Submit #180: PAN-OS: OS command injection vulnerability in GlobalProtect portal
Title | PAN-OS: OS command injection vulnerability in GlobalProtect portal |
---|---|
Description | An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network-based attacker to execute arbitrary OS commands with root privileges. An attacker would require some level of specific information about the configuration of an impacted firewall or perform brute-force attacks to exploit this issue. This issue cannot be exploited if the GlobalProtect portal feature is not enabled. This issue impacts PAN-OS 9.1 versions earlier than PAN-OS 9.1.3; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; all versions of PAN-OS 8.0 and PAN-OS 7.1. Prisma Access services are not impacted by this vulnerability. Firewalls that were upgraded to the latest versions of PAN-OS to resolve CVE-2020-2021 are not vulnerable to this issue. Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability. |
Source | ⚠️ https:/ |
User | fsi_isac (ID 11860) |
Submission | 07/09/2020 07:48 (4 years ago) |
Moderation | 07/09/2020 16:09 (8 hours later) |
Accepted | Accepted |
VulDB Entry | VDB-157773 |