Lucene search

K
cve[email protected]CVE-2020-1999
HistoryNov 12, 2020 - 12:15 a.m.

CVE-2020-1999

2020-11-1200:15:10
CWE-754
web.nvd.nist.gov
67
cve-2020
pan-os
vulnerability
threat detection
palo alto network
nvd
cve-2020-1999

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.0%

A vulnerability exists in the Palo Alto Network PAN-OS signature-based threat detection engine that allows an attacker to communicate with devices in the network in a way that is not analyzed for threats by sending data through specifically crafted TCP packets. This technique evades signature-based threat detection. This issue impacts: PAN-OS 8.1 versions earlier than 8.1.17; PAN-OS 9.0 versions earlier than 9.0.11; PAN-OS 9.1 versions earlier than 9.1.5; All versions of PAN-OS 7.1 and PAN-OS 8.0.

Affected configurations

NVD
Node
paloaltonetworkspan-osRange7.1.07.1.26
OR
paloaltonetworkspan-osRange8.0.08.0.20
OR
paloaltonetworkspan-osRange8.1.08.1.17
OR
paloaltonetworkspan-osRange9.0.09.0.11
OR
paloaltonetworkspan-osRange9.1.09.1.5

CNA Affected

[
  {
    "product": "PAN-OS",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "status": "affected",
        "version": "7.1.*"
      },
      {
        "status": "affected",
        "version": "8.0.*"
      },
      {
        "status": "unaffected",
        "version": "10.0.*"
      },
      {
        "changes": [
          {
            "at": "8.1.17",
            "status": "unaffected"
          }
        ],
        "lessThan": "8.1.17",
        "status": "affected",
        "version": "8.1",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "9.0.11",
            "status": "unaffected"
          }
        ],
        "lessThan": "9.0.11",
        "status": "affected",
        "version": "9.0",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "9.1.5",
            "status": "unaffected"
          }
        ],
        "lessThan": "9.1.5",
        "status": "affected",
        "version": "9.1",
        "versionType": "custom"
      }
    ]
  }
]

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

5.2 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

36.0%

Related for CVE-2020-1999