Paloaltonetworks PAN-OS vulnerabilities
209 known vulnerabilities affecting paloaltonetworks/pan-os.
Total CVEs
209
CISA KEV
12
actively exploited
Public exploits
14
Exploited in wild
9
Severity breakdown
CRITICAL33HIGH75MEDIUM93LOW8
Vulnerabilities
Page 5 of 11
CVE-2021-3032MEDIUMCVSS 4.4≥ 8.1.0, < 8.1.18≥ 9.0.0, < 9.0.12+2 more2021-01-13
CVE-2021-3032 [MEDIUM] CWE-532 CVE-2021-3032: An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where configuration secrets for the “http”, “email”, and “snmptrap” v3 log forwarding server profiles can be logged to the logrcvr.log system log. Logged information may include up to 1024 bytes of the configuration including the username and password in
nvd
CVE-2021-3031MEDIUMCVSS 4.3≥ 8.1.0, < 8.1.18≥ 9.0.0, < 9.0.12+1 more2021-01-13
CVE-2021-3031 [MEDIUM] CVE-2021-3031: Padding bytes in Ethernet packets on PA-200, PA-220, PA-500, PA-800, PA-2000 Series, PA-3000 Series,
Padding bytes in Ethernet packets on PA-200, PA-220, PA-500, PA-800, PA-2000 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series firewalls are not cleared before the data frame is created. This leaks a small amount of random information from the firewall memory into the Ethernet packets. An attacker on the same Ethernet subnet as the PA
nvd
CVE-2020-2022HIGHCVSS 7.5≥ 8.1.0, < 8.1.17≥ 9.0.0, < 9.0.11+1 more2020-11-12
CVE-2020-2022 [HIGH] CWE-200 CVE-2020-2022: An information exposure vulnerability exists in Palo Alto Networks Panorama software that discloses
An information exposure vulnerability exists in Palo Alto Networks Panorama software that discloses the token for the Panorama web interface administrator's session to a managed device when the Panorama administrator performs a context switch into that device. This vulnerability allows an attacker to gain privileged access to the Panorama web interface.
nvd
CVE-2020-2000HIGHCVSS 7.2≥ 8.1.0, < 8.1.16≥ 9.0.0, < 9.0.10+2 more2020-11-12
CVE-2020-2000 [HIGH] CWE-20 CVE-2020-2000: An OS command injection and memory corruption vulnerability in the PAN-OS management web interface t
An OS command injection and memory corruption vulnerability in the PAN-OS management web interface that allows authenticated administrators to disrupt system processes and potentially execute arbitrary code and OS commands with root privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0
nvd
CVE-2020-2050HIGHCVSS 8.2≥ 8.1.0, < 8.1.17≥ 9.0.0, < 9.0.11+2 more2020-11-12
CVE-2020-2050 [HIGH] CWE-285 CVE-2020-2050: An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Ne
An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an attacker to bypass all client certificate checks with an invalid certificate. A remote attacker can successfully authenticate as any user and gain access to restricted VPN network resources when the gateway or portal
nvd
CVE-2020-1999MEDIUMCVSS 5.3≥ 7.1.0, ≤ 7.1.26≥ 8.0.0, ≤ 8.0.20+3 more2020-11-12
CVE-2020-1999 [MEDIUM] CWE-754 CVE-2020-1999: A vulnerability exists in the Palo Alto Network PAN-OS signature-based threat detection engine that
A vulnerability exists in the Palo Alto Network PAN-OS signature-based threat detection engine that allows an attacker to communicate with devices in the network in a way that is not analyzed for threats by sending data through specifically crafted TCP packets. This technique evades signature-based threat detection. This issue impacts: PAN-OS 8.1 versi
nvd
CVE-2020-2048LOWCVSS 3.3≥ 8.1.0, < 8.1.17≥ 9.0.0, < 9.0.11+1 more2020-11-12
CVE-2020-2048 [LOW] CWE-532 CVE-2020-2048: An information exposure through log file vulnerability exists where the password for the configured
An information exposure through log file vulnerability exists where the password for the configured system proxy server for a PAN-OS appliance may be displayed in cleartext when using the CLI in Palo Alto Networks PAN-OS software. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1
nvd
CVE-2020-2040CRITICALCVSS 9.8≥ 8.0.0, ≤ 8.0.20≥ 8.1.0, < 8.1.15+2 more2020-09-09
CVE-2020-2040 [CRITICAL] CWE-120 CVE-2020-2040: A buffer overflow vulnerability in PAN-OS allows an unauthenticated attacker to disrupt system proce
A buffer overflow vulnerability in PAN-OS allows an unauthenticated attacker to disrupt system processes and potentially execute arbitrary code with root privileges by sending a malicious request to the Captive Portal or Multi-Factor Authentication interface. This issue impacts: All versions of PAN-OS 8.0; PAN-OS 8.1 versions earlier than PAN-OS 8.1
nvd
CVE-2020-2038HIGHCVSS 7.2PoC≥ 9.0.0, < 9.0.10≥ 9.1.0, < 9.1.4+1 more2020-09-09
CVE-2020-2038 [HIGH] CWE-78 CVE-2020-2038: An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated a
An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges. This issue impacts: PAN-OS 9.0 versions earlier than 9.0.10; PAN-OS 9.1 versions earlier than 9.1.4; PAN-OS 10.0 versions earlier than 10.0.1.
nvd
CVE-2020-2037HIGHCVSS 7.2≥ 8.1.0, < 8.1.16≥ 9.0.0, < 9.0.10+1 more2020-09-09
CVE-2020-2037 [HIGH] CWE-78 CVE-2020-2037: An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated a
An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.10; PAN-OS 9.1 versions earlier than PAN-OS 9.1.3.
