Vulnerabilities > CVE-2020-2006 - Out-of-bounds Write vulnerability in Paloaltonetworks Pan-Os
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
A stack-based buffer overflow vulnerability in the management server component of PAN-OS that allows an authenticated user to potentially execute arbitrary code with root privileges. This issue affects: All versions of PAN-OS 7.1 and 8.0; PAN-OS 8.1 versions earlier than 8.1.14.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | Palo Alto Local Security Checks |
NASL id | PALO_ALTO_CVE-2020-2006.NASL |
description | The version of Palo Alto Networks PAN-OS running on the remote host is 7.1.x, 8.0.x, or 8.1.x prior to 8.1.14. It is, therefore, affected by a stack-based buffer overflow vulnerability. - A stack-based buffer overflow vulnerability in the management server component of PAN-OS that allows an authenticated user to potentially execute arbitrary code with root privileges. This issue affects: All versions of PAN-OS 7.1 and 8.0; PAN-OS 8.1 versions earlier than 8.1.14. (CVE-2020-2006) Note that Nessus has not tested for this issue but has instead relied only on the application |
last seen | 2020-05-23 |
modified | 2020-05-22 |
plugin id | 136819 |
published | 2020-05-22 |
reporter | This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/136819 |
title | Palo Alto Networks PAN-OS 7.1.x / 8.0.x / 8.1.x < 8.1.14 Buffer Overflow |
code |
|