref # PAN-70426/ CVE-2017-7218)\nSuccessfully exploiting this issue would require an attacker to be authenticated.\nThis issue affects PAN-OS 7.1.8 and earlier\r</pre>"}]}],"x_affectedList":["PAN-OS 7.1.8","PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.8","versionType":"custom","changes":[{"at":"7.1.9","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2017-7218"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Christophe Schleypen from NATO Communications and Information Agency for reporting this issue to us.  \r"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-70426"],"advisory":"PAN-SA-2017-0009","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.","supportingMedia":{"value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.1.9 and later","supportingMedia":{"value":"PAN-OS 7.1.9 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-5195","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2017-02-21T19:30:00.000Z","dateReserved":"2017-02-21T19:30:00.000Z"},"containers":{"cna":{"title":"Kernel Vulnerability ","datePublic":"2017-02-21T19:30:00.000Z","providerMetadata":{"dateUpdated":"2022-08-15T11:06:10","orgId":"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28","shortName":"Chrome"},"descriptions":[{"lang":"en","value":"A vulnerability exists in the kernel of PAN-OS that may result in an elevation of privilege. This issue is publicly known as Dirty COW (ref # PAN-68074 / CVE-2016-5195).\nPAN-OS may be impacted by the Dirty COW (CVE-2016-5195) attack. A race condition was found in the way the Linux kernel's memory subsystem handles the copy-on-write breakage of private read-only memory mappings.  An attacker would first require access to a shell on the device before they could use this exploit. Shell access is significantly restricted on the device. The Command Line Interface (CLI) is not shell access and therefore this issue cannot be exploited by the CLI.\nThis issue affects PAN-OS 5.1, PAN-OS 6.0, PAN-OS 6.1, PAN-OS 7.0.13, PAN-OS 7.1.7 and earlier\n","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists in the kernel of PAN-OS that may result in an elevation of privilege. This issue is publicly known as Dirty COW (ref # PAN-68074 / CVE-2016-5195).\nPAN-OS may be impacted by the Dirty COW (CVE-2016-5195) attack. A race condition was found in the way the Linux kernel's memory subsystem handles the copy-on-write breakage of private read-only memory mappings.  An attacker would first require access to a shell on the device before they could use this exploit. Shell access is significantly restricted on the device. The Command Line Interface (CLI) is not shell access and therefore this issue cannot be exploited by the CLI.\nThis issue affects PAN-OS 5.1, PAN-OS 6.0, PAN-OS 6.1, PAN-OS 7.0.13, PAN-OS 7.1.7 and earlier\n</pre>"}]}],"x_affectedList":["PAN-OS 7.1.7","PAN-OS 7.1.6","PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.13","PAN-OS 7.0.12","PAN-OS 7.0.11","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.22","PAN-OS 6.1.21","PAN-OS 6.1.20","PAN-OS 6.1.19","PAN-OS 6.1.18","PAN-OS 6.1.17","PAN-OS 6.1.16","PAN-OS 6.1.15","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.15","PAN-OS 6.0.14","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.1.*","status":"affected"},{"version":"6.0.*","status":"affected"},{"version":"6.1.*","status":"affected"},{"version":"7.0.14","status":"unaffected","lessThan":"7.0*","versionType":"custom"},{"version":"7.1.8","status":"unaffected","lessThan":"7.1*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-5195"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')","cweId":"CWE-362"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-68074"],"advisory":"PAN-SA-2017-0003","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.\n","supportingMedia":{"value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network.\n","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":" PAN-OS 7.0.14 and later, PAN-OS 7.1.8 and later\n","supportingMedia":{"value":" PAN-OS 7.0.14 and later, PAN-OS 7.1.8 and later\n","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-9150","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-11-17T17:01:00.000Z","dateReserved":"2016-11-17T17:01:00.000Z"},"containers":{"cna":{"title":"Buffer Overflow in the Management Web Interface","datePublic":"2016-11-17T17:01:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:45","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"Palo Alto Networks web management server improperly handles a buffer overflow. This can result in a possible remote code execution (RCE). (Ref # PAN-63073/102953/CVE-2016-9150)\nAn attacker with network access to the management web interface may be able to perform a remote code execution (RCE) or denial-of-service (DoS).  \r\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.14 and earlier; PAN-OS 7.0.10 and earlier; PAN-OS 7.1.5 and earlier\r","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks web management server improperly handles a buffer overflow. This can result in a possible remote code execution (RCE). (Ref # PAN-63073/102953/CVE-2016-9150)\nAn attacker with network access to the management web interface may be able to perform a remote code execution (RCE) or denial-of-service (DoS).  \r\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.14 and earlier; PAN-OS 7.0.10 and earlier; PAN-OS 7.1.5 and earlier\r</pre>"}]}],"x_affectedList":["PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.14","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.19","versionType":"custom","changes":[{"at":"5.0.20","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.12","versionType":"custom","changes":[{"at":"5.1.13","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.14","versionType":"custom","changes":[{"at":"6.0.15","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.14","versionType":"custom","changes":[{"at":"6.1.15","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.10","versionType":"custom","changes":[{"at":"7.0.11","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.5","versionType":"custom","changes":[{"at":"7.1.6","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-9150"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Tavis Ormandy from the Google Security Team for reporting this issue to us.\r"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-63073","102953"],"advisory":"PAN-SA-2016-0035","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network. \r","supportingMedia":{"value":"Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network. \r","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.15 and later; PAN-OS 7.0.11 and later; PAN-OS 7.1.6 and later\r","supportingMedia":{"value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.15 and later; PAN-OS 7.0.11 and later; PAN-OS 7.1.6 and later\r","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-9151","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-11-17T17:00:00.000Z","dateReserved":"2016-11-17T17:00:00.000Z"},"containers":{"cna":{"title":"Local Privilege Escalation","datePublic":"2016-11-17T17:00:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:45","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"Palo Alto Networks firewalls do not properly validate certain environment variables which can potentially allow executing code with higher privileges (Ref # PAN-61104/100499/CVE-2016-9151)\r\nA potential attacker with local shell access could manipulate arbitrary environment variables which could result in a process running with higher privileges.\r\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.14 and earlier; PAN-OS 7.0.10 and earlier; PAN-OS 7.1.5 and earlier\r","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks firewalls do not properly validate certain environment variables which can potentially allow executing code with higher privileges (Ref # PAN-61104/100499/CVE-2016-9151)\r\nA potential attacker with local shell access could manipulate arbitrary environment variables which could result in a process running with higher privileges.\r\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.14 and earlier; PAN-OS 7.0.10 and earlier; PAN-OS 7.1.5 and earlier\r</pre>"}]}],"x_affectedList":["PAN-OS 7.1.5","PAN-OS 7.1.4-h2","PAN-OS 7.1.4-h1","PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.14","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.19","versionType":"custom","changes":[{"at":"5.0.20","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.12","versionType":"custom","changes":[{"at":"5.1.13","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.14","versionType":"custom","changes":[{"at":"6.0.15","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.14","versionType":"custom","changes":[{"at":"6.1.15","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.10","versionType":"custom","changes":[{"at":"7.0.11","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.5","versionType":"custom","changes":[{"at":"7.1.6","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-9151"}],"credits":[{"lang":"en","value":"Palo Alto Networks would like to thank Tavis Ormandy from the Google Security Team for reporting this issue to us."