Palo Alto Networks PAN-OS vulnerabilities
158 known vulnerabilities affecting palo_alto_networks/pan-os.
Total CVEs
158
CISA KEV
8
actively exploited
Public exploits
7
Exploited in wild
6
Severity breakdown
CRITICAL11HIGH65MEDIUM71LOW11
Vulnerabilities
Page 5 of 8
CVE-2021-3063HIGHCVSS 7.5≥ 8.1, < 8.1.21≥ 9.0, < 9.0.14-h4+3 more2021-11-10
CVE-2021-3063 [HIGH] CWE-755 CVE-2021-3063: An improper handling of exceptional conditions vulnerability exists in Palo Alto Networks GlobalProt
An improper handling of exceptional conditions vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to send specifically crafted traffic to a GlobalProtect interface that causes the service to stop responding. Repeated attempts to send this request result in denial
cvelistv5nvd
CVE-2021-3062HIGHCVSS 8.8≥ 9.1, < 9.1.11≥ 8.1, < 8.1.20+2 more2021-11-10
CVE-2021-3062 [HIGH] CWE-284 CVE-2021-3062: An improper access control vulnerability in PAN-OS software enables an attacker with authenticated a
An improper access control vulnerability in PAN-OS software enables an attacker with authenticated access to GlobalProtect portals and gateways to connect to the EC2 instance metadata endpoint for VM-Series firewalls hosted on Amazon AWS. Exploitation of this vulnerability enables an attacker to perform any operations allowed by the EC2 role in AWS. Thi
cvelistv5nvd
CVE-2021-3059HIGHCVSS 8.1≥ 10.0, < 10.0.8≥ 10.1, < 10.1.3+3 more2021-11-10
CVE-2021-3059 [HIGH] CWE-78 CVE-2021-3059: An OS command injection vulnerability in the Palo Alto Networks PAN-OS management interface exists w
An OS command injection vulnerability in the Palo Alto Networks PAN-OS management interface exists when performing dynamic updates. This vulnerability enables a man-in-the-middle attacker to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS
cvelistv5nvd
CVE-2021-3056HIGHCVSS 8.8≥ 9.0, < 9.0.14≥ 8.1, < 8.1.20+2 more2021-11-10
CVE-2021-3056 [HIGH] CWE-120 CVE-2021-3056: A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables
A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables an authenticated attacker to execute arbitrary code with root user privileges during SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than P
cvelistv5nvd
CVE-2021-3058HIGHCVSS 7.2≥ 10.1, < 10.1.3≥ 9.0, < 9.0.14-h3+3 more2021-11-10
CVE-2021-3058 [HIGH] CWE-78 CVE-2021-3058: An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an auth
An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permissions to use XML API the ability to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3; PAN-OS 9.
cvelistv5nvd
CVE-2021-3061HIGHCVSS 7.2≥ 8.1, < 8.1.20-h1≥ 9.0, < 9.0.14-h3+3 more2021-11-10
CVE-2021-3061 [HIGH] CWE-78 CVE-2021-3061: An OS command injection vulnerability in the Palo Alto Networks PAN-OS command line interface (CLI)
An OS command injection vulnerability in the Palo Alto Networks PAN-OS command line interface (CLI) enables an authenticated administrator with access to the CLI to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3; PAN-OS 9.1 versi
cvelistv5nvd
CVE-2021-3060HIGHCVSS 8.1≥ 8.1, < 8.1.20-h1≥ 9.0, < 9.0.14-h3+3 more2021-11-10
CVE-2021-3060 [HIGH] CWE-78 CVE-2021-3060: An OS command injection vulnerability in the Simple Certificate Enrollment Protocol (SCEP) feature o
An OS command injection vulnerability in the Simple Certificate Enrollment Protocol (SCEP) feature of PAN-OS software allows an unauthenticated network-based attacker with specific knowledge of the firewall configuration to execute arbitrary code with root user privileges. The attacker must have network access to the GlobalProtect interfaces to exploit t
cvelistv5nvd
CVE-2021-3053HIGHCVSS 7.5≥ 8.1, < 8.1.20≥ 9.0, < 9.0.14+2 more2021-09-08
CVE-2021-3053 [HIGH] CWE-755 CVE-2021-3053: An improper handling of exceptional conditions vulnerability exists in the Palo Alto Networks PAN-OS
An improper handling of exceptional conditions vulnerability exists in the Palo Alto Networks PAN-OS dataplane that enables an unauthenticated network-based attacker to send specifically crafted traffic through the firewall that causes the service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by rest
cvelistv5nvd
CVE-2021-3055MEDIUMCVSS 6.5≥ 9.0, < 9.0.14≥ 9.1, < 9.1.10+2 more2021-09-08
CVE-2021-3055 [MEDIUM] CWE-611 CVE-2021-3055: An improper restriction of XML external entity (XXE) reference vulnerability in the Palo Alto Networ
An improper restriction of XML external entity (XXE) reference vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to read any arbitrary file from the file system and send a specifically crafted request to the firewall that causes the service to crash. Repeated attempts to send this request result in den
cvelistv5nvd
CVE-2021-3052MEDIUMCVSS 5.4≥ 9.0, < 9.0.14≥ 8.1, < 8.1.20+2 more2021-09-08
CVE-2021-3052 [MEDIUM] CWE-79 CVE-2021-3052: A reflected cross-site scripting (XSS) vulnerability in the Palo Alto Network PAN-OS web interface e
