Vulnerabilities > CVE-2019-17440 - Unspecified vulnerability in Paloaltonetworks Pan-Os

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
paloaltonetworks
critical
nessus

Summary

Improper restriction of communications to Log Forwarding Card (LFC) on PA-7000 Series devices with second-generation Switch Management Card (SMC) may allow an attacker with network access to the LFC to gain root access to PAN-OS. This issue affects PAN-OS 9.0 versions prior to 9.0.5-h3 on PA-7080 and PA-7050 devices with an LFC installed and configured. This issue does not affect PA-7000 Series deployments using the first-generation SMC and the Log Processing Card (LPC). This issue does not affect any other PA series devices. This issue does not affect devices without an LFC. This issue does not affect PAN-OS 8.1 or prior releases. This issue only affected a very limited number of customers and we undertook individual outreach to help them upgrade. At the time of publication, all identified customers have upgraded SW or content and are not impacted.

Nessus

NASL familyPalo Alto Local Security Checks
NASL idPALO_ALTO_PAN-SA-2019-0040.NASL
descriptionThe version of Palo Alto Networks PAN-OS running on the remote host is 9.x prior to 9.0.5-h3. It is, therefore, affected by a remote code execution vulnerability. Improper restriction of communications to Log Forwarding Card (LFC) on PA-7000 Series devices with second-generation Switch Management Card (SMC) may allow an unauthenticated attacker with network access to the LFC to gain root access to PAN-OS. Note that Nessus has not tested for this issue but has instead relied only on the application
last seen2020-05-23
modified2020-01-28
plugin id133266
published2020-01-28
reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/133266
titlePalo Alto Networks PAN-OS Series PA-7000 9.0 < 9.0.5-h5 Remote Code Execution Vulnerability (PAN-SA-2019-0040)
code
#
# (C) Tenable Network Security, Inc.
#

include('compat.inc');

if (description)
{
  script_id(133266);
  script_version("1.4");
  script_set_attribute(attribute:"plugin_modification_date", value: "2020/03/13");

  script_cve_id("CVE-2019-17440");
  script_xref(name:"IAVA", value:"2019-A-0456-S");

  script_name(english:"Palo Alto Networks PAN-OS Series PA-7000 9.0 < 9.0.5-h5 Remote Code Execution Vulnerability (PAN-SA-2019-0040)");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by a remote code execution vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of Palo Alto Networks PAN-OS running on the remote host is 9.x prior to 9.0.5-h3. It is, therefore,
affected by a remote code execution vulnerability. Improper restriction of communications to Log Forwarding Card (LFC)
on PA-7000 Series devices with second-generation Switch Management Card (SMC) may allow an unauthenticated attacker with
network access to the LFC to gain root access to PAN-OS.

Note that Nessus has not tested for this issue but
has instead relied only on the application's self-reported version number.");
  # https://securityadvisories.paloaltonetworks.com/Home/Detail/203
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?df444d60");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Palo Alto Networks PAN-OS 9.0.5-h3 or later");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-17440");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/12/19");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/12/19");
  script_set_attribute(attribute:"plugin_publication_date", value:"2020/01/28");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:paloaltonetworks:pan-os");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Palo Alto Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("palo_alto_version.nbin");
  script_require_keys("Host/Palo_Alto/Firewall/Version", "Host/Palo_Alto/Firewall/Full_Version");

  exit(0);
}

include('vcf.inc');
include('vcf_extras.inc');
include('audit.inc');

app_name = 'Palo Alto Networks PAN-OS';
vcf::palo_alto::initialize();

app_info = vcf::get_app_info(app:app_name, kb_ver:'Host/Palo_Alto/Firewall/Full_Version', kb_source:'Host/Palo_Alto/Firewall/Source');
model = get_kb_item_or_exit('Host/Palo_Alto/Firewall/Model');

if (  model !~ 'PA-7050' && model != 'PA-7080') {
  audit(AUDIT_HOST_NOT, 'an affected model');
}

# We cannot test if LFS is installed and configured
if (report_paranoia < 2) audit(AUDIT_PARANOID);

constraints = [
  { 'min_version' : '9.0.0', 'fixed_version' : '9.0.5-h3' }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);