}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-264","cweId":"CWE-264"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-61104","100499"],"advisory":"PAN-SA-2016-0034","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Exploitation of this privilege escalation is restricted to local users. Potential attackers would have to first obtain a shell on the device before they could attempt to escalate privileges through this vulnerability. ","supportingMedia":{"value":"Exploitation of this privilege escalation is restricted to local users. Potential attackers would have to first obtain a shell on the device before they could attempt to escalate privileges through this vulnerability. ","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.15 and later; PAN-OS 7.0.11 and later; PAN-OS 7.1.6 and later\r","supportingMedia":{"value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.15 and later; PAN-OS 7.0.11 and later; PAN-OS 7.1.6 and later\r","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2016-0029","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-10-18T18:31:00.000Z","dateReserved":"2016-10-18T18:31:00.000Z"},"containers":{"cna":{"title":"Insecure Server Configuration","datePublic":"2016-10-18T18:31:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"An incorrect Web management server configuration was identified in PAN-OS. (Ref # PAN-52038/86767).\nThis post-authentication issue affects the management interface of the device, where an incorrect configuration could lead to JavaScript execution.\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.7 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>An incorrect Web management server configuration was identified in PAN-OS. (Ref # PAN-52038/86767).\nThis post-authentication issue affects the management interface of the device, where an incorrect configuration could lead to JavaScript execution.\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.7 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.14","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.19","versionType":"custom","changes":[{"at":"5.0.20","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.12","versionType":"custom","changes":[{"at":"5.1.13","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.14","versionType":"custom","changes":[{"at":"6.0.15","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.12","versionType":"custom","changes":[{"at":"6.1.13","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.7","versionType":"custom","changes":[{"at":"7.0.8","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2016-0029"}],"credits":[{"lang":"en","value":"ringzero"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Insecure Server Configuration"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-52038","86767"],"advisory":"PAN-SA-2016-0029","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue is available only to authenticated users on the web interface. Palo Alto Networks recommends implementing best practices, only allowing management access to a restricted set of IP address, and dedicating management of the device to the management interface only.","supportingMedia":{"value":"This issue is available only to authenticated users on the web interface. Palo Alto Networks recommends implementing best practices, only allowing management access to a restricted set of IP address, and dedicating management of the device to the management interface only.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.8 and later","supportingMedia":{"value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.8 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2016-0028","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-10-18T18:30:00.000Z","dateReserved":"2016-10-18T18:30:00.000Z"},"containers":{"cna":{"title":"OpenSSL Vulnerabilities","datePublic":"2016-10-18T18:30:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"The OpenSSL library has been found to contain several vulnerabilities CVE-2015-4000, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1792, CVE-2015-1791, CVE-2014-8176. Palo Alto Networks software makes use of the vulnerable library. (Ref # PAN-48954/81411)\nThe OpenSSL library in use by PAN-OS is patched on a regular basis. Severities of the CVEs listed under the summary section range from low to moderate but have not been shown to be exploitable at the time of this advisory.\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.13 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.7 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The OpenSSL library has been found to contain several vulnerabilities CVE-2015-4000, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1792, CVE-2015-1791, CVE-2014-8176. Palo Alto Networks software makes use of the vulnerable library. (Ref # PAN-48954/81411)\nThe OpenSSL library in use by PAN-OS is patched on a regular basis. Severities of the CVEs listed under the summary section range from low to moderate but have not been shown to be exploitable at the time of this advisory.\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.13 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.7 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.19","versionType":"custom","changes":[{"at":"5.0.20","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.12","versionType":"custom","changes":[{"at":"5.1.13","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.13","versionType":"custom","changes":[{"at":"6.0.14","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.12","versionType":"custom","changes":[{"at":"6.1.13","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.7","versionType":"custom","changes":[{"at":"7.0.8","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2016-0028"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-48954","81411"],"advisory":"PAN-SA-2016-0028","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.14 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.8 and later","supportingMedia":{"value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.14 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.8 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2016-0025","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-10-04T01:00:00.000Z","dateReserved":"2016-10-04T01:00:00.000Z"},"containers":{"cna":{"title":"Kernel Vulnerabilities","datePublic":"2016-10-04T01:00:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"The kernel in use by the Management Plane of PAN-OS is vulnerable to CVE-2015-5364 and CVE-2015-5366.\n (Ref # PAN-52379/87408)\nThe CVSS Score of CVE-2015-5364 is 7.8, High; while the CVSS Score of CVE-2015-5366 is 5.0, Medium. Those could lead to a Denial of Service attack.\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.14 and earlier; PAN-OS 7.0.10 and earlier; PAN-OS 7.1.4 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The kernel in use by the Management Plane of PAN-OS is vulnerable to CVE-2015-5364 and CVE-2015-5366.\n (Ref # PAN-52379/87408)\nThe CVSS Score of CVE-2015-5364 is 7.8, High; while the CVSS Score of CVE-2015-5366 is 5.0, Medium. Those could lead to a Denial of Service attack.\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.14 and earlier; PAN-OS 7.0.10 and earlier; PAN-OS 7.1.4 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.1.4","PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.10","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.14","PAN-OS 6.1.13","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.14","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.19","versionType":"custom","changes":[{"at":"5.0.20","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.12","versionType":"custom","changes":[{"at":"5.1.13","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.14","versionType":"custom","changes":[{"at":"6.0.15","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.14","versionType":"custom","changes":[{"at":"6.1.15","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.10","versionType":"custom","changes":[{"at":"7.0.11","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.4","versionType":"custom","changes":[{"at":"7.1.5","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2016-0025"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-399","cweId":"CWE-399"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["PAN-52379","87408"],"advisory":"PAN-SA-2016-0025","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.15 and later; PAN-OS 7.0.11 and later; PAN-OS 7.1.5 and later\n","supportingMedia":{"value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.15 and later; PAN-OS 7.0.11 and later; PAN-OS 7.1.5 and later\n","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2015-7547","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-08-15T19:00:00.000Z","dateReserved":"2016-08-15T19:00:00.000Z"},"containers":{"cna":{"title":"Glibc DNS Resolver Vulnerability","datePublic":"2016-08-15T19:00:00.000Z","providerMetadata":{"dateUpdated":"2022-06-20T18:06:34","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"descriptions":[{"lang":"en","value":"A vulnerability in the GNU libc (glibc) DNS resolver allows remote code execution (CVE-2015-7547). However, this issue can be exploited only from a DNS server that is under the control of an attacker. (Ref # 91886).\nThis glibc issue is only exploitable by an attacker controlling the DNS server configured for the device. Furthermore, the attacker must overcome additional anti-exploitation mitigations, such as ASLR, to mount a successful attack.\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.7 and earlier; PAN-OS 7.1.3 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability in the GNU libc (glibc) DNS resolver allows remote code execution (CVE-2015-7547). However, this issue can be exploited only from a DNS server that is under the control of an attacker. (Ref # 91886).\nThis glibc issue is only exploitable by an attacker controlling the DNS server configured for the device. Furthermore, the attacker must overcome additional anti-exploitation mitigations, such as ASLR, to mount a successful attack.