QID 730194
Date Published: 2021-09-16
QID 730194: Palo Alto Networks PAN-OS Telnet Remote-Code-Execution (RCE) Vulnerability (PAN-158262)
PAN OS is the software that runs all Palo Alto Networks next-generation firewalls.
A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code.
The Telnet-based administrative management service is disabled by default and this issue is not exploitable if this service is disabled.
This issue does not impact SSH or HTTPS management interfaces. This issue does not affect Prisma Access.
Affected Versions:
PAN-OS 8.1 versions earlier than PAN-OS 8.1.20
PAN-OS 9.0 versions earlier than PAN-OS 9.0.14
PAN-OS 9.1 versions earlier than PAN-OS 9.1.9
PAN-OS 10.0 versions earlier than PAN-OS 10.0.6
QID Detection Logic (Authenticated):
This QID looks for the vulnerable version of PAN-OS via XML API.
NOTE:This issue is exploitable only if the Telnet service is enabled and is accessible to attackers.
A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code.The Telnet-based administrative management service is disabled by default and this issue is not exploitable if this service is disabled.This issue does not impact SSH or HTTPS management interfaces. This issue does not affect Prisma Access.
Refer to PAN-158262 for more information about patching this vulnerability.
- PAN-158262 -
security.paloaltonetworks.com/CVE-2020-10188
CVEs related to QID 730194
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| PAN-158262 |
|