Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2020-AVI-197
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Palo Alto. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
Vendor | Product | Description | ||
---|---|---|---|---|
Palo Alto Networks | PAN-OS | Palo Alto Networks PAN-OS 8.1.x versions antérieures à 8.1.13 | ||
Palo Alto Networks | PAN-OS | Palo Alto Networks PAN-OS 7.x versions antérieures à 7.1.26 | ||
Microsoft | Windows | Secdo toutes versions sur Windows (produit en fin de vie) | ||
Microsoft | Windows | Palo Alto Networks Traps versions 5.x antérieures à 5.0.8 sur Windows | ||
Palo Alto Networks | N/A | Palo Alto Networks GlobalProtect Agent versions 5.1.x antérieures à 5.1.1 | ||
Palo Alto Networks | N/A | Palo Alto Networks GlobalProtect Agent versions 5.x antérieures à 5.0.9 | ||
Palo Alto Networks | PAN-OS | Palo Alto Networks PAN-OS sur séries PA-7000 avec LFC versions 9.1.x antérieures à 9.1.2 | ||
Microsoft | Windows | Palo Alto Networks GlobalProtect Agent pour Windows versions 4.1.x antérieures à 4.1.13 | ||
Palo Alto Networks | PAN-OS | Palo Alto Networks PAN-OS 9.x versions antérieures à 9.0.7 | ||
Microsoft | Windows | Palo Alto Networks Traps versions 6.x antérieures à 6.1.4 sur Windows | ||
Palo Alto Networks | PAN-OS | Palo Alto Networks PAN-OS 8.x versions antérieures à 8.0.21 | ||
Microsoft | Azure | Palo Alto Networks VM Series firewalls pour Microsoft Azure versions antérieures à 1.0.8 |
References
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Palo Alto Networks PAN-OS 8.1.x versions ant\u00e9rieures \u00e0 8.1.13", "product": { "name": "PAN-OS", "vendor": { "name": "Palo Alto Networks", "scada": false } } }, { "description": "Palo Alto Networks PAN-OS 7.x versions ant\u00e9rieures \u00e0 7.1.26", "product": { "name": "PAN-OS", "vendor": { "name": "Palo Alto Networks", "scada": false } } }, { "description": "Secdo toutes versions sur Windows (produit en fin de vie)", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Palo Alto Networks Traps versions 5.x ant\u00e9rieures \u00e0 5.0.8 sur Windows", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Palo Alto Networks GlobalProtect Agent versions 5.1.x ant\u00e9rieures \u00e0 5.1.1", "product": { "name": "N/A", "vendor": { "name": "Palo Alto Networks", "scada": false } } }, { "description": "Palo Alto Networks GlobalProtect Agent versions 5.x ant\u00e9rieures \u00e0 5.0.9", "product": { "name": "N/A", "vendor": { "name": "Palo Alto Networks", "scada": false } } }, { "description": "Palo Alto Networks PAN-OS sur s\u00e9ries PA-7000 avec LFC versions 9.1.x ant\u00e9rieures \u00e0 9.1.2", "product": { "name": "PAN-OS", "vendor": { "name": "Palo Alto Networks", "scada": false } } }, { "description": "Palo Alto Networks GlobalProtect Agent pour Windows versions 4.1.x ant\u00e9rieures \u00e0 4.1.13", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Palo Alto Networks PAN-OS 9.x versions ant\u00e9rieures \u00e0 9.0.7", "product": { "name": "PAN-OS", "vendor": { "name": "Palo Alto Networks", "scada": false } } }, { "description": "Palo Alto Networks Traps versions 6.x ant\u00e9rieures \u00e0 6.1.4 sur Windows", "product": { "name": "Windows", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Palo Alto Networks PAN-OS 8.x versions ant\u00e9rieures \u00e0 8.0.21", "product": { "name": "PAN-OS", "vendor": { "name": "Palo Alto Networks", "scada": false } } }, { "description": "Palo Alto Networks VM Series firewalls pour Microsoft Azure versions ant\u00e9rieures \u00e0 1.0.8", "product": { "name": "Azure", "vendor": { "name": "Microsoft", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2020-1990", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1990" }, { "name": "CVE-2019-6109", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6109" }, { "name": "CVE-2020-1986", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1986" }, { "name": "CVE-2019-6111", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6111" }, { "name": "CVE-2020-1978", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1978" }, { "name": "CVE-2020-1988", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1988" }, { "name": "CVE-2020-1984", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1984" }, { "name": "CVE-2020-1992", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1992" }, { "name": "CVE-2020-1989", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1989" }, { "name": "CVE-2018-20685", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20685" }, { "name": "CVE-2020-1987", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1987" }, { "name": "CVE-2020-1985", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1985" }, { "name": "CVE-2020-1991", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1991" } ], "initial_release_date": "2020-04-09T00:00:00", "last_revision_date": "2020-04-10T00:00:00", "links": [], "reference": "CERTFR-2020-AVI-197", "revisions": [ { "description": "Version initiale.", "revision_date": "2020-04-09T00:00:00.000000" }, { "description": "Correction des dates de certains avis de s\u00e9curit\u00e9 (retour vers le futur).", "revision_date": "2020-04-10T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Palo\nAlto. