Risk | Critical |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-3056 |
CWE-ID | CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Palo Alto PAN-OS Operating systems & Components / Operating system |
Vendor | Palo Alto Networks, Inc. |
This security bulletin contains one critical risk vulnerability.
EUVDB-ID: #VU58111
Risk: Critical
CVSSv3.1:
CVE-ID: CVE-2021-3056
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the PAN-OS GlobalProtect Clientless VPN during SAML authentication. A remote attacker can send specially crafted request to the system, trigger memory corruption and execute arbitrary code with root privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsPalo Alto PAN-OS: 10.0.0, 9.1 - 9.1.8, 9.0 - 9.0.13, 8.1 - 8.1.19
http://security.paloaltonetworks.com/CVE-2021-3056
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?