CVE-2020-2011Improper Input Validation in Palo Alto Networks Pan-os

Severity
7.5HIGHNVD
EPSS
0.6%
top 31.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 13
Latest updateMay 24

Description

An improper input validation vulnerability in the configuration daemon of Palo Alto Networks PAN-OS Panorama allows for a remote unauthenticated user to send a specifically crafted registration request to the device that causes the configuration service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS Panorama services by restarting the device and putting it into maintenance mode. This issue affects: All versions of PAN-OS 7.1, PAN-OS 8.0; PAN-OS 8.1 ver

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDpaloaltonetworks/pan-os8.1.08.1.14+3
CVEListV5palo_alto_networks/pan-os8.18.1.14+4
Palo Altopaloalto/pan-os

🔴Vulnerability Details

2
GHSA
GHSA-hvgf-279c-6rmq: An improper input validation vulnerability in the configuration daemon of Palo Alto Networks PAN-OS Panorama allows for a remote unauthenticated user2022-05-24
CVEList
PAN-OS: Panorama registration denial of service2020-05-13

📋Vendor Advisories

1
Palo Alto
PAN-OS: Panorama registration denial of service2020-05-13

💬Community

2
HackerOne
SMTP interaction theft via MITM2020-11-04
Bugzilla
CVE-2020-29373 kernel: Insecure handling of root directory for path lookups via io_uring2020-09-04
CVE-2020-2011 — Improper Input Validation in Palo | cvebase