vulnerability
Palo Alto Networks PAN-SA-2016-0015: Cron local privilege escalation
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Jul 14, 2016 | Oct 11, 2016 | Feb 18, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Jul 14, 2016
Added
Oct 11, 2016
Modified
Feb 18, 2025
Description
Palo Alto Networks firewalls use the cron infrastructure to perform household system cleanup at regular intervals. Due to an error in user input normalization, a file locally created by an end user and placed in a specific directory could be executed in a higher privilege context (Ref. 93612).
Solution(s)
palo-alto-networks-pan-os-upgrade-5-0palo-alto-networks-pan-os-upgrade-5-1palo-alto-networks-pan-os-upgrade-6-0palo-alto-networks-pan-os-upgrade-6-1palo-alto-networks-pan-os-upgrade-7-0palo-alto-networks-pan-os-upgrade-7-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.