PAN-SA-2014-0001 Management API Key Bypass
Attack Vector
NETWORK
Scope
UNCHANGED
Attack Complexity
HIGH
Confidentiality Impact
NONE
Privileges Required
NONE
Integrity Impact
HIGH
User Interaction
REQUIRED
Availability Impact
NONE
Description
An XML API key can be bypassed if a session has been authorized. This can be used in a CSRF or XSS attack. (Ref # 58976)
This issue requires an authenticated administrator session to be successful.
This issue affects PAN-OS version 4.1.15 and earlier; 5.0.9 and earlier; 5.1.4 and earlier.
Product Status
Versions | Affected | Unaffected |
---|---|---|
PAN-OS 5.1 | <= 5.1.4 | >= 5.1.5 |
PAN-OS 5.0 | <= 5.0.9 | >= 5.0.10 |
PAN-OS 4.1 | <= 4.1.15 | >= 4.1.16 |
Severity: MEDIUM
CVSSv3.1 Base Score: 5.3 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N)
Weakness Type
Solution
PAN-OS 4.1.16; 5.0.10 and 5.1.5 address this issue.
Workarounds and Mitigations
This issue affects the management interface of the device. Security appliance management best practices dictate that the management interface be isolated and strictly limited only to security administration personnel.
Acknowledgments
Anton Ziukin, Check Point Vulnerability Research Team