QID 730320
Date Published: 2021-12-30
QID 730320: Palo Alto Networks (PAN-OS) OS Command Injection Vulnerability (PAN-176655, PAN-158334)
PAN OS is the software that runs all Palo Alto Networks next-generation firewalls.
An OS command injection vulnerability in the Palo Alto Networks PAN-OS command line interface (CLI) enables an authenticated administrator with access to the CLI to execute arbitrary OS commands to escalate privileges.
Affected Versions:
PAN-OS 10.1 versions earlier than PAN-OS 10.1.3
PAN-OS 10.0 versions earlier than PAN-OS 10.0.8
PAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h2
PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h3
PAN-OS 8.1 versions earlier than PAN-OS 8.1.20-h1
QID Detection Logic (Authenticated):
This QID looks for the vulnerable version of PAN-OS
An OS command injection vulnerability in the Palo Alto Networks PAN-OS command line interface (CLI) enables an authenticated administrator with access to the CLI to execute arbitrary OS commands to escalate privileges.
Refer to PAN-176655, PAN-158334 for more information about patching this vulnerability.
Workaround:
This issue requires the attacker to have authenticated access to the PAN-OS CLI. You can mitigate the impact of this issue by following best practices for securing PAN-OS software. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.
- PAN-158334 -
security.paloaltonetworks.com/CVE-2021-3061 - PAN-176655 -
security.paloaltonetworks.com/CVE-2021-3061
CVEs related to QID 730320
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| PAN-176655, PAN-158334 |
|