Lucene search

K
cve[email protected]CVE-2020-2018
HistoryMay 13, 2020 - 7:15 p.m.

CVE-2020-2018

2020-05-1319:15:14
CWE-287
web.nvd.nist.gov
63
cve-2020-2018
authentication bypass
panorama
privileged access
firewalls
nvd
vulnerability

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.3%

An authentication bypass vulnerability in the Panorama context switching feature allows an attacker with network access to a Panorama’s management interface to gain privileged access to managed firewalls. An attacker requires some knowledge of managed firewalls to exploit this issue. This issue does not affect Panorama configured with custom certificates authentication for communication between Panorama and managed devices. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.12; PAN-OS 9.0 versions earlier than 9.0.6; All versions of PAN-OS 8.0.

Affected configurations

NVD
Node
paloaltonetworkspan-osRange7.1.07.1.26
OR
paloaltonetworkspan-osRange8.0.08.0.20
OR
paloaltonetworkspan-osRange8.1.08.1.12
OR
paloaltonetworkspan-osRange9.0.09.0.6

CNA Affected

[
  {
    "product": "PAN-OS",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "status": "affected",
        "version": "8.0.*"
      },
      {
        "changes": [
          {
            "at": "7.1.26",
            "status": "unaffected"
          }
        ],
        "lessThan": "7.1.26",
        "status": "affected",
        "version": "7.1",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "8.1.12",
            "status": "unaffected"
          }
        ],
        "lessThan": "8.1.12",
        "status": "affected",
        "version": "8.1",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "9.0.6",
            "status": "unaffected"
          }
        ],
        "lessThan": "9.0.6",
        "status": "affected",
        "version": "9.0",
        "versionType": "custom"
      }
    ]
  }
]

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.3%

Related for CVE-2020-2018