CVE-2020-1982
PAN-OS: TLS 1.0 usage for certain communications with Palo Alto Networks cloud delivered services
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Certain communication between PAN-OS and cloud-delivered services inadvertently use TLS 1.0, which is known to be a cryptographically weak protocol. These cloud services include Cortex Data Lake, the Customer Support Portal, and the Prisma Access infrastructure. Conditions required for exploitation of known TLS 1.0 weaknesses do not exist for the communication between PAN-OS and cloud-delivered services. We do not believe that any communication is impacted as a result of known attacks against TLS 1.0. This issue impacts: All versions of PAN-OS 8.0; PAN-OS 8.1 versions earlier than PAN-OS 8.1.14; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; PAN-OS 9.1 versions earlier than PAN-OS 9.1.3. PAN-OS 7.1 is not impacted by this issue.
Determinada comunicación entre PAN-OS y los servicios entregados en la nube inadvertidamente usan TLS versión 1.0, que se sabe que es un protocolo criptográficamente débil. Estos servicios en la nube incluyen Cortex Data Lake, el Customer Support Portal y la infraestructura Prisma Access. Las condiciones requeridas para la explotación de las debilidades conocidas de TLS versión 1.0 no existen para la comunicación entre PAN-OS y los servicios entregados en la nube. No creemos que ninguna comunicación esté afectada como resultado de ataques conocidos contra TLS versión 1.0. Este problema afecta: todas las versiones de PAN-OS 8.0; versiones PAN-OS 8.1 anteriores a PAN-OS 8.1.14; versiones PAN-OS 9.0 anteriores a PAN-OS 9.0.9; versiones PAN-OS 9.1 anteriores a PAN-OS 9.1.3. La versión PAN-OS 7.1 no está afectada por este problema
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-12-04 CVE Reserved
- 2020-07-08 CVE Published
- 2023-07-08 EPSS Updated
- 2024-09-17 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-326: Inadequate Encryption Strength
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.paloaltonetworks.com/CVE-2020-1982 | 2020-07-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Paloaltonetworks Search vendor "Paloaltonetworks" | Pan-os Search vendor "Paloaltonetworks" for product "Pan-os" | >= 8.0.0 <= 8.0.20 Search vendor "Paloaltonetworks" for product "Pan-os" and version " >= 8.0.0 <= 8.0.20" | - |
Affected
| ||||||
Paloaltonetworks Search vendor "Paloaltonetworks" | Pan-os Search vendor "Paloaltonetworks" for product "Pan-os" | >= 8.1.0 < 8.1.14 Search vendor "Paloaltonetworks" for product "Pan-os" and version " >= 8.1.0 < 8.1.14" | - |
Affected
| ||||||
Paloaltonetworks Search vendor "Paloaltonetworks" | Pan-os Search vendor "Paloaltonetworks" for product "Pan-os" | >= 9.0.0 < 9.0.9 Search vendor "Paloaltonetworks" for product "Pan-os" and version " >= 9.0.0 < 9.0.9" | - |
Affected
| ||||||
Paloaltonetworks Search vendor "Paloaltonetworks" | Pan-os Search vendor "Paloaltonetworks" for product "Pan-os" | >= 9.1.0 < 9.1.3 Search vendor "Paloaltonetworks" for product "Pan-os" and version " >= 9.1.0 < 9.1.3" | - |
Affected
|