Palo Alto Networks PAN-OS Multiple Vulnerabilities (PAN-SA-2016-0002, PAN-SA-2016-0004)

high Nessus Plugin ID 89687

Synopsis

The remote host is affected by multiple vulnerabilities.

Description

The Palo Alto Networks PAN-OS running on the remote host is version 5.0.x prior to 5.0.18, 5.1.x prior to 5.1.11, 6.0.x prior to 6.0.13, 6.1.x prior to 6.1.10, or 7.0.x prior to 7.0.5-h2. It is, therefore, affected by the following vulnerabilities :

- An unspecified flaw exists in the GlobalProtect web portal due to improper validation of user-supplied input when handling requests. An unauthenticated, remote attacker can exploit this, via a crafted request, to cause a denial of service.

- A flaw exists in the command line interface (CLI) when parsing certain SSH command parameters. An authenticated, remote attacker who has administrative privileges can exploit this, via a crafted request, to execute arbitrary OS commands with root privileges.

Solution

Upgrade to Palo Alto Networks PAN-OS version 5.0.18 / 5.1.11 / 6.0.13 / 6.1.10 / 7.0.5-h2 or later.

See Also

https://securityadvisories.paloaltonetworks.com/Home/Detail/35

https://securityadvisories.paloaltonetworks.com/Home/Detail/37

Plugin Details

Severity: High

ID: 89687

File Name: palo_alto_PAN-SA-2016-0004.nasl

Version: 1.10

Type: combined

Published: 3/4/2016

Updated: 1/2/2019

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 8.5

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:paloaltonetworks:pan-os

Required KB Items: Host/Palo_Alto/Firewall/Version, Host/Palo_Alto/Firewall/Full_Version

Patch Publication Date: 2/25/2016

Vulnerability Publication Date: 2/25/2016