Security News > 2020 > July > Palo Alto Networks Patches Command Injection Vulnerabilities in PAN-OS
Palo Alto Networks informed customers on Wednesday that it has patched two high-severity vulnerabilities in PAN-OS, the software running on the company's firewalls.
"An attacker would require some level of specific information about the configuration of an impacted firewall or perform brute-force attacks to exploit this issue," the vendor said in its advisory.
The second high-severity vulnerability is tracked as CVE-2020-2030 and it allows an attacker with admin access to the PAN-OS management interface to execute arbitrary OS commands with root privileges.
Palo Alto Networks says both vulnerabilities were discovered internally and there is no evidence of malicious exploitation.
The company also informed customers that it has patched two medium-severity vulnerabilities in PAN-OS: one that can be exploited by an authenticated attacker with admin privileges for denial-of-service attacks, and one related to the use of the outdated TLS 1.0 protocol for some communications between cloud-delivered services and PAN-OS. These vulnerabilities do not appear to be as dangerous as CVE-2020-2021, which Palo Alto Networks patched in late June and which allows a network attacker to bypass authentication.
News URL
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-07-08 | CVE-2020-2030 | OS Command Injection vulnerability in Paloaltonetworks Pan-Os An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges. | 7.2 |
2020-06-29 | CVE-2020-2021 | Improper Verification of Cryptographic Signature vulnerability in Paloaltonetworks Pan-Os When Security Assertion Markup Language (SAML) authentication is enabled and the 'Validate Identity Provider Certificate' option is disabled (unchecked), improper verification of signatures in PAN-OS SAML authentication enables an unauthenticated network-based attacker to access protected resources. | 10.0 |