⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply updates per vendor instructions.. Due date: 2022-07-10.
CVE-2019-1579
8.1
CVSS
EPSS92.9%(100th)
CISA KEVExploited in WildRansomware UseCISA Required Action: Apply updates per vendor instructions.
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9
Affected Packages2 packages
▶CVEListV5palo_alto_networks_globalprotect_portal/gateway_interfacePAN-OS 7.1.18 and earlier, PAN-OS 8.0.11 and earlier, and PAN-OS 8.1.2 and earlier releases
Remote Code Execution in PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and PAN-OS 8.1.2 and earlier with GlobalProtect Portal or GlobalProtect Gateway Interface enabled may allow an unauthenticated remote attacker to execute arbitrary code.
🔴Vulnerability Details
3🔍Detection Rules
1Suricata▶
ET EXPLOIT Possible Palo Alto SSL VPN sslmgr Format String Vulnerability (Inbound) (CVE-2019-1579)↗2019-07-18
📋Vendor Advisories
1💬Community
1Bugzilla▶
CVE-2019-10431 jenkins-script-security: Sandbox bypass vulnerability in Script Security Plugin↗2019-10-22