Palo Alto Networks PAN-OS 5.0.x < 5.0.19 / 5.1.x < 5.1.12 / 6.0.x < 6.0.14 / 6.1.x < 6.1.12 / 7.0.x < 7.0.8 Privilege Escalation (PAN-SA-2016-0012)

high Nessus Plugin ID 93125

Synopsis

The remote host is affected by multiple vulnerabilities.

Description

The version of Palo Alto Networks PAN-OS running on the remote host is 5.0.x prior to 5.0.19, 5.1.x prior to 5.1.12, 6.0.x prior to 6.0.14, 6.1.x prior to 6.1.12, or 7.0.x prior to 7.0.8. It is, therefore, affected by a privilege escalation vulnerability due to improper sanitization of the root_reboot local invocation. A local attacker can exploit this to gain elevated privileges.

Solution

Upgrade to Palo Alto Networks PAN-OS version 5.0.19 / 5.1.12 / 6.0.14 / 6.1.12 / 7.0.8 or later.

See Also

https://securityadvisories.paloaltonetworks.com/Home/Detail/45

Plugin Details

Severity: High

ID: 93125

File Name: palo_alto_PAN-SA-2016-0012.nasl

Version: 1.5

Type: combined

Published: 8/26/2016

Updated: 7/24/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:paloaltonetworks:pan-os

Required KB Items: Host/Palo_Alto/Firewall/Version, Host/Palo_Alto/Firewall/Full_Version

Exploit Ease: No known exploits are available

Patch Publication Date: 7/5/2016

Vulnerability Publication Date: 7/5/2016

Reference Information

CVE: CVE-2016-1712