Palo Alto Networks PAN-OS 7.1.1 Out-of-Sequence Packet Firewall Bypass

Medium Nessus Plugin ID 91675


The remote host is affected by a firewall bypass vulnerability.


The version of Palo Alto Networks PAN-OS running on the remote host is 7.1.1. It is, therefore, affected by an unspecified flaw when handling out-of-sequence packets. An unauthenticated, remote attacker can exploit this to bypass the firewall.


Upgrade to Palo Alto Networks PAN-OS version 7.1.2 or later.

See Also

Plugin Details

Severity: Medium

ID: 91675

File Name: palo_alto_pan-os_7_1_2.nasl

Version: 1.4

Type: combined

Published: 2016/06/17

Modified: 2018/08/08

Dependencies: 72816

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:paloaltonetworks:pan-os

Required KB Items: Host/Palo_Alto/Firewall/Version, Host/Palo_Alto/Firewall/Full_Version

Patch Publication Date: 2016/05/16

Vulnerability Publication Date: 2016/05/16