QID 730320

Date Published: 2021-12-30

QID 730320: Palo Alto Networks (PAN-OS) OS Command Injection Vulnerability (PAN-176655, PAN-158334)

PAN OS is the software that runs all Palo Alto Networks next-generation firewalls.

An OS command injection vulnerability in the Palo Alto Networks PAN-OS command line interface (CLI) enables an authenticated administrator with access to the CLI to execute arbitrary OS commands to escalate privileges.

Affected Versions:
PAN-OS 10.1 versions earlier than PAN-OS 10.1.3
PAN-OS 10.0 versions earlier than PAN-OS 10.0.8
PAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2
PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3
PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1


QID Detection Logic (Authenticated):

This QID looks for the vulnerable version of PAN-OS

An OS command injection vulnerability in the Palo Alto Networks PAN-OS command line interface (CLI) enables an authenticated administrator with access to the CLI to execute arbitrary OS commands to escalate privileges.

  • CVSS V3 rated as High - 7.2 severity.
  • CVSS V2 rated as Critical - 9 severity.
  • Solution

    Refer to PAN-176655, PAN-158334 for more information about patching this vulnerability.



    Workaround:
    This issue requires the attacker to have authenticated access to the PAN-OS CLI. You can mitigate the impact of this issue by following best practices for securing PAN-OS software. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.

    CVEs related to QID 730320

    Software Advisories
    Advisory ID Software Component Link
    PAN-176655, PAN-158334 URL Logo security.paloaltonetworks.com/CVE-2021-3061