Remote Code Execution in GlobalProtect Portal/Gateway Interface (PAN-SA-2019-0020)

Last revised: 07/24/2019


Palo Alto Networks is aware of the reported remote code execution (RCE) vulnerability in its GlobalProtect portal and GlobalProtect Gateway interface products. The issue is already addressed in prior maintenance releases. (Ref: CVE-2019-1579)

Severity: Critical

Successful exploitation of this issue allows an unauthenticated attacker to execute arbitrary code.

Products Affected

PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and PAN-OS 8.1.2 and earlier releases. PAN-OS 9.0 is not affected.

Available Updates

PAN-OS 7.1.19 and later, PAN-OS 8.0.12 and later, and PAN-OS 8.1.3 and later releases.

Workarounds and Mitigations

If you have not already upgraded to the available updates listed above and cannot do so now, we recommend that you update to content release 8173, or the latest version, and confirm threat prevention is enabled and enforced on traffic that passes through the GlobalProtect portal and GlobalProtect Gateway interface. Please see the customer advisory for more details here: . You are not affected if you do not have GlobalProtect enabled.