CVE-2020-2035 – PAN-OS: URL filtering policy is not enforced on TLS handshakes for decrypted HTTPS sessions
https://notcve.org/view.php?id=CVE-2020-2035
When SSL/TLS Forward Proxy Decryption mode has been configured to decrypt the web transactions, the PAN-OS URL filtering feature inspects the HTTP Host and URL path headers for policy enforcement on the decrypted HTTPS web transactions but does not consider Server Name Indication (SNI) field within the TLS Client Hello handshake. This allows a compromised host in a protected network to evade any security policy that uses URL filtering on a firewall configured with SSL Decryption in the Forward Proxy mode. A malicious actor can then use this technique to evade detection of communication on the TLS handshake phase between a compromised host and a remote malicious server. This technique does not increase the risk of a host being compromised in the network. It does not impact the confidentiality or availability of a firewall. • https://security.paloaltonetworks.com/CVE-2020-2035 https://www.mnemonic.no/blog/introducing-snicat • CWE-20: Improper Input Validation •
CVE-2020-2034 – PAN-OS: OS command injection vulnerability in GlobalProtect portal
https://notcve.org/view.php?id=CVE-2020-2034
An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network based attacker to execute arbitrary OS commands with root privileges. An attacker requires some knowledge of the firewall to exploit this issue. This issue can not be exploited if GlobalProtect portal feature is not enabled. This issue impacts PAN-OS 9.1 versions earlier than PAN-OS 9.1.3; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; all versions of PAN-OS 8.0 and PAN-OS 7.1. Prisma Access services are not impacted by this vulnerability. • https://github.com/blackhatethicalhacking/CVE-2020-2034-POC https://security.paloaltonetworks.com/CVE-2020-2034 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2020-2031 – PAN-OS: Integer underflow in the management interface
https://notcve.org/view.php?id=CVE-2020-2031
An integer underflow vulnerability in the dnsproxyd component of the PAN-OS management interface allows authenticated administrators to issue a command from the command line interface that causes the component to stop responding. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode. This issue impacts: PAN-OS 9.1 versions earlier than PAN-OS 9.1.3. This issue does not impact PAN-OS 8.1, PAN-OS 9.0, or Prisma Access services. Una vulnerabilidad de un subflujo de enteros en el componente dnsproxyd de la interfaz de administración de PAN-OS, permite a los administradores autenticados emitir un comando desde la interfaz de línea de comando que causa que el componente deje de responder. • https://security.paloaltonetworks.com/CVE-2020-2031 • CWE-191: Integer Underflow (Wrap or Wraparound) •
CVE-2020-2030 – PAN-OS: OS command injection vulnerability in the management interface
https://notcve.org/view.php?id=CVE-2020-2030
An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges. This issue impacts PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; and all versions of PAN-OS 7.1 and PAN-OS 8.0. This issue does not impact PAN-OS 9.0, PAN-OS 9.1, or Prisma Access services. Una vulnerabilidad de Inyección de Comandos del Sistema Operativo en la interfaz de administración de PAN-OS, permite a administradores autenticados ejecutar comandos arbitrarios de Sistema Operativo con privilegios root. Este problema afecta a versiones PAN-OS 8.1 anteriores a PAN-OS 8.1.15; y todas las versiones de PAN-OS 7.1 y PAN-OS 8.0. • https://security.paloaltonetworks.com/CVE-2020-2030 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2020-1982 – PAN-OS: TLS 1.0 usage for certain communications with Palo Alto Networks cloud delivered services
https://notcve.org/view.php?id=CVE-2020-1982
Certain communication between PAN-OS and cloud-delivered services inadvertently use TLS 1.0, which is known to be a cryptographically weak protocol. These cloud services include Cortex Data Lake, the Customer Support Portal, and the Prisma Access infrastructure. Conditions required for exploitation of known TLS 1.0 weaknesses do not exist for the communication between PAN-OS and cloud-delivered services. We do not believe that any communication is impacted as a result of known attacks against TLS 1.0. This issue impacts: All versions of PAN-OS 8.0; PAN-OS 8.1 versions earlier than PAN-OS 8.1.14; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; PAN-OS 9.1 versions earlier than PAN-OS 9.1.3. • https://security.paloaltonetworks.com/CVE-2020-1982 • CWE-326: Inadequate Encryption Strength •