Risk | High |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2017-15944 CVE-2017-15942 CVE-2017-15943 CVE-2017-15940 |
CWE-ID | CWE-77 CWE-284 CWE-918 |
Exploitation vector | Network |
Public exploit | Vulnerability #1 is being exploited in the wild. |
Vulnerable software Subscribe |
Palo Alto PAN-OS Operating systems & Components / Operating system |
Vendor | Palo Alto Networks, Inc. |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU9662
Risk: High
CVSSv3.1: 9.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C]
CVE-ID: CVE-2017-15944
CWE-ID:
CWE-77 - Command injection
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to execute arbitrary command on the target system.
The weakness exists due to multiple vulnerabilities in PAN-OS on Management Interface. A remote attacker can trigger deserialization error in processing the PHPSESSID cookie, modify the session file, cause an XML injection cookie injection error, bypass the panAuthCheck authentication directive controlling access to the '/php' directory, conduct an XML injection attack against the '/php/utils/router.php' script, create arbitrary directories, conduct a command injection attack against the '/usr/local/bin/genindex_batch.sh' cron script and execute arbitrary system commands with root privileges.
Successful exploitation of the vulnerability may result in system compromise.
Update to version 6.1.19, 7.0.19, 7.1.14, 8.0.6.
Vulnerable software versionsPalo Alto PAN-OS: 6.1.0 - 8.0.5
External linkshttp://securityadvisories.paloaltonetworks.com/Home/Detail/102
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.
EUVDB-ID: #VU9663
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-15942
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to unspecified flaw in the management interface. A remote attacker can cause the target management interface to become unavailable.
Successful exploitation of the vulnerability results in denial of service.
Update to version 6.1.19, 7.0.19, 7.1.13, 8.0.6.
Vulnerable software versionsPalo Alto PAN-OS: 6.1.0 - 8.0.5
External linkshttp://securityadvisories.paloaltonetworks.com/Home/Detail/96
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9665
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-15943
CWE-ID:
CWE-918 - Server-Side Request Forgery (SSRF)
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform SSRF-attack on the target system.
The weakness exists due to insufficient validation of user-supplied input. A remote attacker can supply specially crafted configuration file data that references external entities, bypass security restrictions and obtain potentially sensitive information.
Update to version 6.1.19, 7.0.19, 7.1.14.
Vulnerable software versionsPalo Alto PAN-OS: 6.1.0 - 7.1.13
External linkshttp://securityadvisories.paloaltonetworks.com/Home/Detail/99
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9664
Risk: High
CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-15940
CWE-ID:
CWE-77 - Command injection
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated attacker to execute arbitrary command on the target system.
The weakness exists due to insufficient validation of user-supplied input. A remote attacker can send specially crafted data to the web interface packet capture management function to inject and execute arbitrary commands with root privileges.
Successful exploitation of the vulnerability may result in system compromise.
Update to version 6.1.19, 7.0.19, 7.1.14.
Vulnerable software versionsPalo Alto PAN-OS: 6.1.0 - 7.1.13
External linkshttp://securityadvisories.paloaltonetworks.com/Home/Detail/105
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.