Vulnerability identifier: #VU1134
Vulnerability risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-287
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Palo Alto PAN-OS
Operating systems & Components /
Operating system
Vendor: Palo Alto Networks, Inc.
Description
The vulnerability allows a remote unauthenticated user to gain access to the target system.
The weakness is due to improper generation and processing of API authentication tokens for the firewall API interface. A remote attacker who can access an authenticated administrator's browser and obtain the firewall API authentication token can perform calls to the firewall API.
Successful exploitation of the vulnerability results in access to the firewall REST API.
Mitigation
Update to version 5.0.20, 5.1.13, 6.0.15, 6.1.15, 7.0.11, 7.1.5.
Vulnerable software versions
Palo Alto PAN-OS: 5.0.18 - 5.0.20, 5.1.11 - 5.1.13, 6.0.13 - 6.0.15, 6.1.11 - 6.1.15, 7.0.0 - 7.0.11, 7.1.1 - 7.1.5
External links
https://securityadvisories.paloaltonetworks.com/Home/Detail/65
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.