Palo Alto Networks Panorama PAN-OS < 6.0.1 Firmware Signature Verification Bypass Arbitrary Code Execution

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by a firmware signature bypass
vulnerability.

Description :

The remote Panorama appliance is running a version of Palo Alto
Networks PAN-OS prior to 6.0.1. It is, therefore, affected by a
firmware signature bypass vulnerability due to a flaw in signature
verification process that allows an attacker to execute arbitrary
Python code within an image file before the signature is verified.
Exploitation of this issue requires convincing an administrator to
install a file from a malicious source (e.g. social engineering,
hosting on a phishing site, or a man-in-the-middle attack on a
legitimate download).

See also :

https://www.tenable.com/security/research/tra-2015-02

Solution :

Upgrade to Palo Alto Networks PAN-OS version 6.0.1 or later.

Risk factor :

High / CVSS Base Score : 7.6
(CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.3
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Palo Alto Local Security Checks

Nessus Plugin ID: 86186 ()

Bugtraq ID:

CVE ID: CVE-2015-6531

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now