Vulnerability identifier: #VU42612
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Palo Alto PAN-OS
Operating systems & Components /
Operating system
Vendor: Palo Alto Networks, Inc.
Description
The vulnerability allows a remote non-authenticated attacker to manipulate data.
The App-ID cache feature in Palo Alto Networks PAN-OS before 4.0.14, 4.1.x before 4.1.11, and 5.0.x before 5.0.2 allows remote attackers to bypass intended security policies via crafted requests that trigger invalid caching, as demonstrated by incorrect identification of HTTP traffic as SIP traffic, aka Ref ID 47195.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Palo Alto PAN-OS: 4.0.0 - 4.0.7, 4.1.0 - 4.1.10, 5.0.0-h1 - 5.0.0
External links
https://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20(Brad%20Woodberg%20-%20Final).pptx
https://pastie.org/pastes/5568186/text
https://researchcenter.paloaltonetworks.com/2013/01/app-id-cache-pollution-update/
https://security.paloaltonetworks.com/CVE-2013-5663
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.