PAN-OS: OS Command Injection Vulnerability in Web Interface XML API

CVE-2021-3058

8.8HIGH

Key Information

Status
Pan-os
Prisma Access
Vendor
CVE Published:
10 November 2021

Badges

👾 Exploit Exists

Summary

An OS command injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permissions to use XML API the ability to execute arbitrary OS commands to escalate privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8; PAN-OS 10.1 versions earlier than PAN-OS 10.1.3. This issue does not impact Prisma Access firewalls.

Affected Version(s)

PAN-OS < 10.1.3

PAN-OS < 9.0.14-h3

PAN-OS < 8.1.20-h1

Refferences

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database

Credit

Palo Alto Networks thanks CJ, an external security researcher, for discovering and reporting this issue.
.