Page 10 of 101 results (0.010 seconds)

CVSS: 5.3EPSS: 0%CPEs: 5EXPL: 0

A vulnerability exists in the Palo Alto Network PAN-OS signature-based threat detection engine that allows an attacker to communicate with devices in the network in a way that is not analyzed for threats by sending data through specifically crafted TCP packets. This technique evades signature-based threat detection. This issue impacts: PAN-OS 8.1 versions earlier than 8.1.17; PAN-OS 9.0 versions earlier than 9.0.11; PAN-OS 9.1 versions earlier than 9.1.5; All versions of PAN-OS 7.1 and PAN-OS 8.0. Se presenta una vulnerabilidad en el motor de detección de amenazas basado en firmas de PAN-OS de Palo Alto Network que permite a un atacante comunicarse con dispositivos en la red de una manera que no se analiza en busca de amenazas mediante el envío de datos mediante paquetes TCP específicamente diseñados. Esta técnica evade la detección de amenazas basada en firmas. • https://security.paloaltonetworks.com/CVE-2020-1999 • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 4.0EPSS: 0%CPEs: 4EXPL: 0

An information exposure through log file vulnerability where an administrator's password or other sensitive information may be logged in cleartext while using the CLI in Palo Alto Networks PAN-OS software. The opcmdhistory.log file was introduced to track operational command (op-command) usage but did not mask all sensitive information. The opcmdhistory.log file is removed in PAN-OS 9.1 and later PAN-OS versions. Command usage is recorded, instead, in the req_stats.log file in PAN-OS 9.1 and later PAN-OS versions. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.10; PAN-OS 9.1 versions earlier than PAN-OS 9.1.3. • https://security.paloaltonetworks.com/CVE-2020-2044 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 4.0EPSS: 0%CPEs: 3EXPL: 0

An information exposure through log file vulnerability where sensitive fields are recorded in the configuration log without masking on Palo Alto Networks PAN-OS software when the after-change-detail custom syslog field is enabled for configuration logs and the sensitive field appears multiple times in one log entry. The first instance of the sensitive field is masked but subsequent instances are left in clear text. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.10; PAN-OS 9.1 versions earlier than PAN-OS 9.1.4. Una exposición de información por medio de una vulnerabilidad de archivo de registro donde los campos confidenciales se registran en el registro de configuración sin enmascaramiento en el software PAN-OS de Palo Alto Networks cuando el campo syslog personalizado after-change-detail está habilitado para los registros de configuración y el campo confidencial aparece varias veces en una entrada de registro. La primera instancia del campo confidencial está enmascarada, pero las instancias posteriores se dejan en texto sin cifrar. • https://security.paloaltonetworks.com/CVE-2020-2043 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

An insecure configuration of the appweb daemon of Palo Alto Networks PAN-OS 8.1 allows a remote unauthenticated user to send a specifically crafted request to the device that causes the appweb service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode. This issue impacts all versions of PAN-OS 8.0, and PAN-OS 8.1 versions earlier than 8.1.16. Una configuración no segura del demonio appweb de Palo Alto Networks PAN-OS versión 8.1, permite a un usuario remoto no autenticado enviar una petición específicamente diseñada al dispositivo que causa que el servicio appweb se bloquee. Los intentos repetidos de enviar esta petición resultan en la denegación de servicio para todos los servicios de PAN-OS al reiniciar el dispositivo y ponerlo en modo de mantenimiento. • https://security.paloaltonetworks.com/CVE-2020-2041 • CWE-16: Configuration •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

A buffer overflow vulnerability in PAN-OS allows an unauthenticated attacker to disrupt system processes and potentially execute arbitrary code with root privileges by sending a malicious request to the Captive Portal or Multi-Factor Authentication interface. This issue impacts: All versions of PAN-OS 8.0; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; PAN-OS 9.1 versions earlier than PAN-OS 9.1.3. Una vulnerabilidad de desbordamiento de búfer en PAN-OS permite a un atacante no autenticado interrumpir los procesos del sistema y potencialmente ejecutar código arbitrario con privilegios root al enviar una petición maliciosa al portal cautivo o la interfaz de autenticación multifactor. Este problema impacta a: todas las Versiones PAN-OS 8.0; Versiones PAN-OS 8.1 anteriores a PAN-OS 8.1.15; Versiones PAN-OS 9.0 anteriores a PAN-OS 9.0.9; Versiones PAN-OS 9.1 anteriores a PAN-OS 9.1.3. • https://security.paloaltonetworks.com/CVE-2020-2040 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •