Submit #180: PAN-OS: OS command injection vulnerability in GlobalProtect portalinfo

TitlePAN-OS: OS command injection vulnerability in GlobalProtect portal
DescriptionAn OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows an unauthenticated network-based attacker to execute arbitrary OS commands with root privileges. An attacker would require some level of specific information about the configuration of an impacted firewall or perform brute-force attacks to exploit this issue. This issue cannot be exploited if the GlobalProtect portal feature is not enabled. This issue impacts PAN-OS 9.1 versions earlier than PAN-OS 9.1.3; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; all versions of PAN-OS 8.0 and PAN-OS 7.1. Prisma Access services are not impacted by this vulnerability. Firewalls that were upgraded to the latest versions of PAN-OS to resolve CVE-2020-2021 are not vulnerable to this issue. Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.
Source⚠️ https://security.paloaltonetworks.com/CVE-2020-2034
Userfsi_isac (ID 11860)
Submission07/09/2020 07:48 (4 years ago)
Moderation07/09/2020 16:09 (8 hours later)
Accepted
Accepted
VulDB EntryVDB-157773

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!