Lucene search

K
paloaltoPalo Alto Networks Product Security Incident Response TeamPAN-SA-2012-0016
HistoryApr 27, 2012 - 11:30 p.m.

Command Injection Vulnerability

2012-04-2723:30:00
Palo Alto Networks Product Security Incident Response Team
securityadvisories.paloaltonetworks.com
12

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

EPSS

0.003

Percentile

69.1%

A vulnerability exists whereby an authenticated user can execute arbitrary code as root using the device management command line interface. (Ref #34896)
This vulnerability can result in arbitrary command execution, and can result in total compromise of the device.
This issue affects PAN-OS 4.0.8 and earlier; PAN-OS 3.1.10 and earlier.

Work around:
This issue affects the management interface of the device. Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

EPSS

0.003

Percentile

69.1%

Related for PAN-SA-2012-0016