CVE-2021-3064Stack-based Buffer Overflow in Palo Alto Networks Pan-os

Severity
9.8CRITICALNVD
EPSS
47.8%
top 2.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 10
Latest updateAug 14

Description

A memory corruption vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to disrupt system processes and potentially execute arbitrary code with root privileges. The attacker must have network access to the GlobalProtect interface to exploit this issue. This issue impacts PAN-OS 8.1 versions earlier than PAN-OS 8.1.17. Prisma Access customers are not impacted by this issue.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

NVDpaloaltonetworks/pan-os8.1.08.1.17
CVEListV5palo_alto_networks/pan-os8.18.1.17
Palo Altopaloalto/pan-os

🔴Vulnerability Details

3
OSV
golang-yaml.v2 vulnerabilities2023-08-14
GHSA
GHSA-4753-h47c-jrw3: A memory corruption vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-bas2022-05-24
CVEList
PAN-OS: Memory Corruption Vulnerability in GlobalProtect Portal and Gateway Interfaces2021-11-10

📋Vendor Advisories

1
Palo Alto
PAN-OS: Memory Corruption Vulnerability in GlobalProtect Portal and Gateway Interfaces2021-11-10
CVE-2021-3064 — Stack-based Buffer Overflow in Palo | cvebase