\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.14 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.7 and earlier; PAN-OS 7.1.3 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.14","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.19","versionType":"custom","changes":[{"at":"5.0.20","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.12","versionType":"custom","changes":[{"at":"5.1.13","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.14","versionType":"custom","changes":[{"at":"6.0.15","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.12","versionType":"custom","changes":[{"at":"6.1.13","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.7","versionType":"custom","changes":[{"at":"7.0.8","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.3","versionType":"custom","changes":[{"at":"7.1.4","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2015-7547"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["91886"],"advisory":"PAN-SA-2016-0021","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This vulnerability can affect PAN-OS software only when the device is configured with a DNS server that is under the control of an attacker. Palo Alto Networks discourages configuring the device with untrusted DNS servers.","supportingMedia":{"value":"This vulnerability can affect PAN-OS software only when the device is configured with a DNS server that is under the control of an attacker. Palo Alto Networks discourages configuring the device with untrusted DNS servers.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.8 and later; PAN-OS 7.1.4 and later","supportingMedia":{"value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.8 and later; PAN-OS 7.1.4 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2016-0020","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-08-15T18:30:00.000Z","dateReserved":"2016-08-15T18:30:00.000Z"},"containers":{"cna":{"title":"OpenSSL Vulnerabilities","datePublic":"2016-08-15T18:30:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"The OpenSSL library has been found to contain several vulnerabilities CVE-2014-8176, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-1792, CVE-2015-1794, CVE-2015-3195, CVE-2015-4000, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2176, CVE-2016-2842. Palo Alto Networks software makes use of the vulnerable library. (Ref # 95622).\nThe OpenSSL library in use by PAN-OS is patched on a regular basis. Severities of the CVEs listed under the summary section range from low to high but, have not been shown to be exploitable at the time of this advisory.\nThis issue affects PAN-OS 5.0.X; PAN-OS-5.1.X; PAN-OS 6.0.13 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.8 and earlier; PAN-OS 7.1.3 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The OpenSSL library has been found to contain several vulnerabilities CVE-2014-8176, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-1792, CVE-2015-1794, CVE-2015-3195, CVE-2015-4000, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2176, CVE-2016-2842. Palo Alto Networks software makes use of the vulnerable library. (Ref # 95622).\nThe OpenSSL library in use by PAN-OS is patched on a regular basis. Severities of the CVEs listed under the summary section range from low to high but, have not been shown to be exploitable at the time of this advisory.\nThis issue affects PAN-OS 5.0.X; PAN-OS-5.1.X; PAN-OS 6.0.13 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.8 and earlier; PAN-OS 7.1.3 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.13","versionType":"custom","changes":[{"at":"6.0.14","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.12","versionType":"custom","changes":[{"at":"6.1.13","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.8","versionType":"custom","changes":[{"at":"7.0.9","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.3","versionType":"custom","changes":[{"at":"7.1.4","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2016-0020"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["95622"],"advisory":"PAN-SA-2016-0020","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.0.14 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.9 and later; PAN-OS 7.1.4 and later","supportingMedia":{"value":"PAN-OS 6.0.14 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.9 and later; PAN-OS 7.1.4 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2016-0019","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-08-15T18:00:00.000Z","dateReserved":"2016-08-15T18:00:00.000Z"},"containers":{"cna":{"title":"NTP Vulnerabilities","datePublic":"2016-08-15T18:00:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"The open source ntp project has been found to contain several vulnerabilities (CVE-2015-8158, CVE-2015-8138, CVE-2015-7979, CVE-2015-7978, CVE-2015-7977, CVE-2015-7976, CVE-2015-7975, CVE-2015-7974, CVE-2015-7973, all released in January 2016). Palo Alto...\nAlso Palo Alto Networks make use of the affected version of ntp, no exploitation condition are known at the time of this advisory\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.1 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.8 and earlier; PAN-OS 7.1.3 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The open source ntp project has been found to contain several vulnerabilities (CVE-2015-8158, CVE-2015-8138, CVE-2015-7979, CVE-2015-7978, CVE-2015-7977, CVE-2015-7976, CVE-2015-7975, CVE-2015-7974, CVE-2015-7973, all released in January 2016). Palo Alto...\nAlso Palo Alto Networks make use of the affected version of ntp, no exploitation condition are known at the time of this advisory\nThis issue affects PAN-OS 5.0.19 and earlier; PAN-OS 5.1.12 and earlier; PAN-OS 6.0.1 and earlier; PAN-OS 6.1.12 and earlier; PAN-OS 7.0.8 and earlier; PAN-OS 7.1.3 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.1.3","PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.12","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.19","versionType":"custom","changes":[{"at":"5.0.20","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.12","versionType":"custom","changes":[{"at":"5.1.13","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.1","versionType":"custom","changes":[{"at":"6.0.15","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.12","versionType":"custom","changes":[{"at":"6.1.13","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.8","versionType":"custom","changes":[{"at":"7.0.9","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.3","versionType":"custom","changes":[{"at":"7.1.4","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2016-0019"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-400 Uncontrolled Resource Consumption","cweId":"CWE-400"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["92106"],"advisory":"PAN-SA-2016-0019","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.9 and later; PAN-OS 7.1.4 and later","supportingMedia":{"value":"PAN-OS 5.0.20 and later; PAN-OS 5.1.13 and later; PAN-OS 6.0.15 and later; PAN-OS 6.1.13 and later; PAN-OS 7.0.9 and later; PAN-OS 7.1.4 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2016-0016","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-07-15T00:00:00.000Z","dateReserved":"2016-07-15T00:00:00.000Z"},"containers":{"cna":{"title":"Web Interface Privilege Escalation","datePublic":"2016-07-15T00:00:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"Palo Alto Networks Panorama administrators have the ability to assign predefined permissions to users created on PAN-OS. A read-only user with CLI access could elevate web interface privileges. (Ref. 88191)\nA user could elevate privileges by impersonating another user with higher permissions.\nThis issue affects PAN-OS 5.0.18 and earlier; PAN-OS 5.1.11 and earlier; PAN-OS 6.0.13 and earlier; PAN-OS 6.1.10 and earlier; PAN-OS 7.0.4 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks Panorama administrators have the ability to assign predefined permissions to users created on PAN-OS. A read-only user with CLI access could elevate web interface privileges. (Ref. 88191)\nA user could elevate privileges by impersonating another user with higher permissions.\nThis issue affects PAN-OS 5.0.18 and earlier; PAN-OS 5.1.11 and earlier; PAN-OS 6.0.13 and earlier; PAN-OS 6.1.10 and earlier; PAN-OS 7.0.4 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.18","versionType":"custom","changes":[{"at":"5.0.19","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.11","versionType":"custom","changes":[{"at":"5.1.12","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.13","versionType":"custom","changes":[{"at":"6.0.14","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.10","versionType":"custom","changes":[{"at":"6.1.11","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.4","versionType":"custom","changes":[{"at":"7.0.5","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2016-0016"}],"credits":[{"lang":"en","value":"John Perry, the Boeing Company"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Web Interface Privilege Escalation"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["88191"],"advisory":"PAN-SA-2016-0016","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Customers running versions of Panorama affected by this issue could create a custom admin role that does not allow CLI access and to avoid any privilege escalation. Firewalls running PAN-OS are not affected by this issue.","supportingMedia":{"value":"Customers running versions of Panorama affected by this issue could create a custom admin role that does not allow CLI access and to avoid any privilege escalation. Firewalls running PAN-OS are not affected by this issue.