ID CVE-2019-1582
Summary Memory corruption in PAN-OS 8.1.9 and earlier, and PAN-OS 9.0.3 and earlier will allow an administrative user to cause arbitrary memory corruption by rekeying the current client interactive session.
References
Vulnerable Configurations
  • cpe:2.3:o:paloaltonetworks:pan-os:8.1.0:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:8.1.0:*:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:8.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:8.1.1:*:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:8.1.2:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:8.1.2:*:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:8.1.3:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:8.1.3:*:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:8.1.4:-:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:8.1.4:-:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:8.1.4:h2:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:8.1.4:h2:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:8.1.5:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:8.1.5:*:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:8.1.6:-:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:8.1.6:-:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:8.1.6:h2:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:8.1.6:h2:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:8.1.7:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:8.1.7:*:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:8.1.8:-:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:8.1.8:-:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:8.1.8:h4:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:8.1.8:h4:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:8.1.8:h5:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:8.1.8:h5:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:8.1.9:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:8.1.9:*:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:9.0.0:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:9.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:9.0.1:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:9.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:9.0.2:-:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:9.0.2:-:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:9.0.2:h4:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:9.0.2:h4:*:*:*:*:*:*
  • cpe:2.3:o:paloaltonetworks:pan-os:9.0.3:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:9.0.3:*:*:*:*:*:*:*
CVSS
Base: 6.5 (as of 24-08-2020 - 17:37)
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:S/C:P/I:P/A:P
refmap via4
confirm https://security.paloaltonetworks.com/CVE-2019-1582
Last major update 24-08-2020 - 17:37
Published 23-08-2019 - 18:15
Last modified 24-08-2020 - 17:37
Back to Top