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Palo Alto", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-1990 du 08 avril 2020", "url": "https://security.paloaltonetworks.com/CVE-2020-1990" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-1978 du 08 avril 2020", "url": "https://security.paloaltonetworks.com/CVE-2020-1978" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-1984 du 08 avril 2020", "url": "https://security.paloaltonetworks.com/CVE-2020-1984" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-1992 du 08 avril 2020", "url": "https://security.paloaltonetworks.com/CVE-2020-1992" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-1989 du 08 avril 2020", "url": "https://security.paloaltonetworks.com/CVE-2020-1989" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-1985 du 08 avril 2020", "url": "https://security.paloaltonetworks.com/CVE-2020-1985" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto PAN-SA-2020-0002 du 08 avril 2020", "url": "https://security.paloaltonetworks.com/PAN-SA-2020-0002" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-1991 du 08 avril 2020", "url": "https://security.paloaltonetworks.com/CVE-2020-1991" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-1987 du 08 avril 2020", "url": "https://security.paloaltonetworks.com/CVE-2020-1987" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-1988 du 08 avril 2020", "url": "https://security.paloaltonetworks.com/CVE-2020-1988" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-1986 du 08 avril 2020", "url": "https://security.paloaltonetworks.com/CVE-2020-1986" } ] }
CVE-2020-1978 (GCVE-0-2020-1978)
Vulnerability from cvelistv5
Published
2020-04-08 18:41
Modified
2024-09-16 22:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-255 - Credentials Management
Summary
TechSupport files generated on Palo Alto Networks VM Series firewalls for Microsoft Azure platform configured with high availability (HA) inadvertently collect Azure dashboard service account credentials. These credentials are equivalent to the credentials associated with the Contributor role in Azure. A user with the credentials will be able to manage all the Azure resources in the subscription except for granting access to other resources. These credentials do not allow login access to the VMs themselves. This issue affects VM Series Plugin versions before 1.0.9 for PAN-OS 9.0. This issue does not affect VM Series in non-HA configurations or on other cloud platforms. It does not affect hardware firewall appliances. Since becoming aware of the issue, Palo Alto Networks has safely deleted all the tech support files with the credentials. We now filter and remove these credentials from all TechSupport files sent to us. The TechSupport files uploaded to Palo Alto Networks systems were only accessible by authorized personnel with valid Palo Alto Networks credentials. We do not have any evidence of malicious access or use of these credentials.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | VM-Series Plugin |
Version: 1.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.431Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1978" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Microsoft Azure" ], "product": "VM-Series Plugin", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "1.0.9", "status": "unaffected" } ], "lessThanOrEqual": "1.0.8", "status": "affected", "version": "1.0", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "This issue only affects VM Series appliances with HA configuration on Microsoft Azure." } ], "credits": [ { "lang": "en", "value": "This issue was found by Ranjeet Ramalingam during an internal security review." } ], "datePublic": "2020-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "TechSupport files generated on Palo Alto Networks VM Series firewalls for Microsoft Azure platform configured with high availability (HA) inadvertently collect Azure dashboard service account credentials. These credentials are equivalent to the credentials associated with the Contributor role in Azure. A user with the credentials will be able to manage all the Azure resources in the subscription except for granting access to other resources. These credentials do not allow login access to the VMs themselves. This issue affects VM Series Plugin versions before 1.0.9 for PAN-OS 9.0. This issue does not affect VM Series in non-HA configurations or on other cloud platforms. It does not affect hardware firewall appliances. Since becoming aware of the issue, Palo Alto Networks has safely deleted all the tech support files with the credentials. We now filter and remove these credentials from all TechSupport files sent to us. The TechSupport files uploaded to Palo Alto Networks systems were only accessible by authorized personnel with valid Palo Alto Networks credentials. We do not have any evidence of malicious access or use of these credentials." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-255", "description": "CWE-255 Credentials Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-08T18:41:58", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1978" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in VM-Series Plugin 1.0.9 for Microsoft Azure.\nCustomers who generated TechSupport files on older versions are advised to change their Azure dashboard credentials. Customers are advised to delete any previously generated TechSupport files.