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.19 and later; PAN-OS 5.1.12 and later; PAN-OS 6.0.14 and later; PAN-OS 6.1.11 and later; PAN-OS 7.0.5 and later","supportingMedia":{"value":"PAN-OS 5.0.19 and later; PAN-OS 5.1.12 and later; PAN-OS 6.0.14 and later; PAN-OS 6.1.11 and later; PAN-OS 7.0.5 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-1712","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-07-13T18:30:00.000Z","dateReserved":"2016-07-13T18:30:00.000Z"},"containers":{"cna":{"title":"Local privilege escalation","datePublic":"2016-07-13T18:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:44","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"Palo Alto Networks firewalls do not properly sanitize the root_reboot local invocation which can potentially allow executing code with higher privileges (Ref. 92293) (CVE-2016-1712).\nExploitation of this privilege escalation is restricted to local users. Potential attackers would have to first obtain a shell on the device before they could attempt to escalate privileges through this vulnerability.\nThis issue affects PAN-OS 5.0.18 and earlier; PAN-OS 5.1.11 and earlier; PAN-OS 6.0.13 and earlier; PAN-OS 6.1.11 and earlier; PAN-OS 7.0.7 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks firewalls do not properly sanitize the root_reboot local invocation which can potentially allow executing code with higher privileges (Ref. 92293) (CVE-2016-1712).\nExploitation of this privilege escalation is restricted to local users. Potential attackers would have to first obtain a shell on the device before they could attempt to escalate privileges through this vulnerability.\nThis issue affects PAN-OS 5.0.18 and earlier; PAN-OS 5.1.11 and earlier; PAN-OS 6.0.13 and earlier; PAN-OS 6.1.11 and earlier; PAN-OS 7.0.7 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.11","PAN-OS 6.1.10","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.13","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.18","versionType":"custom","changes":[{"at":"5.0.19","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.11","versionType":"custom","changes":[{"at":"5.1.12","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.13","versionType":"custom","changes":[{"at":"6.0.14","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.11","versionType":"custom","changes":[{"at":"6.1.12","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.7","versionType":"custom","changes":[{"at":"7.0.8","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-1712"}],"credits":[{"lang":"en","value":"Kasif Dekel, CheckPoint Security Team"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["92293"],"advisory":"PAN-SA-2016-0012","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"N/A","supportingMedia":{"value":"N/A","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 5.0.19 and later; PAN-OS 5.1.12 and later; PAN-OS 6.0.14 and later; PAN-OS 6.1.12 and later; PAN-OS 7.0.8 and later","supportingMedia":{"value":"PAN-OS 5.0.19 and later; PAN-OS 5.1.12 and later; PAN-OS 6.0.14 and later; PAN-OS 6.1.12 and later; PAN-OS 7.0.8 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2016-0011","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-07-12T17:30:00.000Z","dateReserved":"2016-07-12T17:30:00.000Z"},"containers":{"cna":{"title":"OpenSSH vulnerabilities","datePublic":"2016-07-12T17:30:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"OpenSSH contains two vulnerabilities (CVE-2016-0777 and CVE-2016-0778) affecting the SSH client roaming feature when connecting to a malicious server. Exploitation of this issue can leak portions of memory from the SSH client process. (Ref # 90508)\nThe Palo Alto Networks firewall outbound SSH client offers only the user/password authentication scheme and, therefore, does not expose a potential SSH private key.\nThis issue affects PAN-OS 7.0.9 and earlier; PAN-OS 7.1.2 and earlier","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>OpenSSH contains two vulnerabilities (CVE-2016-0777 and CVE-2016-0778) affecting the SSH client roaming feature when connecting to a malicious server. Exploitation of this issue can leak portions of memory from the SSH client process. (Ref # 90508)\nThe Palo Alto Networks firewall outbound SSH client offers only the user/password authentication scheme and, therefore, does not expose a potential SSH private key.\nThis issue affects PAN-OS 7.0.9 and earlier; PAN-OS 7.1.2 and earlier</pre>"}]}],"x_affectedList":["PAN-OS 7.1.2","PAN-OS 7.1.1","PAN-OS 7.1.0","PAN-OS 7.1","PAN-OS 7.0.9","PAN-OS 7.0.8","PAN-OS 7.0.7","PAN-OS 7.0.6","PAN-OS 7.0.5-h2","PAN-OS 7.0.5-h1","PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.9","versionType":"custom","changes":[{"at":"7.0.10","status":"unaffected"}]},{"version":"7.1","status":"affected","lessThanOrEqual":"7.1.2","versionType":"custom","changes":[{"at":"7.1.3","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2016-0011"}],"metrics":[{"cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["90508"],"advisory":"PAN-SA-2016-0011","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"These vulnerabilities affect PAN-OS only when initiating a connection to a malicious server. Palo Alto Networks discourages establishing SSH sessions to unknown or untrusted servers.","supportingMedia":{"value":"These vulnerabilities affect PAN-OS only when initiating a connection to a malicious server. Palo Alto Networks discourages establishing SSH sessions to unknown or untrusted servers.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.0.10 and later; PAN-OS 7.1.3 and later","supportingMedia":{"value":"PAN-OS 7.0.10 and later; PAN-OS 7.1.3 and later","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-3657","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-02-24T18:30:00.000Z","dateReserved":"2016-02-24T18:30:00.000Z"},"containers":{"cna":{"title":"Unauthenticated Buffer Overflow in GlobalProtect/SSL VPN Web Interface","datePublic":"2016-02-24T18:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:44","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"When a PAN-OS device is configured as a GlobalProtect portal, a vulnerability exists where an improper handling of a buffer involved in the processing of SSL VPN requests can result in device crash and possible remote code execution.  (Ref. #89752) (CVE-2016-3657)\nAn attacker with network access to the vulnerable GlobalProtect portal may be able to perform a denial-of-service (DoS) attack on the device, and may be able to perform remote code execution on the affected device.\nThis issue affects PAN-OS releases 5.0.17 and prior; 6.0.12 and prior; 6.1.9 and prior; 7.0.4 and prior","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>When a PAN-OS device is configured as a GlobalProtect portal, a vulnerability exists where an improper handling of a buffer involved in the processing of SSL VPN requests can result in device crash and possible remote code execution.  (Ref. #89752) (CVE-2016-3657)\nAn attacker with network access to the vulnerable GlobalProtect portal may be able to perform a denial-of-service (DoS) attack on the device, and may be able to perform remote code execution on the affected device.\nThis issue affects PAN-OS releases 5.0.17 and prior; 6.0.12 and prior; 6.1.9 and prior; 7.0.4 and prior</pre>"}]}],"x_affectedList":["PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.17","versionType":"custom","changes":[{"at":"5.0.18","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.12","versionType":"custom","changes":[{"at":"6.0.13","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.9","versionType":"custom","changes":[{"at":"6.1.10","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.4","versionType":"custom","changes":[{"at":"7.0.5","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-3657"}],"credits":[{"lang":"en","value":"Felix Wilhelm, ERNW Research"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["89752"],"advisory":"PAN-SA-2016-0005","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Emergency content update 563 contains an IPS signature (#38902) that can be used as an interim mitigation to protect PAN-OS devices until the device software is upgraded.  Note that signatures 38902 must be applied to a firewall rule securing traffic destined for the GlobalProtect portal.  The GlobalProtect portal should only be present once per installation, limiting the organization’s exposure to this issue. This issue can be further mitigated by disabling the affected optional “login page” in the GlobalProtect portal configuration, and distribution of the client side software may be performed through alternative means such as GPO or network share while the PAN-OS patch is applied.","supportingMedia":{"value":"Emergency content update 563 contains an IPS signature (#38902) that can be used as an interim mitigation to protect PAN-OS devices until the device software is upgraded.  Note that signatures 38902 must be applied to a firewall rule securing traffic destined for the GlobalProtect portal.  The GlobalProtect portal should only be present once per installation, limiting the organization’s exposure to this issue. This issue can be further mitigated by disabling the affected optional “login page” in the GlobalProtect portal configuration, and distribution of the client side software may be performed through alternative means such as GPO or network share while the PAN-OS patch is applied.