CVE-2020-2018 — Improper Authentication in Palo Alto Networks Pan-os
Severity
9.0CRITICALNVD
EPSS
0.3%
top 44.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 13
Latest updateMar 5
Description
An authentication bypass vulnerability in the Panorama context switching feature allows an attacker with network access to a Panorama's management interface to gain privileged access to managed firewalls. An attacker requires some knowledge of managed firewalls to exploit this issue. This issue does not affect Panorama configured with custom certificates authentication for communication between Panorama and managed devices. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 …
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 2.2 | Impact: 6.0
Affected Packages3 packages
🔴Vulnerability Details
7GHSA▶
GHSA-7qj6-jfj8-2jr9: An authentication bypass vulnerability in Palo Alto Networks PAN-OS Panorama proxy service allows an unauthenticated user with network access to Panor↗2022-05-24
💥Exploits & PoCs
3📋Vendor Advisories
7Microsoft▶
GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2 and an authentication bypass in TLS 1.3). The earliest affected version is ↗2020-06-09
Oracle▶
Oracle Oracle Communications Applications Risk Matrix: IDIH Visualization (Spring Framework) — CVE-2018-15756↗2020-04-15