Palo Alto Networks Panorama PAN-OS < 6.0.1 Firmware Signature Verification Bypass Arbitrary Code Execution
High Nessus Plugin ID 86186
SynopsisThe remote host is affected by a firmware signature bypass vulnerability.
DescriptionThe remote Panorama appliance is running a version of Palo Alto Networks PAN-OS prior to 6.0.1. It is, therefore, affected by a firmware signature bypass vulnerability due to a flaw in signature verification process that allows an attacker to execute arbitrary Python code within an image file before the signature is verified.
Exploitation of this issue requires convincing an administrator to install a file from a malicious source (e.g. social engineering, hosting on a phishing site, or a man-in-the-middle attack on a legitimate download).
SolutionUpgrade to Palo Alto Networks PAN-OS version 6.0.1 or later.