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS releases 5.0.18 and newer; 6.0.13 and newer; 6.1.10 and newer; 7.0.5 and newer","supportingMedia":{"value":"PAN-OS releases 5.0.18 and newer; 6.0.13 and newer; 6.1.10 and newer; 7.0.5 and newer","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-3656","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-02-24T18:30:00.000Z","dateReserved":"2016-02-24T18:30:00.000Z"},"containers":{"cna":{"title":"Unauthenticated Stack Exhaustion in GlobalProtect/SSL VPN Web Interface","datePublic":"2016-02-24T18:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:44","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"When a PAN-OS device is configured as a GlobalProtect web portal, a specially crafted request to the portal could result in a crash of the service.  (Ref. #89750) (CVE-2016-3656)\nThis issue can be exploited remotely by an attacker with network access to the GlobalProtect portal in order to cause a denial-of-service (DoS) via a service crash.\nThis issue affects PAN-OS releases 5.0.17 and prior; 6.0.12 and prior; 6.1.9 and prior; 7.0.5 and prior","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>When a PAN-OS device is configured as a GlobalProtect web portal, a specially crafted request to the portal could result in a crash of the service.  (Ref. #89750) (CVE-2016-3656)\nThis issue can be exploited remotely by an attacker with network access to the GlobalProtect portal in order to cause a denial-of-service (DoS) via a service crash.\nThis issue affects PAN-OS releases 5.0.17 and prior; 6.0.12 and prior; 6.1.9 and prior; 7.0.5 and prior</pre>"}]}],"x_affectedList":["PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.17","versionType":"custom","changes":[{"at":"5.0.18","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.12","versionType":"custom","changes":[{"at":"6.0.13","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.9","versionType":"custom","changes":[{"at":"6.1.10","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.5","versionType":"custom","changes":[{"at":"7.0.5H2","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-3656"}],"credits":[{"lang":"en","value":"Felix Wilhelm, ERNW Research"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer","cweId":"CWE-119"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["89750"],"advisory":"PAN-SA-2016-0004","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Emergency content update 563 contains an IPS signature (#38903) that can be used as an interim mitigation to protect PAN-OS devices until the device software is upgraded.  Note that signatures 38903 must be applied to a firewall rule securing traffic destined for the GlobalProtect portal.  The GlobalProtect portal should only be present once per installation, limiting the organization’s exposure to this issue. This issue can be further mitigated by disabling the affected optional “login page” in the GlobalProtect portal configuration, and distribution of the client side software may be performed through alternative means such as GPO or network share while the PAN-OS patch is applied.","supportingMedia":{"value":"Emergency content update 563 contains an IPS signature (#38903) that can be used as an interim mitigation to protect PAN-OS devices until the device software is upgraded.  Note that signatures 38903 must be applied to a firewall rule securing traffic destined for the GlobalProtect portal.  The GlobalProtect portal should only be present once per installation, limiting the organization’s exposure to this issue. This issue can be further mitigated by disabling the affected optional “login page” in the GlobalProtect portal configuration, and distribution of the client side software may be performed through alternative means such as GPO or network share while the PAN-OS patch is applied.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS releases 5.0.18 and newer; 6.0.13 and newer; 6.1.10 and newer; 7.0.5H2 and newer","supportingMedia":{"value":"PAN-OS releases 5.0.18 and newer; 6.0.13 and newer; 6.1.10 and newer; 7.0.5H2 and newer","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-3655","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-02-24T18:30:00.000Z","dateReserved":"2016-02-24T18:30:00.000Z"},"containers":{"cna":{"title":"Unauthenticated Command Injection in Management Web Interface","datePublic":"2016-02-24T18:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:44","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"Palo Alto Networks PAN-OS implements an API to enable programmatic device configuration and administration of the device. An issue was identified where the management API incorrectly parses input to a specific API call, leading to execution of arbitrary OS commands without authentication via the management interface. (Ref. #89717) (CVE-2016-3655)\nThis issue can be exploited remotely by an unauthenticated user with network access to the device management web-based API\nThis issue affects PAN-OS releases 5.0.17 and prior; 6.0.12 and prior; 6.1.9 and prior; 7.0.4 and prior","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks PAN-OS implements an API to enable programmatic device configuration and administration of the device. An issue was identified where the management API incorrectly parses input to a specific API call, leading to execution of arbitrary OS commands without authentication via the management interface. (Ref. #89717) (CVE-2016-3655)\nThis issue can be exploited remotely by an unauthenticated user with network access to the device management web-based API\nThis issue affects PAN-OS releases 5.0.17 and prior; 6.0.12 and prior; 6.1.9 and prior; 7.0.4 and prior</pre>"}]}],"x_affectedList":["PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.17","versionType":"custom","changes":[{"at":"5.0.18","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.12","versionType":"custom","changes":[{"at":"6.0.13","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.9","versionType":"custom","changes":[{"at":"6.1.10","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.4","versionType":"custom","changes":[{"at":"7.0.5","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-3655"}],"credits":[{"lang":"en","value":"Felix Wilhelm, ERNW Research"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["89717"],"advisory":"PAN-SA-2016-0003","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Emergency content update 563 contains an IPS signature (#38904) that can be used as an interim mitigation to protect PAN-OS devices until the device software is upgraded.  Note that signatures 38904 must be applied to a firewall rule securing traffic destined for the device management web interface, and decryption must be applied. This issue is further mitigated by following security appliance management best practices, requiring that network access to the management interfaces be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"Emergency content update 563 contains an IPS signature (#38904) that can be used as an interim mitigation to protect PAN-OS devices until the device software is upgraded.  Note that signatures 38904 must be applied to a firewall rule securing traffic destined for the device management web interface, and decryption must be applied. This issue is further mitigated by following security appliance management best practices, requiring that network access to the management interfaces be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS releases 5.0.18 and newer; 6.0.13 and newer; 6.1.10 and newer; 7.0.5 and newer","supportingMedia":{"value":"PAN-OS releases 5.0.18 and newer; 6.0.13 and newer; 6.1.10 and newer; 7.0.5 and newer","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-3654","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2016-02-24T18:30:00.000Z","dateReserved":"2016-02-24T18:30:00.000Z"},"containers":{"cna":{"title":"Command Injection in Command Line Interface","datePublic":"2016-02-24T18:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:44","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"Palo Alto Networks firewalls implement a command line interface for interactive configuration through a serial interface or a remote SSH session. An issue was identified that can cause incorrect parsing of a specific SSH command parameter, leading to arbitrary command execution on the OS level. This vulnerability requires successful authentication but can be used to execute OS commands with root privileges if the logged on user has administrative privileges. (Ref #89706) (CVE-2016-3654)\nThis vulnerability is exploitable only by authenticated administrators that are granted access to the device management CLI.\nThis issue affects PAN-OS releases 5.0.17 and prior; 5.1.10 and prior; 6.0.12 and prior; 6.1.9 and prior; 7.0.5 and prior","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Palo Alto Networks firewalls implement a command line interface for interactive configuration through a serial interface or a remote SSH session. An issue was identified that can cause incorrect parsing of a specific SSH command parameter, leading to arbitrary command execution on the OS level. This vulnerability requires successful authentication but can be used to execute OS commands with root privileges if the logged on user has administrative privileges. (Ref #89706) (CVE-2016-3654)\nThis vulnerability is exploitable only by authenticated administrators that are granted access to the device management CLI.