QID 730392

QID 730392: Palo Alto Networks (PAN-OS) Impact of the Samba Vulnerability (PAN-187873)

PAN OS is the software that runs all Palo Alto Networks next-generation firewalls.

The Palo Alto Networks Product Security Assurance team has evaluated the Samba CVE-2021-44142 vulnerability.

Affected Versions:


QID Detection Logic (Authenticated):

This QID looks for the vulnerable version of PAN-OS

The Palo Alto Networks Product Security Assurance team has evaluated the Samba CVE-2021-44142 vulnerability.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Critical - 9 severity.
  • Solution

    Refer to PAN-187873 for more information about patching this vulnerability.



    Workaround:
    Ensure that any exported firewall configuration files are secured and that only trusted users have firewall management access to prevent the exposure of password hashes. Using complex and secure passwords for all administrator and local user accounts makes password cracking infeasible and mitigates the impact of this issue. Switching PAN-OS software from normal mode to FIPS-CC mode ensures that appliances use secure cryptography to store hashed credentials for all local user accounts. However, when you enable FIPS-CC mode, the appliance will reset to the factory default settings and the existing configuration is removed. Documentation to enable FIPS-CC mode is available here: https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/certifications/enable-fips-and-common-criteria-support.html

    Vendor References

    CVEs related to QID 730392

    Software Advisories
    Advisory ID Software Component Link
    PAN-187873 URL Logo security.paloaltonetworks.com/CVE-2021-44142