Security News > 2020 > July > Palo Alto Networks Patches Command Injection Vulnerabilities in PAN-OS

Palo Alto Networks Patches Command Injection Vulnerabilities in PAN-OS
2020-07-09 12:02

Palo Alto Networks informed customers on Wednesday that it has patched two high-severity vulnerabilities in PAN-OS, the software running on the company's firewalls.

"An attacker would require some level of specific information about the configuration of an impacted firewall or perform brute-force attacks to exploit this issue," the vendor said in its advisory.

The second high-severity vulnerability is tracked as CVE-2020-2030 and it allows an attacker with admin access to the PAN-OS management interface to execute arbitrary OS commands with root privileges.

Palo Alto Networks says both vulnerabilities were discovered internally and there is no evidence of malicious exploitation.

The company also informed customers that it has patched two medium-severity vulnerabilities in PAN-OS: one that can be exploited by an authenticated attacker with admin privileges for denial-of-service attacks, and one related to the use of the outdated TLS 1.0 protocol for some communications between cloud-delivered services and PAN-OS. These vulnerabilities do not appear to be as dangerous as CVE-2020-2021, which Palo Alto Networks patched in late June and which allows a network attacker to bypass authentication.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/P0Q1ACyUkwU/palo-alto-networks-patches-command-injection-vulnerabilities-pan-os

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2020-07-08 CVE-2020-2030 OS Command Injection vulnerability in Paloaltonetworks Pan-Os
An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges.
network
low complexity
paloaltonetworks CWE-78
7.2
2020-06-29 CVE-2020-2021 Improper Verification of Cryptographic Signature vulnerability in Paloaltonetworks Pan-Os
When Security Assertion Markup Language (SAML) authentication is enabled and the 'Validate Identity Provider Certificate' option is disabled (unchecked), improper verification of signatures in PAN-OS SAML authentication enables an unauthenticated network-based attacker to access protected resources.
network
low complexity
paloaltonetworks CWE-347
critical
10.0