Multiple vulnerabilities in Palo Alto PAN-OS



Published: 2020-06-11
Risk Low
Patch available YES
Number of vulnerabilities 3
CVE ID CVE-2020-2027
CVE-2020-2029
CVE-2020-2028
CWE ID CWE-121
CWE-78
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Palo Alto PAN-OS
Operating systems & Components / Operating system

Vendor Palo Alto Networks, Inc.

Security Advisory

1) Stack-based buffer overflow

Risk: Low

CVSSv3: 6.3 [CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-2027

CWE-ID: CWE-121 - Stack-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to a boundary within the authd component of the PAN-OS management server. A remote authenticated administrator can send specially crafted request to the authd service, trigger a stack-based buffer overflow and crash it or execute arbitrary code with root privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Palo Alto PAN-OS: 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.4-h2, 7.1.5, 7.1.6, 7.1.7, 7.1.8, 7.1.9, 7.1.9-h4, 7.1.10, 7.1.11, 7.1.12, 7.1.13, 7.1.14, 7.1.15, 7.1.16, 7.1.17, 7.1.18, 7.1.19, 7.1.20, 7.1.21, 7.1.22, 7.1.23, 7.1.24, 7.1.24-h1, 7.1.25, 7.1.26, 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.3-h4, 8.0.4, 8.0.4-h2, 8.0.5, 8.0.6, 8.0.6-h3, 8.0.7, 8.0.8, 8.0.9, 8.0.10, 8.0.11, 8.0.11-h1, 8.0.12, 8.0.13, 8.0.14, 8.0.15, 8.0.16, 8.0.17, 8.0.18, 8.0.19, 8.0.19-h1, 8.0.20, 8.0.21, 8.1.0, 8.1.1, 8.1.2, 8.1.3, 8.1.4, 8.1.4-h2, 8.1.5, 8.1.6, 8.1.6-h2, 8.1.7, 8.1.8, 8.1.8-h4, 8.1.8-h5, 8.1.9, 8.1.9-h4, 8.1.10, 8.1.11, 8.1.12, 9.0.0, 9.0.1, 9.0.2, 9.0.2-h4, 9.0.3, 9.0.3-h2, 9.0.3-h3, 9.0.4, 9.0.5, 9.0.5-h3, 9.0.6

CPE External links

https://security.paloaltonetworks.com/CVE-2020-2027

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) OS Command Injection

Risk: Low

CVSSv3: 6.3 [CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-2029

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a user to escalate privileges on the system.

The vulnerability exists due to improper input validation. A remote authenticated administrator can send a malicious request to generate new certificates for use in the PAN-OS configuration and execute arbitrary commands with root privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Palo Alto PAN-OS: 7.1, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.4-h2, 7.1.5, 7.1.6, 7.1.7, 7.1.8, 7.1.9, 7.1.9-h4, 7.1.10, 7.1.11, 7.1.12, 7.1.13, 7.1.14, 7.1.15, 7.1.16, 7.1.17, 7.1.18, 7.1.19, 7.1.20, 7.1.21, 7.1.22, 7.1.23, 7.1.24, 7.1.24-h1, 7.1.25, 8.0, 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.3-h4, 8.0.4, 8.0.4-h2, 8.0.5, 8.0.6, 8.0.6-h3, 8.0.7, 8.0.8, 8.0.9, 8.0.10, 8.0.11, 8.0.11-h1, 8.0.12, 8.0.13, 8.0.14, 8.0.15, 8.0.16, 8.0.17, 8.0.18, 8.0.19, 8.0.19-h1, 8.0.20, 8.0.21, 8.1, 8.1.0, 8.1.1, 8.1.2, 8.1.3, 8.1.4, 8.1.4-h2, 8.1.5, 8.1.6, 8.1.6-h2, 8.1.7, 8.1.8, 8.1.8-h4, 8.1.8-h5, 8.1.9, 8.1.9-h4, 8.1.10, 8.1.11, 8.1.12

CPE External links

https://security.paloaltonetworks.com/CVE-2020-2029

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) OS Command Injection

Risk: Low

CVSSv3: 6.3 [CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-2028

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to improper input validation in PAN-OS management server when uploading a new certificate in FIPS-CC mode. A remote authenticated administrator can pass specially crafted data to the application and execute arbitrary OS commands on the target system with root privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Palo Alto PAN-OS: 7.1, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.4-h2, 7.1.5, 7.1.6, 7.1.7, 7.1.8, 7.1.9, 7.1.9-h4, 7.1.10, 7.1.11, 7.1.12, 7.1.13, 7.1.14, 7.1.15, 7.1.16, 7.1.17, 7.1.18, 7.1.19, 7.1.20, 7.1.21, 7.1.22, 7.1.23, 7.1.24, 7.1.24-h1, 7.1.25, 7.1.26, 8.0, 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.3-h4, 8.0.4, 8.0.4-h2, 8.0.5, 8.0.6, 8.0.6-h3, 8.0.7, 8.0.8, 8.0.9, 8.0.10, 8.0.11, 8.0.11-h1, 8.0.12, 8.0.13, 8.0.14, 8.0.15, 8.0.16, 8.0.17, 8.0.18, 8.0.19, 8.0.19-h1, 8.0.20, 8.0.21, 8.1, 8.1.0, 8.1.1, 8.1.2, 8.1.3, 8.1.4, 8.1.4-h2, 8.1.5, 8.1.6, 8.1.6-h2, 8.1.7, 8.1.8, 8.1.8-h4, 8.1.8-h5, 8.1.9, 8.1.9-h4, 8.1.10, 8.1.11, 8.1.12, 9.0.0, 9.0.1, 9.0.2, 9.0.2-h4, 9.0.3, 9.0.3-h2, 9.0.3-h3, 9.0.4, 9.0.5, 9.0.5-h3, 9.0.6

CPE External links

https://security.paloaltonetworks.com/CVE-2020-2028

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###