SB2020032005 - Multiple vulnerabilities in Palo Alto PAN-OS 



SB2020032005 - Multiple vulnerabilities in Palo Alto PAN-OS

Published: March 20, 2020

Security Bulletin ID SB2020032005
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Format string error (CVE-ID: CVE-2020-1979)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a format string error in the PAN-OS log daemon (logd) on Panorama. A local user can supply a specially crafted input that contains format string specifiers and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Exposure of Resource to Wrong Sphere (CVE-ID: CVE-2020-1981)

The vulnerability allows a local user to escalate privileges on the target system.

The vulnerability exists due to a predictable temporary filename issue. A local user can bypass the restricted shell to execute arbitrary commands and gain root access on the PAN-OS hardware or virtual appliance.


3) OS Command Injection (CVE-ID: CVE-2020-1980)

The vulnerability allows a local user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the PAN-OS CLI. A local user can execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.