CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
87.6%
The Palo Alto Networks Product Security Assurance team has evaluated the OpenSSL infinite loop vulnerability (CVE-2022-0778) as it relates to our products.
This vulnerability causes the OpenSSL library to enter an infinite loop when parsing an invalid certificate and can result in a Denial-of-Service (DoS) to the application. An attacker does not need a verified certificate to exploit this vulnerability because parsing a bad certificate triggers the infinite loop before the verification process is completed.
The Prisma Cloud and Cortex XSOAR products are not impacted by this vulnerability. However, PAN-OS, GlobalProtect app, and Cortex XDR agent software contain a vulnerable version of the OpenSSL library and product availability is impacted by this vulnerability. For PAN-OS software, this includes both hardware and virtual firewalls and Panorama appliances as well as Prisma Access customers. This vulnerability has reduced severity on Cortex XDR agent and GlobalProtect app as successful exploitation requires a meddler-in-the-middle attack (MITM): 5.9 Medium (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
All fixed versions of Cortex XDR agent, GlobalProtect app, and PAN-OS are now available.
Work around:
Customers with a Threat Prevention subscription can block known attacks for this vulnerability by enabling Threat IDs 92409 and 92411 (Applications and Threats content update 8552). This mitigation reduces the risk of exploitation from known exploits.
Customers will need to upgrade their products to a fixed version to completely remove the risk of this issue.
Vendor | Product | Version | CPE |
---|---|---|---|
paloaltonetworks | prisma_access | preferred,_innovation | cpe:2.3:a:paloaltonetworks:prisma_access:preferred\,_innovation:*:*:*:*:*:*:* |
paloaltonetworks | prisma_access | preferred | cpe:2.3:a:paloaltonetworks:prisma_access:preferred:*:*:*:*:*:*:* |
paloaltonetworks | cortex_xdr_agent | 7.4.* | cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.\*:*:*:*:*:*:*:* |
paloaltonetworks | pan-os | * | cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* |
* | globalprotect_app | * | cpe:2.3:a:*:globalprotect_app:*:*:*:*:*:*:*:* |
paloaltonetworks | cortex_xdr_agent | * | cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
87.6%