Page 9 of 51 results (0.004 seconds)

CVSS: 9.0EPSS: 0%CPEs: 4EXPL: 0

An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 9.0 version 9.0.10 through PAN-OS 9.0.14; PAN-OS 9.1 version 9.1.4 through PAN-OS 9.1.10; PAN-OS 10.0 version 10.0.7 and earlier PAN-OS 10.0 versions; PAN-OS 10.1 version 10.1.0 through PAN-OS 10.1.1. Prisma Access firewalls and firewalls running PAN-OS 8.1 versions are not impacted by this issue. Una vulnerabilidad de inyección de comandos del Sistema Operativo en la interfaz web de Palo Alto Networks PAN-OS, permite a un administrador autenticado ejecutar comandos arbitrarios del Sistema Operativo para escalar privilegios. Este problema afecta a: PAN-OS 9.0 versiones 9.0.10 hasta PAN-OS 9.0.14; PAN-OS 9.1 versiones 9.1.4 hasta PAN-OS 9.1.10; PAN-OS 10.0 versiones 10.0.7 y versiones anteriores a PAN-OS 10.0; PAN-OS 10.1 versiones 10.1.0 hasta PAN-OS 10.1.1. • https://security.paloaltonetworks.com/CVE-2021-3050 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 5.9EPSS: 0%CPEs: 3EXPL: 0

Certain invalid URL entries contained in an External Dynamic List (EDL) cause the Device Server daemon (devsrvr) to stop responding. This condition causes subsequent commits on the firewall to fail and prevents administrators from performing commits and configuration changes even though the firewall remains otherwise functional. If the firewall then restarts, it results in a denial-of-service (DoS) condition and the firewall stops processing traffic. This issue impacts: PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.5. PAN-OS 8.1 and PAN-OS 10.1 versions are not impacted. • https://security.paloaltonetworks.com/CVE-2020-3048 https://security.paloaltonetworks.com/CVE-2021-3048 • CWE-20: Improper Input Validation •

CVSS: 4.2EPSS: 0%CPEs: 4EXPL: 0

A cryptographically weak pseudo-random number generator (PRNG) is used during authentication to the Palo Alto Networks PAN-OS web interface. This enables an authenticated attacker, with the capability to observe their own authentication secrets over a long duration on the PAN-OS appliance, to impersonate another authenticated web interface administrator's session. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.19; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.10; PAN-OS 10.0 versions earlier than PAN-OS 10.0.4. PAN-OS 10.1 versions are not impacted. Es usado un generador de números pseudoaleatorios (PRNG) débil desde el punto de vista criptográfico durante la autenticación en la interfaz web de PAN-OS de Palo Alto Networks. • https://security.paloaltonetworks.com/CVE-2021-3047 • CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) •

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 0

An improper authentication vulnerability exists in Palo Alto Networks PAN-OS software that enables a SAML authenticated attacker to impersonate any other user in the GlobalProtect Portal and GlobalProtect Gateway when they are configured to use SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.19; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.5. PAN-OS 10.1 versions are not impacted. Se presenta una vulnerabilidad de autenticación inapropiada en el software PAN-OS de Palo Alto Networks, que permite a un atacante con autenticación SAML hacerse pasar por cualquier otro usuario en GlobalProtect Portal y GlobalProtect Gateway cuando están configurados para usar la autenticación SAML. Este problema afecta a: PAN-OS versiones 8.1 anteriores a PAN-OS 8.1.19; PAN-OS versiones 9.0 anteriores a PAN-OS 9.0.14; PAN-OS versiones 9.1 anteriores a PAN-OS 9.1.9; PAN-OS versiones 10.0 anteriores a PAN-OS 10.0.5. • https://security.paloaltonetworks.com/CVE-2021-3046 • CWE-287: Improper Authentication •

CVSS: 4.4EPSS: 0%CPEs: 4EXPL: 0

An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to use the PAN-OS XML API and exists only when a client includes a duplicate API parameter in API requests. Logged information includes the cleartext username, password, and API key of the administrator making the PAN-OS XML API request. Se presenta una exposición de la información por medio de la vulnerabilidad del archivo de registro en el software PAN-OS de Palo Alto Networks, donde los secretos en las peticiones de la API XML de PAN-OS son registrados en texto sin cifrar en los registros del servidor web cuando la API son usados incorrectamente. Esta vulnerabilidad se aplica solo a dispositivos PAN-OS que están configurados para usar la API XML de PAN-OS y se presenta solo cuando un cliente incluye un parámetro de la API duplicado en peticiones de API. • https://security.paloaltonetworks.com/CVE-2021-3036 • CWE-532: Insertion of Sensitive Information into Log File •