Paloalto PAN-OS vulnerabilities

300 known vulnerabilities affecting paloalto/pan-os.

Total CVEs
300
CISA KEV
19
actively exploited
Public exploits
32
Exploited in wild
18
Severity breakdown
CRITICAL53HIGH115MEDIUM119LOW13

Vulnerabilities

Page 8 of 15
CVE-2014-1692HIGHCVSS 7.52020-05-13
CVE-2014-1692 [HIGH] PAN-SA-2020-0004 Informational: Third-party or open source vulnerabilities that do not affect PAN-OS PAN-SA-2020-0004 Informational: Third-party or open source vulnerabilities that do not affect PAN-OS Palo Alto Networks Product Security Assurance team has evaluated and determined that these third-party or open source vulnerabilities do not have a security impact on PAN-OS, or the scenarios required for successful CVEs: CVE-2014-1692, CVE-2014-2532, CVE-2014-2653, CVE-2015
paloalto
CVE-2016-4450HIGHCVSS 7.52020-05-13
CVE-2016-4450 [HIGH] CWE-476 PAN-SA-2020-0006 PAN-OS: Nginx software upgraded to resolve multiple vulnerabilities PAN-SA-2020-0006 PAN-OS: Nginx software upgraded to resolve multiple vulnerabilities Nginx software included with PAN-OS has been upgraded to resolve multiple vulnerabilities. This issue affects: All PAN-OS 7.1 and 8.0 versions; PAN-OS 8.1 versions earlier than 8.1.14; PAN-OS 9.0 versions earlier than 9.0.7. The resolved vulnerabilities include: CVE CVSS Summary CVE-2016-4450 7.5 (
paloalto
CVE-2020-2011HIGHCVSS 7.52020-05-13
CVE-2020-2011 [HIGH] CWE-20 PAN-OS: Panorama registration denial of service PAN-OS: Panorama registration denial of service An improper input validation vulnerability in the configuration daemon of Palo Alto Networks PAN-OS Panorama allows for a remote unauthenticated user to send a specifically crafted registration request to the device that causes the configuration service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS Panorama services by restartin
paloalto
CVE-2020-2007HIGHCVSS 7.22020-05-13
CVE-2020-2007 [HIGH] CWE-78 PAN-OS: OS command injection in management server PAN-OS: OS command injection in management server An OS command injection vulnerability in the management server component of PAN-OS allows an authenticated user to potentially execute arbitrary commands with root privileges. Affected products: PAN-OS Solution: This issue is fixed in PAN-OS 9.0.7 and later PAN-OS 9.0 versions; PAN-OS 8.1.14 and later PAN-OS 8.1 versions; and all later PAN-OS versions. PAN-OS 8.0 is
paloalto
CVE-2020-2002HIGHCVSS 8.12020-05-13
CVE-2020-2002 [HIGH] CWE-290 PAN-OS: Spoofed Kerberos key distribution center authentication bypass PAN-OS: Spoofed Kerberos key distribution center authentication bypass An authentication bypass by spoofing vulnerability exists in the authentication daemon and User-ID components of Palo Alto Networks PAN-OS by failing to verify the integrity of the Kerberos key distribution center (KDC) before authenticating users. This affects all forms of authentication that use a Kerberos authentication pro
paloalto
CVE-2020-2015HIGHCVSS 8.82020-05-13
CVE-2020-2015 [HIGH] CWE-120 PAN-OS: Buffer overflow in the management server PAN-OS: Buffer overflow in the management server A buffer overflow vulnerability in the PAN-OS management server allows authenticated users to crash system processes or potentially execute arbitrary code with root privileges. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.7; PAN-OS 9.1 versions earlier than 9.1.1; All versions
paloalto
CVE-2016-10012HIGHCVSS 7.82020-05-13
CVE-2016-10012 [HIGH] CWE-119 PAN-SA-2020-0005 PAN-OS: OpenSSH software upgraded to resolve multiple vulnerabilities PAN-SA-2020-0005 PAN-OS: OpenSSH software upgraded to resolve multiple vulnerabilities OpenSSH software included with PAN-OS has been upgraded to resolve security vulnerability CVE-2016-10012. Additionally, code changes have been made to the server component of the OpenSSH software included in PAN-OS in response to CVE-2015-8325 and CVE-2016-1908 though PAN-OS is not impacted by
paloalto
CVE-2020-2009HIGHCVSS 7.22020-05-13
CVE-2020-2009 [HIGH] CWE-73 PAN-OS: Panorama SD WAN arbitrary file creation PAN-OS: Panorama SD WAN arbitrary file creation An external control of filename vulnerability in the SD WAN component of Palo Alto Networks PAN-OS Panorama allows an authenticated administrator to send a request that results in the creation and write of an arbitrary file on all firewalls managed by the Panorama. In some cases this results in arbitrary code execution with root permissions. Affected products: PAN-OS Sol
paloalto
CVE-2017-7529HIGHCVSS 7.52020-05-13
CVE-2017-7529 [HIGH] CWE-190 PAN-OS: Nginx integer overflow may lead to information leak PAN-OS: Nginx integer overflow may lead to information leak Nginx web-server included with PAN-OS is vulnerable to an integer overflow vulnerability that can leak potentially a cache file header if a response was returned from cache. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.6; All versions of PAN-OS 8.0. Affe
paloalto
CVE-2020-1996MEDIUMCVSS 5.32020-05-13
CVE-2020-1996 [MEDIUM] CWE-862 PAN-OS: Panorama management server log injection PAN-OS: Panorama management server log injection A missing authorization vulnerability in the management server component of PAN-OS Panorama allows a remote unauthenticated user to inject messages into the management server ms.log file. This vulnerability can be leveraged to obfuscate an ongoing attack or fabricate log entries in the ms.log file Affected products: PAN-OS Solution: This issue is fixed in PAN-OS 8.1
