CVE-2021-3054Time-of-check Time-of-use (TOCTOU) Race Condition in Palo Alto Networks Pan-os

Severity
6.6MEDIUMNVD
CNA7.2
EPSS
0.6%
top 29.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 8
Latest updateMay 24

Description

A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permission to upload plugins to execute arbitrary code with root user privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11; PAN-OS 10.0 versions earlier than PAN-OS 10.0.7; PAN-OS 10.1 versions earlier than PAN-OS 10.1

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.7 | Impact: 5.9

Affected Packages3 packages

NVDpaloaltonetworks/pan-os8.1.08.1.20+4
CVEListV5palo_alto_networks/pan-os8.18.1.20+4
Palo Altopaloalto/pan-os

🔴Vulnerability Details

2
GHSA
GHSA-r7c8-q64w-gv6f: A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administr2022-05-24
CVEList
PAN-OS: Unsigned Code Execution During Plugin Installation Race Condition Vulnerability2021-09-08

📋Vendor Advisories

1
Palo Alto
PAN-OS: Unsigned Code Execution During Plugin Installation Race Condition Vulnerability2021-09-08
CVE-2021-3054 — Palo Alto Networks Pan-os vulnerability | cvebase