Server-Side Request Forgery in PAN-OS (PAN-SA-2017-0026)

Last revised: 12/05/2017


A vulnerability exists in the PAN-OS web interface in the configuration file import for applications, spyware and vulnerability objects. Exploitation of this vulnerability allows for the parsing of external entities and could lead a PAN-OS device to connect to and disclose limited information to the attacker's server. (Ref # PAN-80452 / CVE-2017-15943)

Severity: Low

PAN-OS contains a vulnerability that may allow for an attacker to perform Server-Side Request Forgery. Successful exploitation of this issue may allow an attacker to disclose limited information to an attacker's server.

Products Affected

PAN-OS 6.1.18 and earlier, PAN-OS 7.0.18 and earlier, PAN-OS 7.1.13 and earlier

Available Updates

PAN-OS 6.1.19 and later, PAN-OS 7.0.19 and later, PAN-OS 7.1.14 and later

Workarounds and Mitigations

This issue affects the management interface of the device and is strongly mitigated by following best practices for the isolation of management interfaces for security appliances. We recommend that the management interface be isolated and strictly limited only to security administration personnel through either network segmentation or using the IP access control list restriction feature within PAN-OS.


Palo Alto Networks would like to thank Ekzhin Ear from NATO for reporting this issue