#VU42612 Permissions, Privileges, and Access Controls in Palo Alto PAN-OS - CVE-2013-5663


| Updated: 2020-08-10

Vulnerability identifier: #VU42612

Vulnerability risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2013-5663

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Palo Alto PAN-OS
Operating systems & Components / Operating system

Vendor: Palo Alto Networks, Inc.

Description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

The App-ID cache feature in Palo Alto Networks PAN-OS before 4.0.14, 4.1.x before 4.1.11, and 5.0.x before 5.0.2 allows remote attackers to bypass intended security policies via crafted requests that trigger invalid caching, as demonstrated by incorrect identification of HTTP traffic as SIP traffic, aka Ref ID 47195.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Palo Alto PAN-OS: 4.0.0 - 4.0.7, 4.1.0 - 4.1.10, 5.0.0-h1 - 5.0.0


External links
https://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20(Brad%20Woodberg%20-%20Final).pptx
https://pastie.org/pastes/5568186/text
https://researchcenter.paloaltonetworks.com/2013/01/app-id-cache-pollution-update/
https://security.paloaltonetworks.com/CVE-2013-5663


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability