{"document":{"category":"csaf_vex","csaf_version":"2.1","notes":[{"category":"summary","text":"Palo Alto Networks PSIRT provided VEX document. This document is autogenerated.","title":"Informational: Third-party or open source vulnerabilities that do not impact Palo Alto Networks Products"}],"publisher":{"category":"vendor","name":"Palo Alto Networks","namespace":"https://security.paloaltonetworks.com"},"title":"Palo Alto Networks PSIRT provided VEX document: PAN-SA-2020-0007","distribution":{"text":"Copyright © 2024 Palo Alto Networks. All rights reserved.","tlp":{"label":"CLEAR","url":"https://www.first.org/tlp/"}},"tracking":{"current_release_date":"2026-04-11T00:33:00.454Z","generator":{"date":"2026-04-11T00:33:00.454Z","engine":{"name":"Vulnogram","version":"0.0.9"}},"id":"PAN-SA-2020-0007","initial_release_date":"2020-07-08T16:00:00.000Z","revision_history":[{"number":"1","date":"2020-07-08T09:00:00.000Z","summary":"Initial publication"},{"number":"2","date":"2022-04-05T09:30:00.000Z","summary":"Added versions of PAN-OS that upgrade jQuery to a fixed version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"name":"Palo Alto Networks","category":"vendor","branches":[{"name":"PAN-OS","category":"product_name","branches":[{"category":"product_version","name":"PAN-OS All","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-1"}}]}]}]},"vulnerabilities":[{"cve":"CVE-2020-11896","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11896","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11896"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11897","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11897","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11897"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11898","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11898","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11898"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11899","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11899","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11899"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11900","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11900","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11900"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11901","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11901","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11901"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11902","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11902","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11902"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11903","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11903","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11903"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11904","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11904","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11904"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11905","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11905","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11905"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11906","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11906","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11906"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11907","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11907","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11907"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11908","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11908","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11908"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11909","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11909","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11909"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11910","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11910","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11910"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11911","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11911","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11911"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11912","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11912","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11912"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11913","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11913","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11913"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2020-11914","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11914","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11914"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in Treck TCP/IP stack (also known as Ripple20) does not impact PAN-OS software."}]},{"cve":"CVE-2013-7459","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This vulnerability in pycrypto does not affect PAN-OS software."}],"references":[{"category":"external","summary":"NVD - CVE-2013-7459","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-7459"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"This vulnerability in pycrypto does not affect PAN-OS software."}]},{"cve":"CVE-2018-1120","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Conditions required for exploiting this vulnerability in procps-ng do not exist in PAN-OS software. Hence PAN-OS software is not impacted."}],"references":[{"category":"external","summary":"NVD - CVE-2018-1120","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1120"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"Conditions required for exploiting this vulnerability in procps-ng do not exist in PAN-OS software. Hence PAN-OS software is not impacted."}]},{"cve":"CVE-2018-1121","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Conditions required for exploiting this vulnerability in procps-ng do not exist in PAN-OS software. Hence PAN-OS software is not impacted."}],"references":[{"category":"external","summary":"NVD - CVE-2018-1121","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1121"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"Conditions required for exploiting this vulnerability in procps-ng do not exist in PAN-OS software. Hence PAN-OS software is not impacted."}]},{"cve":"CVE-2018-1122","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Conditions required for exploiting this vulnerability in procps-ng do not exist in PAN-OS software. Hence PAN-OS software is not impacted."}],"references":[{"category":"external","summary":"NVD - CVE-2018-1122","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1122"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"Conditions required for exploiting this vulnerability in procps-ng do not exist in PAN-OS software. Hence PAN-OS software is not impacted."}]},{"cve":"CVE-2018-1123","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Conditions required for exploiting this vulnerability in procps-ng do not exist in PAN-OS software. Hence PAN-OS software is not impacted."}],"references":[{"category":"external","summary":"NVD - CVE-2018-1123","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1123"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"Conditions required for exploiting this vulnerability in procps-ng do not exist in PAN-OS software. Hence PAN-OS software is not impacted."}]},{"cve":"CVE-2018-1124","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Conditions required for exploiting this vulnerability in procps-ng do not exist in PAN-OS software. Hence PAN-OS software is not impacted."}],"references":[{"category":"external","summary":"NVD - CVE-2018-1124","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1124"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"Conditions required for exploiting this vulnerability in procps-ng do not exist in PAN-OS software. Hence PAN-OS software is not impacted."}]},{"cve":"CVE-2018-16402","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Conditions required for exploiting this vulnerability in libelf do not exist in PAN-OS software. Hence PAN-OS software is not impacted."}],"references":[{"category":"external","summary":"NVD - CVE-2018-16402","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16402"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"Conditions required for exploiting this vulnerability in libelf do not exist in PAN-OS software. Hence PAN-OS software is not impacted."}]},{"cve":"CVE-2020-11022","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Conditions required for exploiting this vulnerability in jQuery do not exist in PAN-OS software. Hence PAN-OS software is not impacted."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11022","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11022"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"Conditions required for exploiting this vulnerability in jQuery do not exist in PAN-OS software. Hence PAN-OS software is not impacted."}]},{"cve":"CVE-2020-11023","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"Conditions required for exploiting this vulnerability in jQuery do not exist in PAN-OS software. Hence PAN-OS software is not impacted."}],"references":[{"category":"external","summary":"NVD - CVE-2020-11023","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11023"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2020-0007","url":"https://security.paloaltonetworks.com/PAN-SA-2020-0007"}],"threats":[{"category":"impact","description":"Conditions required for exploiting this vulnerability in jQuery do not exist in PAN-OS software. Hence PAN-OS software is not impacted."}]}]}