QID 730194

Date Published: 2021-09-16

QID 730194: Palo Alto Networks PAN-OS Telnet Remote-Code-Execution (RCE) Vulnerability (PAN-158262)

PAN OS is the software that runs all Palo Alto Networks next-generation firewalls.

A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code. The Telnet-based administrative management service is disabled by default and this issue is not exploitable if this service is disabled. This issue does not impact SSH or HTTPS management interfaces. This issue does not affect Prisma Access. Affected Versions:
PAN-OS 8.1 versions earlier than PAN-OS 8.1.20
PAN-OS 9.0 versions earlier than PAN-OS 9.0.14
PAN-OS 9.1 versions earlier than PAN-OS 9.1.9
PAN-OS 10.0 versions earlier than PAN-OS 10.0.6
QID Detection Logic (Authenticated):
This QID looks for the vulnerable version of PAN-OS via XML API.

NOTE:This issue is exploitable only if the Telnet service is enabled and is accessible to attackers.

A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code.The Telnet-based administrative management service is disabled by default and this issue is not exploitable if this service is disabled.This issue does not impact SSH or HTTPS management interfaces. This issue does not affect Prisma Access.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution

    Refer to PAN-158262 for more information about patching this vulnerability.

    Vendor References

    CVEs related to QID 730194

    Software Advisories
    Advisory ID Software Component Link
    PAN-158262 URL Logo security.paloaltonetworks.com/CVE-2020-10188