SB2020061101 - Multiple vulnerabilities in Palo Alto PAN-OS
Published: June 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Stack-based buffer overflow (CVE-ID: CVE-2020-2027)
The vulnerability allows a remote administrator to escalate privileges on the system.
The
vulnerability exists due to a boundary within the authd component of
the PAN-OS management server. A remote authenticated administrator can
send specially crafted request to the authd service, trigger a stack-based buffer overflow and crash it or execute arbitrary code with root privileges.
2) OS Command Injection (CVE-ID: CVE-2020-2029)
The vulnerability allows a user to escalate privileges on the system.
The vulnerability exists due to improper input validation. A remote authenticated administrator can send a malicious request to generate new certificates for use in the PAN-OS configuration and execute arbitrary commands with root privileges.
3) OS Command Injection (CVE-ID: CVE-2020-2028)
The vulnerability allows a remote administrator to escalate privileges on the system.
The vulnerability exists due to improper input validation in PAN-OS management server when uploading a new certificate in FIPS-CC mode. A remote authenticated administrator can pass specially crafted data to the application and execute arbitrary OS commands on the target system with root privileges.
Remediation
Install update from vendor's website.