This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.
The remote host is affected by a firmware signature bypass
The remote Panorama appliance is running a version of Palo Alto
Networks PAN-OS prior to 6.0.1. It is, therefore, affected by a
firmware signature bypass vulnerability due to a flaw in signature
verification process that allows an attacker to execute arbitrary
Python code within an image file before the signature is verified.
Exploitation of this issue requires convincing an administrator to
install a file from a malicious source (e.g. social engineering,
hosting on a phishing site, or a man-in-the-middle attack on a
See also :
Upgrade to Palo Alto Networks PAN-OS version 6.0.1 or later.
Risk factor :
High / CVSS Base Score : 7.6
CVSS Temporal Score : 6.3
Public Exploit Available : true