\nThis issue affects PAN-OS releases 5.0.17 and prior; 5.1.10 and prior; 6.0.12 and prior; 6.1.9 and prior; 7.0.5 and prior</pre>"}]}],"x_affectedList":["PAN-OS 7.0.5","PAN-OS 7.0.4","PAN-OS 7.0.3","PAN-OS 7.0.2","PAN-OS 7.0.1","PAN-OS 7.0","PAN-OS 6.1.9","PAN-OS 6.1.8","PAN-OS 6.1.7","PAN-OS 6.1.6","PAN-OS 6.1.5","PAN-OS 6.1.4","PAN-OS 6.1.3","PAN-OS 6.1.2","PAN-OS 6.1.1","PAN-OS 6.1.0","PAN-OS 6.1","PAN-OS 6.0.12","PAN-OS 6.0.11","PAN-OS 6.0.10","PAN-OS 6.0.9","PAN-OS 6.0.8","PAN-OS 6.0.7","PAN-OS 6.0.6","PAN-OS 6.0.5-h3","PAN-OS 6.0.5-h2","PAN-OS 6.0.5-h1","PAN-OS 6.0.5","PAN-OS 6.0.4","PAN-OS 6.0.3","PAN-OS 6.0.2","PAN-OS 6.0.1","PAN-OS 6.0.0","PAN-OS 6.0","PAN-OS 5.1","PAN-OS 5.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"5.0","status":"affected","lessThanOrEqual":"5.0.17","versionType":"custom","changes":[{"at":"5.0.18","status":"unaffected"}]},{"version":"5.1","status":"affected","lessThanOrEqual":"5.1.10","versionType":"custom","changes":[{"at":"5.1.11","status":"unaffected"}]},{"version":"6.0","status":"affected","lessThanOrEqual":"6.0.12","versionType":"custom","changes":[{"at":"6.0.13","status":"unaffected"}]},{"version":"6.1","status":"affected","lessThanOrEqual":"6.1.9","versionType":"custom","changes":[{"at":"6.1.10","status":"unaffected"}]},{"version":"7.0","status":"affected","lessThanOrEqual":"7.0.5","versionType":"custom","changes":[{"at":"7.0.5H2","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2016-3654"}],"credits":[{"lang":"en","value":"Felix Wilhelm, ERNW Research"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["89706"],"advisory":"PAN-SA-2016-0002","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue only affects authenticated device users and Panorama users with CLI access enabled. Deployments making use of Role-Based Access Control (RBAC) do not offer CLI access by default. As a best practice, CLI access should be carefully considered, and granted only when necessary to privileged administrators.","supportingMedia":{"value":"This issue only affects authenticated device users and Panorama users with CLI access enabled. Deployments making use of Role-Based Access Control (RBAC) do not offer CLI access by default. As a best practice, CLI access should be carefully considered, and granted only when necessary to privileged administrators.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS releases 5.0.18 and newer; 5.1.11 and newer; 6.0.13 and newer; 6.1.10 and newer; 7.0.5H2 and newer","supportingMedia":{"value":"PAN-OS releases 5.0.18 and newer; 5.1.11 and newer; 6.0.13 and newer; 6.1.10 and newer; 7.0.5H2 and newer","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"PAN-SA-2015-0005","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2015-07-24T07:00:00.000Z","dateReserved":"2015-07-24T07:00:00.000Z"},"containers":{"cna":{"title":"Device management authentication bypass","datePublic":"2015-07-24T07:00:00.000Z","providerMetadata":{"orgId":"Not found","shortName":"Not found","dateUpdated":"2024-11-20T00:00:00"},"descriptions":[{"lang":"en","value":"Devices running PAN-OS 7.0.0 (including Panorama) that are configured to use LDAP for captive portal or device management authentication do not properly perform authentication against the LDAP server in specific cases, leading to an authentication bypass.  There is no issue if you are using Radius or local authentication instead of LDAP or prior versions of PAN-OS; nor does this affect authentication attempts from GlobalProtect clients.\nThis vulnerability can lead to authentication bypass for captive portal or device management login attempts.\nThis issue only affects PAN-OS 7.0.0","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>Devices running PAN-OS 7.0.0 (including Panorama) that are configured to use LDAP for captive portal or device management authentication do not properly perform authentication against the LDAP server in specific cases, leading to an authentication bypass.  There is no issue if you are using Radius or local authentication instead of LDAP or prior versions of PAN-OS; nor does this affect authentication attempts from GlobalProtect clients.\nThis vulnerability can lead to authentication bypass for captive portal or device management login attempts.\nThis issue only affects PAN-OS 7.0.0</pre>"}]}],"x_affectedList":["PAN-OS 7.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"7.0.0","status":"affected"},{"version":"7.0.1","status":"unaffected","lessThan":"7.0*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/PAN-SA-2015-0005"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Device management authentication bypass"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"PAN-SA-2015-0005","discovery":"INTERNAL"},"workarounds":[{"lang":"en","value":"This issue only affects devices and Panorama configured to use LDAP for captive portal or device management authentication.  This issue is strongly mitigated by following security appliance management best practices, requiring that network access to the management interfaces be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue only affects devices and Panorama configured to use LDAP for captive portal or device management authentication.  This issue is strongly mitigated by following security appliance management best practices, requiring that network access to the management interfaces be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 7.0.1 and subsequent.","supportingMedia":{"value":"PAN-OS 7.0.1 and subsequent.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2014-0224","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2014-06-09T07:00:00.000Z","dateReserved":"2014-06-09T07:00:00.000Z"},"containers":{"cna":{"title":"OpenSSL Man-in-the-middle vulnerability","datePublic":"2014-06-09T07:00:00.000Z","providerMetadata":{"dateUpdated":"2021-11-05T16:47:29","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"descriptions":[{"lang":"en","value":"The Palo Alto Networks product security engineering team has completed analysis of our products' exposure to the vulnerabilities described in the OpenSSL Security Advisory dated June 5th, 2014.  Of the 7 CVEs highlighted in the advisory, only CVE-2014-0224 is relevant to our software.  The remaining vulnerabilities to not apply because we do not use or support use of Datagram Transport Layer Security (DTLS), nor do we use anonymous Elliptic curve Diffie-Hellman (ECDH) on our software clients.  Our exposure to CVE-2014-0224 is limited because both client and server must be vulnerable.  While our client-side is vulnerable, the server-side is not.  This limits exposure to potential man-in-the-middle (MITM) attacks only to sessions our software initiates with servers outside of our control that are running a vulnerable version of OpenSSL (OpenSSL 1.0.1 and 1.0.2-beta1).  As such, services that may be vulnerable to MITM depending on customer configuration include: firewall services using SSL configured to use a proxy running a vulnerable OpenSSL server, syslog over SSL to a syslog server running a  vulnerable OpenSSL server, and the User-ID agent connecting to a directory server running a vulnerable OpenSSL server.  GlobalProtect is not vulnerable because our portal and gateway servers are not vulnerable.\n\nIn response to these issues, Palo Alto Networks is including a patch to the OpenSSL software used across our products with the next scheduled maintenance release for all supported versions of PAN-OS / Panorama, User-ID agent, and GlobalProtect.  Users can mitigate their exposure by ensuring that any servers described above are not running vulnerable versions of OpenSSL (1.0.1 and 1.0.2-beta1).  If customers have any further questions related to product exposure to this OpenSSL security advisory, they can contact support.\nThis issue requires an attacker to be able to act as a man-in-the-middle to certain firewall services, such as syslog, User-ID agent, or services between PAN-OS / Panorama and a proxy.  The issue further requires that the servers that PAN-OS / Panorama initiates connections with to perform these services are also vulnerable to CVE-2014-0224.\n\nGlobalProtect VPN is not vulnerable, as the PAN-OS Portal and Gateway servers are not vulnerable.\nThis issue affects All versions of PAN-OS / Panorama.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>The Palo Alto Networks product security engineering team has completed analysis of our products' exposure to the vulnerabilities described in the OpenSSL Security Advisory dated June 5th, 2014.  Of the 7 CVEs highlighted in the advisory, only CVE-2014-0224 is relevant to our software.  The remaining vulnerabilities to not apply because we do not use or support use of Datagram Transport Layer Security (DTLS), nor do we use anonymous Elliptic curve Diffie-Hellman (ECDH) on our software clients.  Our exposure to CVE-2014-0224 is limited because both client and server must be vulnerable.  While our client-side is vulnerable, the server-side is not.  This limits exposure to potential man-in-the-middle (MITM) attacks only to sessions our software initiates with servers outside of our control that are running a vulnerable version of OpenSSL (OpenSSL 1.0.1 and 1.0.2-beta1).  As such, services that may be vulnerable to MITM depending on customer configuration include: firewall services using SSL configured to use a proxy running a vulnerable OpenSSL server, syslog over SSL to a syslog server running a  vulnerable OpenSSL server, and the User-ID agent connecting to a directory server running a vulnerable OpenSSL server.  GlobalProtect is not vulnerable because our portal and gateway servers are not vulnerable.\n\nIn response to these issues, Palo Alto Networks is including a patch to the OpenSSL software used across our products with the next scheduled maintenance release for all supported versions of PAN-OS / Panorama, User-ID agent, and GlobalProtect.  