Lucene search

K
cve[email protected]CVE-2020-1998
HistoryMay 13, 2020 - 7:15 p.m.

CVE-2020-1998

2020-05-1319:15:12
CWE-863
CWE-285
web.nvd.nist.gov
49
pan-os
cve-2020-1998
improper authorization
sso authentication
vulnerability
security issue
nvd
authentication bypass

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.9%

An improper authorization vulnerability in PAN-OS that mistakenly uses the permissions of local linux users instead of the intended SAML permissions of the account when the username is shared for the purposes of SSO authentication. This can result in authentication bypass and unintended resource access for the user. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.6; PAN-OS 9.1 versions earlier than 9.1.1; All versions of PAN-OS 8.0.

Affected configurations

NVD
Node
paloaltonetworkspan-osRange7.1.07.1.26
OR
paloaltonetworkspan-osRange8.0.08.0.20
OR
paloaltonetworkspan-osRange8.1.08.1.13
OR
paloaltonetworkspan-osRange9.0.09.0.6
OR
paloaltonetworkspan-osRange9.1.09.1.1

CNA Affected

[
  {
    "product": "PAN-OS",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "status": "affected",
        "version": "8.0.*"
      },
      {
        "changes": [
          {
            "at": "8.1.13",
            "status": "unaffected"
          }
        ],
        "lessThan": "8.1.13",
        "status": "affected",
        "version": "8.1",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "7.1.26",
            "status": "unaffected"
          }
        ],
        "lessThan": "7.1.26",
        "status": "affected",
        "version": "7.1",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "9.0.6",
            "status": "unaffected"
          }
        ],
        "lessThan": "9.0.6",
        "status": "affected",
        "version": "9.0",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "9.1.1",
            "status": "unaffected"
          }
        ],
        "lessThan": "9.1.1",
        "status": "affected",
        "version": "9.1",
        "versionType": "custom"
      }
    ]
  }
]

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.9%

Related for CVE-2020-1998