CVE-2018-9334 Information Disclosure in the PAN-OS Management Web Interface
Description
A local privilege escalation vulnerability exists in the PAN-OS management web interface that allows the administrator to access the password hashes of local users by manipulating the HTML markup. (Ref. # PAN-91564; CVE-2018-9334)
Successful exploitation of this issue requires the attacker to be authenticated.
This issue affects PAN-OS 6.1.20 and earlier, PAN-OS 7.1.16 and earlier, PAN-OS 8.0.8 and earlier, and PAN-OS 8.1.0
Product Status
Versions | Affected | Unaffected |
---|---|---|
PAN-OS 8.1 | None | >= 8.1.1 |
PAN-OS 8.0 | <= 8.0.8 | >= 8.0.9 |
PAN-OS 7.1 | <= 7.1.16 | >= 7.1.17 |
PAN-OS 6.1 | <= 6.1.20 | >= 6.1.21 |
Severity: MEDIUM
CVSSv3.1 Base Score: 5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
Weakness Type
CWE-269 Improper Privilege Management
Solution
PAN-OS 6.1.21 and later, PAN-OS 7.1.17 and later, PAN-OS 8.0.9 and later, and PAN-OS 8.1.1 and later
Workarounds and Mitigations
This issue affects the web-based management interface of PAN-OS and is strongly mitigated by following best practices for securing the management interface of PAN-OS. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/getting-started/best-practices-for-securing-administrative-access.