SB2020061101 - Multiple vulnerabilities in Palo Alto PAN-OS 



SB2020061101 - Multiple vulnerabilities in Palo Alto PAN-OS

Published: June 11, 2020

Security Bulletin ID SB2020061101
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2020-2027)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to a boundary within the authd component of the PAN-OS management server. A remote authenticated administrator can send specially crafted request to the authd service, trigger a stack-based buffer overflow and crash it or execute arbitrary code with root privileges.


2) OS Command Injection (CVE-ID: CVE-2020-2029)

The vulnerability allows a user to escalate privileges on the system.

The vulnerability exists due to improper input validation. A remote authenticated administrator can send a malicious request to generate new certificates for use in the PAN-OS configuration and execute arbitrary commands with root privileges.


3) OS Command Injection (CVE-ID: CVE-2020-2028)

The vulnerability allows a remote administrator to escalate privileges on the system.

The vulnerability exists due to improper input validation in PAN-OS management server when uploading a new certificate in FIPS-CC mode. A remote authenticated administrator can pass specially crafted data to the application and execute arbitrary OS commands on the target system with root privileges.


Remediation

Install update from vendor's website.