paloalto
CVE-2020-1997MEDIUMCVSS 6.12020-05-13
CVE-2020-1997 [MEDIUM] CWE-601 PAN-OS: GlobalProtect registration open redirect PAN-OS: GlobalProtect registration open redirect An open redirection vulnerability in the GlobalProtect component of Palo Alto Networks PAN-OS allows an attacker to specify an arbitrary redirection target away from the trusted GlobalProtect gateway. If the user then successfully authenticates it will cause them to access an unexpected and potentially malicious website. Affected products: PAN-OS Solution: This issu
paloalto
CVE-2020-1994MEDIUMCVSS 4.42020-05-13
CVE-2020-1994 [MEDIUM] CWE-377 PAN-OS: Predictable temporary file vulnerability PAN-OS: Predictable temporary file vulnerability A predictable temporary file vulnerability in PAN-OS allows a local authenticated user with shell access to corrupt arbitrary system files affecting the integrity of the system. This issue affects: All versions of PAN-OS 7.1 and 8.0; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.7. Affected products: PAN-OS Solution: This issue is f
paloalto
CVE-2020-1993MEDIUMCVSS 5.42020-05-13
CVE-2020-1993 [MEDIUM] CWE-384 PAN-OS: GlobalProtect Portal PHP session fixation vulnerability PAN-OS: GlobalProtect Portal PHP session fixation vulnerability The GlobalProtect Portal feature in PAN-OS does not set a new session identifier after a successful user login, which allows session fixation attacks, if an attacker is able to control a user's session ID. Affected products: PAN-OS Solution: This issue is fixed in PAN-OS 8.1.14, PAN-OS 9.0.8, PAN-OS 9.1.0, and all later PAN-OS versions.
paloalto
CVE-2020-2003MEDIUMCVSS 6.52020-05-13
CVE-2020-2003 [MEDIUM] CWE-73 PAN-OS: Authenticated administrator can delete arbitrary system file PAN-OS: Authenticated administrator can delete arbitrary system file An external control of filename vulnerability in the command processing of PAN-OS allows an authenticated administrator to delete arbitrary system files affecting the integrity of the system or causing denial of service to all PAN-OS services. This issue affects: All versions of PAN-OS 7.1 and 8.0; PAN-OS 8.1 versions before 8.1
paloalto
CVE-2020-2005MEDIUMCVSS 6.12020-05-13
CVE-2020-2005 [MEDIUM] CWE-79 PAN-OS: GlobalProtect Clientless VPN session hijacking PAN-OS: GlobalProtect Clientless VPN session hijacking A cross-site scripting (XSS) vulnerability exists when visiting malicious websites with the Palo Alto Networks GlobalProtect Clientless VPN that can compromise the user's active session. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.7; All versions of PAN-OS 8.0.
paloalto
CVE-2020-2017MEDIUMCVSS 6.12020-05-13
CVE-2020-2017 [MEDIUM] CWE-79 PAN-OS: DOM-Based cross site scripting vulnerability in management web interface PAN-OS: DOM-Based cross site scripting vulnerability in management web interface A DOM-Based Cross Site Scripting Vulnerability exists in PAN-OS and Panorama Management Web Interfaces. A remote attacker able to convince an authenticated administrator to click on a crafted link to PAN-OS and Panorama Web Interfaces could execute arbitrary JavaScript code in the administrator's browser a
paloalto
CVE-2020-1995MEDIUMCVSS 4.92020-05-13
CVE-2020-1995 [MEDIUM] CWE-476 PAN-OS: Management server rasmgr denial of service PAN-OS: Management server rasmgr denial of service A NULL pointer dereference vulnerability in Palo Alto Networks PAN-OS allows an authenticated administrator to send a request that causes the rasmgr daemon to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode. Affected products: PAN-OS Solution: This issu
paloalto
CVE-2020-1992CRITICALCVSS 9.82020-04-08
CVE-2020-1992 [CRITICAL] CWE-134 PAN-OS on PA-7000 Series: Varrcvr daemon network-based denial of service or privilege escalation PAN-OS on PA-7000 Series: Varrcvr daemon network-based denial of service or privilege escalation A format string vulnerability in the Varrcvr daemon of PAN-OS on PA-7000 Series devices with a Log Forwarding Card (LFC) allows remote attackers to crash the daemon creating a denial of service condition or potentially execute code with root privileges. This issue affect
paloalto
CVE-2020-1990HIGHCVSS 7.22020-04-08
CVE-2020-1990 [HIGH] CWE-121 PAN-OS: Buffer overflow in the management server PAN-OS: Buffer overflow in the management server A stack-based buffer overflow vulnerability in the management server component of PAN-OS allows an authenticated user to upload a corrupted PAN-OS configuration and potentially execute code with root privileges. This issue affects Palo Alto Networks PAN-OS 8.1 versions before 8.1.13; 9.0 versions before 9.0.7. This issue does not affect PAN-OS 7.1. Affected products:
paloalto
CVE-2019-0139MEDIUMCVSS 6.72020-04-08
CVE-2019-0139 [MEDIUM] PAN PAN Palo Alto Networks Product Security Assurance team has evaluated and determined that these third-party or open source vulnerabilities do not have a security impact on Palo Alto Networks Products, or the scenarios required for successful CVEs: CVE-2019-0139, CVE-2019-0140, CVE-2019-0142, CVE-2019-0143, CVE-2019-0144, CVE-2019-0145, CVE-2019-0146, CVE-2019-0147, CVE-2019-0148, CVE-2019-0149, CVE-2019-0150, CVE-2019-11168, CVE-2019-11170, CVE-2019-11171, CVE-2019-11
paloalto