SB2022020926 - URL filtration bypass in Palo Alto PAN-OS
Published: February 9, 2022
Security Bulletin ID
SB2022020926
Severity
Medium
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Data manipulation
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Incorrect Regular Expression (CVE-ID: CVE-2022-0011)
The vulnerability allows a remote attacker to bypass URL filtration rules.
The vulnerability exists due to an error when processing forward slash (/), asterisk (*) and caret (^) at the end of the hostname inside filtration rules added to the custom URL category list or to an external dynamic list (EDL) in a URL Filtering profile. As a result, unexpected domains can be blocked or allowed, resulting in a potential security issue.
Remediation
Install update from vendor's website.