Vulnerabilities > CVE-2017-15942 - Unspecified vulnerability in Paloaltonetworks Pan-Os
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.13, and 8.0.x before 8.0.6 allows remote attackers to cause a denial of service via vectors related to the management interface.
Vulnerable Configurations
Nessus
NASL family Palo Alto Local Security Checks NASL id PALO_ALTO_PAN-OS_7_1_13.NASL description The version of Palo Alto Networks PAN-OS running on the remote host is 7.1.x prior to 7.1.13. It is, therefore, affected by a vulnerability that allow a non-authenticated third party to mount a Denial of Service attack against the management interface. Successful exploitation of this issue allows an attacker to render the PAN-OS management interface unavailable. last seen 2020-06-01 modified 2020-06-02 plugin id 105297 published 2017-12-15 reporter This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/105297 title Palo Alto Networks PAN-OS 7.1.x < 7.1.13 Management Interface Unspecified Remote DoS code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(105297); script_version("1.6"); script_cvs_date("Date: 2018/08/01 13:59:45"); script_cve_id("CVE-2017-15942"); script_bugtraq_id(102075); script_name(english:"Palo Alto Networks PAN-OS 7.1.x < 7.1.13 Management Interface Unspecified Remote DoS"); script_summary(english:"Checks the PAN-OS version."); script_set_attribute(attribute:"synopsis", value: "The remote PAN-OS host is affected by a Management Interface remote DoS vulnerability."); script_set_attribute(attribute:"description",value: "The version of Palo Alto Networks PAN-OS running on the remote host is 7.1.x prior to 7.1.13. It is, therefore, affected by a vulnerability that allow a non-authenticated third party to mount a Denial of Service attack against the management interface. Successful exploitation of this issue allows an attacker to render the PAN-OS management interface unavailable."); # https://securityadvisories.paloaltonetworks.com/Home/Detail/96 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?06c321db"); # https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os-release-notes/pan-os-7-1-13-addressed-issues script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?dd1a1ef2"); script_set_attribute(attribute:"solution", value: "Upgrade to Palo Alto Networks PAN-OS version 7.1.13 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2017/12/05"); script_set_attribute(attribute:"patch_publication_date", value:"2017/12/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2017/12/15"); script_set_attribute(attribute:"plugin_type", value:"combined"); script_set_attribute(attribute:"cpe", value:"cpe:/o:paloaltonetworks:pan-os"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Palo Alto Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("palo_alto_version.nbin"); script_require_keys("Host/Palo_Alto/Firewall/Version", "Host/Palo_Alto/Firewall/Full_Version"); exit(0); } include("vcf.inc"); app_name = "Palo Alto Networks PAN-OS"; app_info = vcf::get_app_info(app:app_name, kb_ver:"Host/Palo_Alto/Firewall/Full_Version", webapp:true); vcf::check_granularity(app_info:app_info, sig_segments:2); constraints = [ { "min_version" : "7.1", "fixed_version" : "7.1.13" } ]; vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
NASL family Palo Alto Local Security Checks NASL id PALO_ALTO_PAN-OS_8_0_6.NASL description The version of Palo Alto Networks PAN-OS running on the remote host is 8.0.x prior to 8.0.6. It is, therefore, affected by multiple vulnerabilities. last seen 2020-06-01 modified 2020-06-02 plugin id 104811 published 2017-12-15 reporter This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/104811 title Palo Alto Networks PAN-OS 8.0.x < 8.0.6 Multiple Vulnerabilities code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(104811); script_version("1.9"); script_cvs_date("Date: 2018/08/01 13:59:45"); script_cve_id("CVE-2017-15942", "CVE-2017-15944"); script_bugtraq_id(102075, 102079); script_name(english:"Palo Alto Networks PAN-OS 8.0.x < 8.0.6 Multiple Vulnerabilities"); script_summary(english:"Checks the PAN-OS version."); script_set_attribute(attribute:"synopsis", value: "The remote PAN-OS host is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description",value: "The version of Palo Alto Networks PAN-OS running on the remote host is 8.0.x prior to 8.0.6. It is, therefore, affected by multiple vulnerabilities."); # https://securityadvisories.paloaltonetworks.com/Home/Detail/96 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?06c321db"); # https://securityadvisories.paloaltonetworks.com/Home/Detail/102 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d9a7eb24"); # https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os-release-notes/pan-os-8-0-6-addressed-issues script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?32570e85"); script_set_attribute(attribute:"solution", value: "Upgrade to Palo Alto Networks PAN-OS version 8.0.6 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"metasploit_name", value:'Palo Alto Networks readSessionVarsFromFile() Session Corruption'); script_set_attribute(attribute:"exploit_framework_metasploit", value:"true"); script_set_attribute(attribute:"vuln_publication_date", value:"2017/12/05"); script_set_attribute(attribute:"patch_publication_date", value:"2017/12/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2017/12/15"); script_set_attribute(attribute:"plugin_type", value:"combined"); script_set_attribute(attribute:"cpe", value:"cpe:/o:paloaltonetworks:pan-os"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Palo Alto Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("palo_alto_version.nbin"); script_require_keys("Host/Palo_Alto/Firewall/Version", "Host/Palo_Alto/Firewall/Full_Version"); exit(0); } include("vcf.inc"); app_name = "Palo Alto Networks PAN-OS"; app_info = vcf::get_app_info(app:app_name, kb_ver:"Host/Palo_Alto/Firewall/Full_Version", webapp:true); vcf::check_granularity(app_info:app_info, sig_segments:2); constraints = [ { "min_version" : "8.0", "fixed_version" : "8.0.6" } ]; vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
NASL family Palo Alto Local Security Checks NASL id PALO_ALTO_PAN-OS_6_1_19.NASL description The version of Palo Alto Networks PAN-OS running on the remote host is 6.1.x prior to 6.1.19. It is, therefore, affected by multiple vulnerabilities. last seen 2020-06-01 modified 2020-06-02 plugin id 105295 published 2017-12-15 reporter This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/105295 title Palo Alto Networks PAN-OS 6.1.x < 6.1.19 Multiple Vulnerabilities code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(105295); script_version("1.6"); script_cvs_date("Date: 2018/08/01 13:59:45"); script_cve_id( "CVE-2017-15940", "CVE-2017-15942", "CVE-2017-15943", "CVE-2017-15944" ); script_bugtraq_id( 102074, 102075, 102076, 102079 ); script_name(english:"Palo Alto Networks PAN-OS 6.1.x < 6.1.19 Multiple Vulnerabilities"); script_summary(english:"Checks the PAN-OS version."); script_set_attribute(attribute:"synopsis", value: "The remote PAN-OS host is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description",value: "The version of Palo Alto Networks PAN-OS running on the remote host is 6.1.x prior to 6.1.19. It is, therefore, affected by multiple vulnerabilities."); # https://securityadvisories.paloaltonetworks.com/Home/Detail/96 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?06c321db"); # https://securityadvisories.paloaltonetworks.com/Home/Detail/99 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2462d7e7"); # https://securityadvisories.paloaltonetworks.com/Home/Detail/102 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?d9a7eb24"); # https://securityadvisories.paloaltonetworks.com/Home/Detail/105 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?bbe4facb"); # https://www.paloaltonetworks.com/documentation/61/pan-os/pan-os-release-notes/pan-os-6-1-19-addressed-issues script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?fa24076a"); script_set_attribute(attribute:"solution", value: "Upgrade to Palo Alto Networks PAN-OS version 6.1.19 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"metasploit_name", value:'Palo Alto Networks readSessionVarsFromFile() Session Corruption'); script_set_attribute(attribute:"exploit_framework_metasploit", value:"true"); script_set_attribute(attribute:"vuln_publication_date", value:"2017/12/05"); script_set_attribute(attribute:"patch_publication_date", value:"2017/12/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2017/12/15"); script_set_attribute(attribute:"plugin_type", value:"combined"); script_set_attribute(attribute:"cpe", value:"cpe:/o:paloaltonetworks:pan-os"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Palo Alto Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("palo_alto_version.nbin"); script_require_keys("Host/Palo_Alto/Firewall/Version", "Host/Palo_Alto/Firewall/Full_Version"); exit(0); } include("vcf.inc"); app_name = "Palo Alto Networks PAN-OS"; app_info = vcf::get_app_info(app:app_name, kb_ver:"Host/Palo_Alto/Firewall/Full_Version", webapp:true); vcf::check_granularity(app_info:app_info, sig_segments:2); constraints = [ { "min_version" : "6.1", "fixed_version" : "6.1.19" } ]; vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
NASL family Palo Alto Local Security Checks NASL id PALO_ALTO_PAN-OS_7_0_19.NASL description The version of Palo Alto Networks PAN-OS running on the remote host is 7.0.x prior to 7.0.19. It is, therefore, affected by multiple vulnerabilities. last seen 2020-06-01 modified 2020-06-02 plugin id 105296 published 2017-12-15 reporter This script is Copyright (C) 2017-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/105296 title Palo Alto Networks PAN-OS 7.0.x < 7.0.19 Multiple Vulnerabilities