62 results (0.021 seconds)

CVSS: 5.3EPSS: 0%CPEs: 5EXPL: 0

A vulnerability exists in the Palo Alto Network PAN-OS signature-based threat detection engine that allows an attacker to communicate with devices in the network in a way that is not analyzed for threats by sending data through specifically crafted TCP packets. This technique evades signature-based threat detection. This issue impacts: PAN-OS 8.1 versions earlier than 8.1.17; PAN-OS 9.0 versions earlier than 9.0.11; PAN-OS 9.1 versions earlier than 9.1.5; All versions of PAN-OS 7.1 and PAN-OS 8.0. Se presenta una vulnerabilidad en el motor de detección de amenazas basado en firmas de PAN-OS de Palo Alto Network que permite a un atacante comunicarse con dispositivos en la red de una manera que no se analiza en busca de amenazas mediante el envío de datos mediante paquetes TCP específicamente diseñados. Esta técnica evade la detección de amenazas basada en firmas. • https://security.paloaltonetworks.com/CVE-2020-1999 • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 4.0EPSS: 0%CPEs: 4EXPL: 0

An information exposure through log file vulnerability where an administrator's password or other sensitive information may be logged in cleartext while using the CLI in Palo Alto Networks PAN-OS software. The opcmdhistory.log file was introduced to track operational command (op-command) usage but did not mask all sensitive information. The opcmdhistory.log file is removed in PAN-OS 9.1 and later PAN-OS versions. Command usage is recorded, instead, in the req_stats.log file in PAN-OS 9.1 and later PAN-OS versions. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.10; PAN-OS 9.1 versions earlier than PAN-OS 9.1.3. • https://security.paloaltonetworks.com/CVE-2020-2044 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

An insecure configuration of the appweb daemon of Palo Alto Networks PAN-OS 8.1 allows a remote unauthenticated user to send a specifically crafted request to the device that causes the appweb service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode. This issue impacts all versions of PAN-OS 8.0, and PAN-OS 8.1 versions earlier than 8.1.16. Una configuración no segura del demonio appweb de Palo Alto Networks PAN-OS versión 8.1, permite a un usuario remoto no autenticado enviar una petición específicamente diseñada al dispositivo que causa que el servicio appweb se bloquee. Los intentos repetidos de enviar esta petición resultan en la denegación de servicio para todos los servicios de PAN-OS al reiniciar el dispositivo y ponerlo en modo de mantenimiento. • https://security.paloaltonetworks.com/CVE-2020-2041 • CWE-16: Configuration •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

A buffer overflow vulnerability in PAN-OS allows an unauthenticated attacker to disrupt system processes and potentially execute arbitrary code with root privileges by sending a malicious request to the Captive Portal or Multi-Factor Authentication interface. This issue impacts: All versions of PAN-OS 8.0; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; PAN-OS 9.1 versions earlier than PAN-OS 9.1.3. Una vulnerabilidad de desbordamiento de búfer en PAN-OS permite a un atacante no autenticado interrumpir los procesos del sistema y potencialmente ejecutar código arbitrario con privilegios root al enviar una petición maliciosa al portal cautivo o la interfaz de autenticación multifactor. Este problema impacta a: todas las Versiones PAN-OS 8.0; Versiones PAN-OS 8.1 anteriores a PAN-OS 8.1.15; Versiones PAN-OS 9.0 anteriores a PAN-OS 9.0.9; Versiones PAN-OS 9.1 anteriores a PAN-OS 9.1.3. • https://security.paloaltonetworks.com/CVE-2020-2040 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 9.3EPSS: 66%CPEs: 5EXPL: 1

An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network based attacker to execute arbitrary OS commands with root privileges. An attacker requires some knowledge of the firewall to exploit this issue. This issue can not be exploited if GlobalProtect portal feature is not enabled. This issue impacts PAN-OS 9.1 versions earlier than PAN-OS 9.1.3; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; all versions of PAN-OS 8.0 and PAN-OS 7.1. Prisma Access services are not impacted by this vulnerability. • https://github.com/blackhatethicalhacking/CVE-2020-2034-POC https://security.paloaltonetworks.com/CVE-2020-2034 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •