Palo Alto Networks PAN-OS 7.1.1 Out-of-Sequence Packet Firewall Bypass

medium Nessus Plugin ID 91675

Synopsis

The remote host is affected by a firewall bypass vulnerability.

Description

The version of Palo Alto Networks PAN-OS running on the remote host is 7.1.1. It is, therefore, affected by an unspecified flaw when handling out-of-sequence packets. An unauthenticated, remote attacker can exploit this to bypass the firewall.

Solution

Upgrade to Palo Alto Networks PAN-OS version 7.1.2 or later.

See Also

http://www.nessus.org/u?c705875b

Plugin Details

Severity: Medium

ID: 91675

File Name: palo_alto_pan-os_7_1_2.nasl

Version: 1.4

Type: combined

Published: 6/17/2016

Updated: 8/8/2018

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/o:paloaltonetworks:pan-os

Required KB Items: Host/Palo_Alto/Firewall/Version, Host/Palo_Alto/Firewall/Full_Version

Patch Publication Date: 5/16/2016

Vulnerability Publication Date: 5/16/2016