Paloalto Prisma Sd-Wan Ion vulnerabilities

6 known vulnerabilities affecting paloalto/prisma_sd-wan_ion.

Total CVEs
6
CISA KEV
1
actively exploited
Public exploits
3
Exploited in wild
1
Severity breakdown
CRITICAL2HIGH3MEDIUM1

Vulnerabilities

Page 1 of 1
CVE-2023-48795MEDIUMCVSS 5.9PoC2024-01-09
CVE-2023-48795 [MEDIUM] CWE-354 Impact of Terrapin SSH Attack Impact of Terrapin SSH Attack The Terrapin attack allows an attacker with the ability to intercept SSH traffic on affected Palo Alto Networks products (through machine-in-the-middle or MitM attacks) to downgrade connection security and force the usage of less secure client authentication algorithms when an administrator or user connects to the product. This issue does not impact the SSH server component of PAN-OS software configured
paloalto
CVE-2023-38545CRITICALCVSS 9.82023-10-12
CVE-2023-38545 [CRITICAL] CWE-120 Impact of curl and libcurl Vulnerabilities (CVE-2023-38545, CVE-2023-38546) Impact of curl and libcurl Vulnerabilities (CVE-2023-38545, CVE-2023-38546) The Palo Alto Networks Product Security Assurance team has evaluated the curl and libcurl vulnerabilities (CVE-2023-38545, CVE-2023-38546) that were disclosed on October 11, 2023 as they relate to our products. At this time, there are no demonstrated scenarios that enable successful exploitation of these vulner
paloalto
CVE-2023-38802HIGHCVSS 7.52023-09-13
CVE-2023-38802 [HIGH] CWE-754 PAN-OS: Denial-of-Service (DoS) Vulnerability in BGP Software PAN-OS: Denial-of-Service (DoS) Vulnerability in BGP Software BGP software such as FRRouting FRR included as part of the PAN-OS, Prisma SD-WAN ION, and Prisma Access routing features enable a remote attacker to incorrectly reset network sessions though an invalid BGP update. This issue is applicable only to devices and appliances with BGP routing features enabled. This issue requires the remote attacker
paloalto
CVE-2023-22809HIGHCVSS 7.8PoC2023-02-08
CVE-2023-22809 [HIGH] Impact of Sudo Vulnerability CVE-2023-22809 Impact of Sudo Vulnerability CVE-2023-22809 The Palo Alto Networks Product Security Assurance team has evaluated the sudo software vulnerability CVE-2023-22809 and has determined that the following Palo Alto Networks products do not expose the sudo program and, therefore, do not offer any scenarios required for successful exploitation of this vulnerability. Affected products: Cloud NGFW, PAN-OS, Prisma Access, Prisma SD-WAN ION
paloalto
CVE-2022-22963CRITICALCVSS 9.8KEVPoC2022-03-31
CVE-2022-22963 [CRITICAL] CWE-497 Informational: Impact of Spring Vulnerabilities CVE-2022-22963 and CVE-2022-22965 Informational: Impact of Spring Vulnerabilities CVE-2022-22963 and CVE-2022-22965 The Palo Alto Networks Product Security Assurance team has completed its evaluation of the Spring Cloud Function vulnerability CVE-2022-22963 and Spring Core vulnerability CVE-2022-22965 for all products and services. All Palo Alto Networks cloud services with possible impact have been mitigated and
paloalto
CVE-2021-41617HIGHCVSS 7.02021-11-30
CVE-2021-41617 [HIGH] CWE-250 Informational: Impact of the OpenSSH Vulnerability CVE-2021-41617 on PAN-OS Informational: Impact of the OpenSSH Vulnerability CVE-2021-41617 on PAN-OS The Palo Alto Networks Product Security Assurance team has evaluated the OpenSSH software CVE-2021-41617 vulnerability. PAN-OS and Prisma SD-WAN ION software does not utilize the ssh configuration options required to exploit this vulnerability. There are no scenarios that enable successful exploitation of the vulne
paloalto