CVE-2020-2042 PAN-OS: Buffer overflow in the management web interface
Description
A buffer overflow vulnerability in the PAN-OS management web interface allows authenticated administrators to disrupt system processes and potentially execute arbitrary code with root privileges.
This issue impacts only PAN-OS 10.0 versions earlier than PAN-OS 10.0.1.
Product Status
Versions | Affected | Unaffected |
---|---|---|
PAN-OS 10.0 | < 10.0.1 | >= 10.0.1 |
PAN-OS 9.1 | None | 9.1.* |
PAN-OS 9.0 | None | 9.0.* |
PAN-OS 8.1 | None | 8.1.* |
Severity: HIGH
CVSSv3.1 Base Score: 7.2 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
Exploitation Status
Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.
Weakness Type
CWE-121 Stack-based Buffer Overflow
Solution
This issue is fixed in PAN-OS 10.0.1 and all later PAN-OS versions.
Workarounds and Mitigations
This issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.