Palo Alto Networks Security Advisories / PAN-SA-2014-0001

PAN-SA-2014-0001 Management API Key Bypass


047910
Severity 5.3 · MEDIUM
Attack Vector NETWORK
Scope UNCHANGED
Attack Complexity HIGH
Confidentiality Impact NONE
Privileges Required NONE
Integrity Impact HIGH
User Interaction REQUIRED
Availability Impact NONE

Description

An XML API key can be bypassed if a session has been authorized. This can be used in a CSRF or XSS attack. (Ref # 58976)

This issue requires an authenticated administrator session to be successful.

This issue affects PAN-OS version 4.1.15 and earlier; 5.0.9 and earlier; 5.1.4 and earlier.

Product Status

VersionsAffectedUnaffected
PAN-OS 5.1<= 5.1.4>= 5.1.5
PAN-OS 5.0<= 5.0.9>= 5.0.10
PAN-OS 4.1<= 4.1.15>= 4.1.16

Severity: MEDIUM

CVSSv3.1 Base Score: 5.3 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N)

Weakness Type

Solution

PAN-OS 4.1.16; 5.0.10 and 5.1.5 address this issue.

Workarounds and Mitigations

This issue affects the management interface of the device. Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.

Acknowledgments

Anton Ziukin, Check Point Vulnerability Research Team
© 2024 Palo Alto Networks, Inc. All rights reserved.