Users can mitigate their exposure by ensuring that any servers described above are not running vulnerable versions of OpenSSL (1.0.1 and 1.0.2-beta1).  If customers have any further questions related to product exposure to this OpenSSL security advisory, they can contact support.\nThis issue requires an attacker to be able to act as a man-in-the-middle to certain firewall services, such as syslog, User-ID agent, or services between PAN-OS / Panorama and a proxy.  The issue further requires that the servers that PAN-OS / Panorama initiates connections with to perform these services are also vulnerable to CVE-2014-0224.\n\nGlobalProtect VPN is not vulnerable, as the PAN-OS Portal and Gateway servers are not vulnerable.\nThis issue affects All versions of PAN-OS / Panorama.</pre>"}]}],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"6.0.4","status":"unaffected","lessThan":"6.0*","versionType":"custom"},{"version":"5.1.9","status":"unaffected","lessThan":"5.1*","versionType":"custom"},{"version":"5.0.14.","status":"unaffected","lessThan":"5.0*","versionType":"custom"}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2014-0224"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-310","cweId":"CWE-310"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"PAN-SA-2014-0003","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"Services running over SSL from PAN-OS / Panorama to 3rd party servers (i.e. syslog server, directory services server) are only vulnerable to a possible MITM attack if the server is also vulnerable to CVE-2014-0224.  Ensure that the 3rd party service's server is not running a vulnerable version of OpenSSL (1.0.1 and 1.0.2-beta1).","supportingMedia":{"value":"Services running over SSL from PAN-OS / Panorama to 3rd party servers (i.e. syslog server, directory services server) are only vulnerable to a possible MITM attack if the server is also vulnerable to CVE-2014-0224.  Ensure that the 3rd party service's server is not running a vulnerable version of OpenSSL (1.0.1 and 1.0.2-beta1).","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 6.0.4; PAN-OS 5.1.9; PAN-OS 5.0.14.","supportingMedia":{"value":"PAN-OS 6.0.4; PAN-OS 5.1.9; PAN-OS 5.0.14.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6602","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #30122)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.3 and earlier; PAN-OS 3.1.9 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #30122)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.3 and earlier; PAN-OS 3.1.9 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 4.0","PAN-OS 3.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.3","versionType":"custom","changes":[{"at":"4.0.4","status":"unaffected"}]},{"version":"3.1","status":"affected","lessThanOrEqual":"3.1.9","versionType":"custom","changes":[{"at":"3.1.10","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6602"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["30122"],"advisory":"PAN-SA-2012-0013","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.0.4 and later; PAN-OS 3.1.10 and later.","supportingMedia":{"value":"PAN-OS 4.0.4 and later; PAN-OS 3.1.10 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6594","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #34299)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.  The attacker must still be an authenticated administrator of the device.\nThis issue affects PAN-OS 4.1.0 and earlier; PAN-OS 4.0.7 and earlier; PAN-OS 3.1.10 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #34299)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.  The attacker must still be an authenticated administrator of the device.\nThis issue affects PAN-OS 4.1.0 and earlier; PAN-OS 4.0.7 and earlier; PAN-OS 3.1.10 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 4.1","PAN-OS 4.0","PAN-OS 3.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.1","status":"affected","lessThanOrEqual":"4.1.0","versionType":"custom","changes":[{"at":"4.1.1","status":"unaffected"}]},{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.7","versionType":"custom","changes":[{"at":"4.0.8","status":"unaffected"}]},{"version":"3.1","status":"affected","lessThanOrEqual":"3.1.10","versionType":"custom","changes":[{"at":"3.1.11","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6594"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["34299"],"advisory":"PAN-SA-2012-0005","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.1.1 and later; PAN-OS 4.0.8 and later; PAN-OS 3.1.11 and later.","supportingMedia":{"value":"PAN-OS 4.1.1 and later; PAN-OS 4.0.8 and later; PAN-OS 3.1.11 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6595","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #34595)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.  The attacker must still be an authenticated administrator of the device.\nThis issue affects PAN-OS 4.1.1 and earlier; PAN-OS 4.0.8 and earlier;  PAN-OS 3.0.x is not affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #34595)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.  The attacker must still be an authenticated administrator of the device.\nThis issue affects PAN-OS 4.1.1 and earlier; PAN-OS 4.0.8 and earlier;  PAN-OS 3.0.x is not affected.</pre>"}]}],"x_affectedList":["PAN-OS 4.1","PAN-OS 4.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.1","status":"affected","lessThanOrEqual":"4.1.1","versionType":"custom","changes":[{"at":"4.1.2","status":"unaffected"}]},{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.8","versionType":"custom","changes":[{"at":"4.0.9","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6595"}],"metrics":[{"cvssV4_0":{"version":"4.0","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"HIGH","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","baseSeverity":"HIGH","baseScore":8.4,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"vulnogram 0.1.0-rc1"},"source":{"defect":["34595"],"advisory":"PAN-SA-2012-0006","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.1.2 and later. PAN-OS 4.0.9 and later.","supportingMedia":{"value":"PAN-OS 4.1.2 and later. PAN-OS 4.0.9 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6605","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can execute arbitrary code as root using the device management command line interface.  (Ref #34896)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.8 and earlier; PAN-OS 3.1.10 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can execute arbitrary code as root using the device management command line interface.  (Ref #34896)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.8 and earlier; PAN-OS 3.1.10 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 4.0","PAN-OS 3.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.8","versionType":"custom","changes":[{"at":"4.0.9","status":"unaffected"}]},{"version":"3.1","status":"affected","lessThanOrEqual":"3.1.10","versionType":"custom","changes":[{"at":"3.1.10","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6605"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["34896"],"advisory":"PAN-SA-2012-0016","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.0.9 and later; PAN-OS 3.1.10 and later.","supportingMedia":{"value":"PAN-OS 4.0.9 and later; PAN-OS 3.1.10 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6601","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an unauthenticated user can execute arbitrary code as root on the device.  (Ref #36983)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.1.3 and earlier; PAN-OS 4.0.9 and earlier; PAN-OS 3.1.11 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an unauthenticated user can execute arbitrary code as root on the device.  (Ref #36983)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.1.3 and earlier; PAN-OS 4.0.9 and earlier; PAN-OS 3.1.11 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 4.1","PAN-OS 4.0","PAN-OS 3.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.1","status":"affected","lessThanOrEqual":"4.1.3","versionType":"custom","changes":[{"at":"4.1.4","status":"unaffected"}]},{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.9","versionType":"custom","changes":[{"at":"4.0.10","status":"unaffected"}]},{"version":"3.1","status":"affected","lessThanOrEqual":"3.1.11","versionType":"custom","changes":[{"at":"3.1.12","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6601"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["36983"],"advisory":"PAN-SA-2012-0012","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.1.4 and later; PAN-OS 4.0.10 and later; PAN-OS 3.1.12 and later.","supportingMedia":{"value":"PAN-OS 4.1.4 and later; PAN-OS 4.0.10 and later; PAN-OS 3.1.12 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6604","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can execute arbitrary code as root using the device management command line interface.  (Ref #35249)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.8 and earlier; PAN-OS 3.1.10 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can execute arbitrary code as root using the device management command line interface.  (Ref #35249)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.8 and earlier; PAN-OS 3.1.10 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 4.0","PAN-OS 3.