Tampering of temporary export files in the Management Web Interface (PAN-SA-2017-0008)

Last revised: 04/10/2017


A vulnerability exists in the Management Web Interface that could allow an attacker to tamper with export files. The Management Web Interface does not properly validate specific request parameters which can potentially allow arbitrary data to be written to export files. (Ref # PAN- 70436 / CVE-2017-7217)

Severity: Low

Successfully exploiting this issue would require an attacker to be authenticated. Tampering of files is limited to temporary files used for exporting

Products Affected

PAN-OS 7.0.13 and earlier, PAN-OS 7.1.8 and earlier

Available Updates

PAN-OS 7.0.14 and later, PAN-OS 7.1.9 and later

Workarounds and Mitigations

Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network


Palo Alto Networks would like to thank Christophe Schleypen from NATO Communications and Information Agency for reporting this issue to us.