nvd
CVE-2020-2041HIGHCVSS 7.5≥ 8.0.0, ≤ 8.0.20≥ 8.1.0, < 8.1.162020-09-09
CVE-2020-2041 [HIGH] CWE-16 CVE-2020-2041: An insecure configuration of the appweb daemon of Palo Alto Networks PAN-OS 8.1 allows a remote unau
An insecure configuration of the appweb daemon of Palo Alto Networks PAN-OS 8.1 allows a remote unauthenticated user to send a specifically crafted request to the device that causes the appweb service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenanc
nvd
CVE-2020-2036HIGHCVSS 8.8PoC≥ 8.1.0, < 8.1.16≥ 9.0.0, < 9.0.92020-09-09
CVE-2020-2036 [HIGH] CWE-79 CVE-2020-2036: A reflected cross-site scripting (XSS) vulnerability exists in the PAN-OS management web interface.
A reflected cross-site scripting (XSS) vulnerability exists in the PAN-OS management web interface. A remote attacker able to convince an administrator with an active authenticated session on the firewall management interface to click on a crafted link to that management web interface could potentially execute arbitrary JavaScript code in the administrato
nvd
CVE-2020-2042HIGHCVSS 7.2≥ 10.0.0, < 10.0.12020-09-09
CVE-2020-2042 [HIGH] CWE-121 CVE-2020-2042: A buffer overflow vulnerability in the PAN-OS management web interface allows authenticated administ
A buffer overflow vulnerability in the PAN-OS management web interface allows authenticated administrators to disrupt system processes and potentially execute arbitrary code with root privileges. This issue impacts only PAN-OS 10.0 versions earlier than PAN-OS 10.0.1.
nvd
CVE-2020-2039MEDIUMCVSS 5.3≥ 8.1.0, < 8.1.16≥ 9.0.0, < 9.0.10+2 more2020-09-09
CVE-2020-2039 [MEDIUM] CWE-400 CVE-2020-2039: An uncontrolled resource consumption vulnerability in Palo Alto Networks PAN-OS allows for a remote
An uncontrolled resource consumption vulnerability in Palo Alto Networks PAN-OS allows for a remote unauthenticated user to upload temporary files through the management web interface that are not properly deleted after the request is finished. It is possible for an attacker to disrupt the availability of the management web interface by repeatedly uplo
nvd
CVE-2020-2044LOWCVSS 3.3≥ 8.0.0, ≤ 8.0.20≥ 8.1.0, < 8.1.16+2 more2020-09-09
CVE-2020-2044 [LOW] CWE-532 CVE-2020-2044: An information exposure through log file vulnerability where an administrator's password or other se
An information exposure through log file vulnerability where an administrator's password or other sensitive information may be logged in cleartext while using the CLI in Palo Alto Networks PAN-OS software. The opcmdhistory.log file was introduced to track operational command (op-command) usage but did not mask all sensitive information. The opcmdhistory.
nvd
CVE-2020-2043LOWCVSS 3.3≥ 8.1.0, ≤ 8.1.15≥ 9.0.0, < 9.0.10+1 more2020-09-09
CVE-2020-2043 [LOW] CWE-532 CVE-2020-2043: An information exposure through log file vulnerability where sensitive fields are recorded in the co
An information exposure through log file vulnerability where sensitive fields are recorded in the configuration log without masking on Palo Alto Networks PAN-OS software when the after-change-detail custom syslog field is enabled for configuration logs and the sensitive field appears multiple times in one log entry. The first instance of the sensitive fi
nvd
CVE-2020-2034HIGHCVSS 8.1≥ 7.1.0, ≤ 7.1.26≥ 8.0.0, ≤ 8.0.20+3 more2020-07-08
CVE-2020-2034 [HIGH] CWE-78 CVE-2020-2034: An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated n
An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network based attacker to execute arbitrary OS commands with root privileges. An attacker requires some knowledge of the firewall to exploit this issue. This issue can not be exploited if GlobalProtect portal feature is not enabled. This issue impacts PAN-O
nvd
CVE-2020-2030HIGHCVSS 7.2≥ 7.1.0, ≤ 7.1.26≥ 8.0.0, ≤ 8.0.20+1 more2020-07-08
CVE-2020-2030 [HIGH] CWE-78 CVE-2020-2030: An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated a
An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges. This issue impacts PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; and all versions of PAN-OS 7.1 and PAN-OS 8.0. This issue does not impact PAN-OS 9.0, PAN-OS 9.1, or Prisma Access servi
nvd
CVE-2020-2031MEDIUMCVSS 4.9≥ 9.1.0, < 9.1.32020-07-08
CVE-2020-2031 [MEDIUM] CWE-191 CVE-2020-2031: An integer underflow vulnerability in the dnsproxyd component of the PAN-OS management interface all
An integer underflow vulnerability in the dnsproxyd component of the PAN-OS management interface allows authenticated administrators to issue a command from the command line interface that causes the component to stop responding. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putt
nvd
CVE-2020-1982MEDIUMCVSS 4.8≥ 8.0.0, ≤ 8.0.20≥ 8.1.0, < 8.1.14+2 more2020-07-08
CVE-2020-1982 [MEDIUM] CWE-326 CVE-2020-1982: Certain communication between PAN-OS and cloud-delivered services inadvertently use TLS 1.0, which i
Certain communication between PAN-OS and cloud-delivered services inadvertently use TLS 1.0, which is known to be a cryptographically weak protocol. These cloud services include Cortex Data Lake, the Customer Support Portal, and the Prisma Access infrastructure. Conditions required for exploitation of known TLS 1.0 weaknesses do not exist for the comm
nvd