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.8","versionType":"custom","changes":[{"at":"4.0.9","status":"unaffected"}]},{"version":"3.1","status":"affected","lessThanOrEqual":"3.1.10","versionType":"custom","changes":[{"at":"3.1.10","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6604"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["35249"],"advisory":"PAN-SA-2012-0015","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.0.9 and later; PAN-OS 3.1.10 and later.","supportingMedia":{"value":"PAN-OS 4.0.9 and later; PAN-OS 3.1.10 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6603","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Credential Bypass Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an unauthenticated user can get administrator access to the device via the web management UI without supplying credentials.  (Ref #37034)\nThis vulnerability can result in total compromise of the device.\nThis issue affects PAN-OS 4.1.3 and earlier; PAN-OS 4.0.9 and earlier; PAN-OS 3.1.11 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an unauthenticated user can get administrator access to the device via the web management UI without supplying credentials.  (Ref #37034)\nThis vulnerability can result in total compromise of the device.\nThis issue affects PAN-OS 4.1.3 and earlier; PAN-OS 4.0.9 and earlier; PAN-OS 3.1.11 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 4.1","PAN-OS 4.0","PAN-OS 3.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.1","status":"affected","lessThanOrEqual":"4.1.3","versionType":"custom","changes":[{"at":"4.1.4","status":"unaffected"}]},{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.9","versionType":"custom","changes":[{"at":"4.0.10","status":"unaffected"}]},{"version":"3.1","status":"affected","lessThanOrEqual":"3.1.11","versionType":"custom","changes":[{"at":"3.1.12","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6603"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-287 Improper Authentication","cweId":"CWE-287"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["37034"],"advisory":"PAN-SA-2012-0014","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.1.4 and later; PAN-OS 4.0.10 and later; PAN-OS 3.1.12 and later.","supportingMedia":{"value":"PAN-OS 4.1.4 and later; PAN-OS 4.0.10 and later; PAN-OS 3.1.12 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6599","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #33476)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.1.0 and earlier; PAN-OS 4.0.7 and earlier; PAN-OS 3.0.x is not affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #33476)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.1.0 and earlier; PAN-OS 4.0.7 and earlier; PAN-OS 3.0.x is not affected.</pre>"}]}],"x_affectedList":["PAN-OS 4.1","PAN-OS 4.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.1","status":"affected","lessThanOrEqual":"4.1.0","versionType":"custom","changes":[{"at":"4.1.1","status":"unaffected"}]},{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.7","versionType":"custom","changes":[{"at":"4.0.8","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6599"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["33476"],"advisory":"PAN-SA-2012-0010","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.1.1 and later; PAN-OS 4.0.8 and later.","supportingMedia":{"value":"PAN-OS 4.1.1 and later; PAN-OS 4.0.8 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6598","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #33080)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.7 and earlier;  PAN-OS 3.0.x is not affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #33080)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.7 and earlier;  PAN-OS 3.0.x is not affected.</pre>"}]}],"x_affectedList":["PAN-OS 4.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.7","versionType":"custom","changes":[{"at":"4.0.8","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6598"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["33080"],"advisory":"PAN-SA-2012-0009","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.0.8 and later.","supportingMedia":{"value":"PAN-OS 4.0.8 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6600","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #34502)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.1.1 and earlier; PAN-OS 4.0.8 and earlier; PAN-OS 3.0.x is not affected.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #34502)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.1.1 and earlier; PAN-OS 4.0.8 and earlier; PAN-OS 3.0.x is not affected.</pre>"}]}],"x_affectedList":["PAN-OS 4.1","PAN-OS 4.0"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.1","status":"affected","lessThanOrEqual":"4.1.1","versionType":"custom","changes":[{"at":"4.1.2","status":"unaffected"}]},{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.8","versionType":"custom","changes":[{"at":"4.0.9","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6600"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["34502"],"advisory":"PAN-SA-2012-0011","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.1.2 and later; PAN-OS 4.0.9 and later.","supportingMedia":{"value":"PAN-OS 4.1.2 and later; PAN-OS 4.0.9 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6591","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #31116)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.  The attacker must still be an authenticated administrator of the device.\nThis issue affects PAN-OS 4.0.4 and earlier; PAN-OS 3.1.9 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an authenticated user can inject arbitrary shell commands using the device management command line interface.  (Ref #31116)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.  The attacker must still be an authenticated administrator of the device.\nThis issue affects PAN-OS 4.0.4 and earlier; PAN-OS 3.1.9 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 4.0","PAN-OS 3.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.4","versionType":"custom","changes":[{"at":"4.0.5","status":"unaffected"}]},{"version":"3.1","status":"affected","lessThanOrEqual":"3.1.9","versionType":"custom","changes":[{"at":"3.1.10","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6591"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["31116"],"advisory":"PAN-SA-2012-0002","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.0.5 and later; PAN-OS 3.1.10 and later.","supportingMedia":{"value":"PAN-OS 4.0.5 and later; PAN-OS 3.1.10 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6593","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an unauthenticated user can inject commands as root on the device.  (Ref #30088)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.3 and earlier; PAN-OS 3.1.9 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an unauthenticated user can inject commands as root on the device.  (Ref #30088)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.3 and earlier; PAN-OS 3.1.9 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 4.0","PAN-OS 3.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.3","versionType":"custom","changes":[{"at":"4.0.4","status":"unaffected"}]},{"version":"3.1","status":"affected","lessThanOrEqual":"3.1.9","versionType":"custom","changes":[{"at":"3.1.10","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6593"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["30088"],"advisory":"PAN-SA-2012-0004","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.0.4 and later; PAN-OS 3.1.10 and later.","supportingMedia":{"value":"PAN-OS 4.0.4 and later; PAN-OS 3.1.10 and later.","type":"text/html","base64":false}}],"timeline":[]}}},{"dataType":"CVE_RECORD","dataVersion":"5.0","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-6592","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","datePublished":"2012-04-27T23:30:00.000Z","dateReserved":"2012-04-27T23:30:00.000Z"},"containers":{"cna":{"title":"Command Injection Vulnerability","datePublic":"2012-04-27T23:30:00.000Z","providerMetadata":{"dateUpdated":"2020-02-17T16:03:43","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"descriptions":[{"lang":"en","value":"A vulnerability exists whereby an unauthenticated user can inject commands as root on the device.  (Ref #31091)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.4 and earlier; PAN-OS 3.1.9 and earlier.","supportingMedia":[{"type":"text/html","base64":"false","value":"<pre>A vulnerability exists whereby an unauthenticated user can inject commands as root on the device.  (Ref #31091)\nThis vulnerability can result in arbitrary command execution, and can result in total compromise of the device.\nThis issue affects PAN-OS 4.0.4 and earlier; PAN-OS 3.1.9 and earlier.</pre>"}]}],"x_affectedList":["PAN-OS 4.0","PAN-OS 3.1"],"affected":[{"vendor":"Palo Alto Networks","product":"PAN-OS","versions":[{"version":"4.0","status":"affected","lessThanOrEqual":"4.0.4","versionType":"custom","changes":[{"at":"4.0.5","status":"unaffected"}]},{"version":"3.1","status":"affected","lessThanOrEqual":"3.1.9","versionType":"custom","changes":[{"at":"3.1.10","status":"unaffected"}]}]}],"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2012-6592"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"defect":["31091"],"advisory":"PAN-SA-2012-0003","discovery":"UNKNOWN"},"workarounds":[{"lang":"en","value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","supportingMedia":{"value":"This issue affects the management interface of the device.  Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.","type":"text/html","base64":false}}],"solutions":[{"lang":"en","value":"PAN-OS 4.0.5 and later; PAN-OS 3.1.10 and later.","supportingMedia":{"value":"PAN-OS 4.0.5 and later; PAN-OS 3.1.10 and later.","type":"text/html","base64":false}}],"timeline":[]}}}]}