SB2020032005 - Multiple vulnerabilities in Palo Alto PAN-OS
Published: March 20, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Format string error (CVE-ID: CVE-2020-1979)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability exists due to a format string error in the PAN-OS log daemon (logd) on Panorama. A local user can supply a specially crafted input that contains format string specifiers and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Exposure of Resource to Wrong Sphere (CVE-ID: CVE-2020-1981)
The vulnerability allows a local user to escalate privileges on the target system.
The vulnerability exists due to a predictable temporary filename issue. A local user can bypass the restricted shell to execute arbitrary commands and gain root access on the PAN-OS hardware or virtual appliance.
3) OS Command Injection (CVE-ID: CVE-2020-1980)
The vulnerability allows a local user to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation in the PAN-OS CLI. A local user can execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.