A reflected cross-site scripting (XSS) vulnerability in the Palo Alto Network PAN-OS web interface enables an authenticated network-based attacker to mislead another authenticated PAN-OS administrator to click on a specially crafted link that performs arbitrary actions in the PAN-OS web interface as the targeted authenticated administrator. This issue
cvelistv5nvd
CVE-2021-3054MEDIUMCVSS 6.6≥ 8.1, < 8.1.20≥ 9.0, < 9.0.14+3 more2021-09-08
CVE-2021-3054 [MEDIUM] CWE-367 CVE-2021-3054: A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-O
A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permission to upload plugins to execute arbitrary code with root user privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0
cvelistv5nvd
CVE-2021-3050HIGHCVSS 8.8≥ 9.0.10, < 9.0*≥ 9.1.4, < 9.1*+2 more2021-08-11
CVE-2021-3050 [HIGH] CWE-78 CVE-2021-3050: An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an auth
An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 9.0 version 9.0.10 through PAN-OS 9.0.14; PAN-OS 9.1 version 9.1.4 through PAN-OS 9.1.10; PAN-OS 10.0 version 10.0.7 and earlier PAN-OS 10.0 version
cvelistv5nvd
CVE-2021-3045MEDIUMCVSS 4.9≥ 8.1, < 8.1.19≥ 9.0, < 9.0.14+1 more2021-08-11
CVE-2021-3045 [MEDIUM] CWE-88 CVE-2021-3045: An OS command argument injection vulnerability in the Palo Alto Networks PAN-OS web interface enable
An OS command argument injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to read any arbitrary file from the file system. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.19; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.10. PAN-OS 1
cvelistv5nvd
CVE-2021-3046MEDIUMCVSS 6.5≥ 8.1, < 8.1.19≥ 9.0, < 9.0.14+2 more2021-08-11
CVE-2021-3046 [MEDIUM] CWE-287 CVE-2021-3046: An improper authentication vulnerability exists in Palo Alto Networks PAN-OS software that enables a
An improper authentication vulnerability exists in Palo Alto Networks PAN-OS software that enables a SAML authenticated attacker to impersonate any other user in the GlobalProtect Portal and GlobalProtect Gateway when they are configured to use SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.19; PAN-OS 9.0 versions
cvelistv5nvd
CVE-2021-3048MEDIUMCVSS 5.9≥ 9.0, < 9.0.14≥ 9.1, < 9.1.9+1 more2021-08-11
CVE-2021-3048 [MEDIUM] CWE-20 CVE-2021-3048: Certain invalid URL entries contained in an External Dynamic List (EDL) cause the Device Server daem
Certain invalid URL entries contained in an External Dynamic List (EDL) cause the Device Server daemon (devsrvr) to stop responding. This condition causes subsequent commits on the firewall to fail and prevents administrators from performing commits and configuration changes even though the firewall remains otherwise functional. If the firewall then re
cvelistv5nvd
CVE-2021-3047LOWCVSS 3.1≥ 8.1, < 8.1.19≥ 9.0, < 9.0.14+2 more2021-08-11
CVE-2021-3047 [LOW] CWE-338 CVE-2021-3047: A cryptographically weak pseudo-random number generator (PRNG) is used during authentication to the
A cryptographically weak pseudo-random number generator (PRNG) is used during authentication to the Palo Alto Networks PAN-OS web interface. This enables an authenticated attacker, with the capability to observe their own authentication secrets over a long duration on the PAN-OS appliance, to impersonate another authenticated web interface administrator's
cvelistv5nvd
CVE-2021-3036MEDIUMCVSS 4.4≥ 8.1, < 8.1.19≥ 9.0, < 9.0.12+2 more2021-04-20
CVE-2021-3036 [MEDIUM] CWE-532 CVE-2021-3036: An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to use the PAN-OS XML API and exists only when a client inc
cvelistv5nvd
CVE-2021-3037LOWCVSS 2.3≥ 8.1, < 8.1.19≥ 9.0, < 9.0.13+1 more2021-04-20
CVE-2021-3037 [LOW] CWE-534 CVE-2021-3037: An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS configuration to the destination server.
cvelistv5nvd
CVE-2021-3031MEDIUMCVSS 5.0≥ 8.1, < 8.1.18≥ 9.0, < 9.0.12+1 more2021-01-13
CVE-2021-3031 [MEDIUM] CWE-200 PAN-OS: Information exposure in Ethernet data frame construction (Etherleak)
PAN-OS: Information exposure in Ethernet data frame construction (Etherleak)
Padding bytes in Ethernet packets on PA-200, PA-220, PA-500, PA-800, PA-2000 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series firewalls are not cleared before the data frame is created. This leaks a small amount of random information from the firewall memory into the Ethernet packets. An
cvelistv5
CVE-2021-3032MEDIUMCVSS 4.4≥ 8.1, < 8.1.18≥ 9.0, < 9.0.12+2 more2021-01-13
CVE-2021-3032 [MEDIUM] CWE-532 CVE-2021-3032: An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where configuration secrets for the “http”, “email”, and “snmptrap” v3 log forwarding server profiles can be logged to the logrcvr.log system log. Logged information may include up to 1024 bytes of the configuration including the username and password in
cvelistv5nvd