vulnerability

PAN-OS: Unsigned Code Execution During Plugin Installation Race Condition Vulnerability

Severity
9
CVSS
(AV:N/AC:M/Au:S/C:C/I:C/A:C)
Published
Sep 8, 2021
Added
Sep 10, 2021
Modified
Sep 16, 2021

Description

A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permission to upload plugins to execute arbitrary code with root user privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11; PAN-OS 10.0 versions earlier than PAN-OS 10.0.7; PAN-OS 10.1 versions earlier than PAN-OS 10.1.2. This issue does not affect Prisma Access.

Solutions

palo-alto-networks-pan-os-upgrade-10-0palo-alto-networks-pan-os-upgrade-10-1palo-alto-networks-pan-os-upgrade-8-1palo-alto-networks-pan-os-upgrade-9-0palo-alto-networks-pan-os-upgrade-9-1
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.