\nInstructions to change the credentials:\n\n1. Create a new Service Principal with a Contributor role in the Azure AD Portal. Instructions to create a new Service Principal can be found here - https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal\n\n2. Update your Azure HA configuration in the PA-VM configuration with the new Service Principal credentials. The steps to update the configuration are provided in \u201cStep 3\u201d of the PA-VM Azure HA configuration guide - https://docs.paloaltonetworks.com/vm-series/9-0/vm-series-deployment/set-up-the-vm-series-firewall-on-azure/configure-activepassive-ha-for-vm-series-firewall-on-azure.html\n\n3. Delete the old Service Principal in the Azure AD Portal that was being used in the Azure HA configuration. Note: If the old Service Principal is used in other applications, then the other applications need to be updated with the new Service Principal." } ], "source": { "defect": [ "PLUG-3787" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-02-19T00:00:00", "value": "Initial publication" } ], "title": "VM-Series on Microsoft Azure: Inadvertent collection of credentials in Tech support files on HA configured VMs", "workarounds": [ { "lang": "en", "value": "Do not generate TechSupport files on the affected VMs." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-04-08T16:00:00.000Z", "ID": "CVE-2020-1978", "STATE": "PUBLIC", "TITLE": "VM-Series on Microsoft Azure: Inadvertent collection of credentials in Tech support files on HA configured VMs" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VM-Series Plugin", "version": { "version_data": [ { "platform": "Microsoft Azure", "version_affected": "\u003c=", "version_name": "1.0", "version_value": "1.0.8" }, { "platform": "Microsoft Azure", "version_affected": "!\u003e=", "version_name": "1.0", "version_value": "1.0.9" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "configuration": [ { "lang": "en", "value": "This issue only affects VM Series appliances with HA configuration on Microsoft Azure." } ], "credit": [ { "lang": "eng", "value": "This issue was found by Ranjeet Ramalingam during an internal security review." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "TechSupport files generated on Palo Alto Networks VM Series firewalls for Microsoft Azure platform configured with high availability (HA) inadvertently collect Azure dashboard service account credentials. These credentials are equivalent to the credentials associated with the Contributor role in Azure. A user with the credentials will be able to manage all the Azure resources in the subscription except for granting access to other resources. These credentials do not allow login access to the VMs themselves. This issue affects VM Series Plugin versions before 1.0.9 for PAN-OS 9.0. This issue does not affect VM Series in non-HA configurations or on other cloud platforms. It does not affect hardware firewall appliances. Since becoming aware of the issue, Palo Alto Networks has safely deleted all the tech support files with the credentials. We now filter and remove these credentials from all TechSupport files sent to us. The TechSupport files uploaded to Palo Alto Networks systems were only accessible by authorized personnel with valid Palo Alto Networks credentials. We do not have any evidence of malicious access or use of these credentials." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-255 Credentials Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-1978", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-1978" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in VM-Series Plugin 1.0.9 for Microsoft Azure.\nCustomers who generated TechSupport files on older versions are advised to change their Azure dashboard credentials. Customers are advised to delete any previously generated TechSupport files.\nInstructions to change the credentials:\n\n1. Create a new Service Principal with a Contributor role in the Azure AD Portal. Instructions to create a new Service Principal can be found here - https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal\n\n2. Update your Azure HA configuration in the PA-VM configuration with the new Service Principal credentials. The steps to update the configuration are provided in \u201cStep 3\u201d of the PA-VM Azure HA configuration guide - https://docs.paloaltonetworks.com/vm-series/9-0/vm-series-deployment/set-up-the-vm-series-firewall-on-azure/configure-activepassive-ha-for-vm-series-firewall-on-azure.html\n\n3. Delete the old Service Principal in the Azure AD Portal that was being used in the Azure HA configuration. Note: If the old Service Principal is used in other applications, then the other applications need to be updated with the new Service Principal." } ], "source": { "defect": [ "PLUG-3787" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-02-19T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "Do not generate TechSupport files on the affected VMs." } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-1978", "datePublished": "2020-04-08T18:41:58.205418Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-16T22:35:22.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1991 (GCVE-0-2020-1991)
Vulnerability from cvelistv5
Published
2020-04-08 18:41
Modified
2024-09-17 00:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-377 - Insecure Temporary File
Summary
An insecure temporary file vulnerability in Palo Alto Networks Traps allows a local authenticated Windows user to escalate privileges or overwrite system files. This issue affects Palo Alto Networks Traps 5.0 versions before 5.0.8; 6.1 versions before 6.1.4 on Windows. This issue does not affect Cortex XDR 7.0. This issue does not affect Traps for Linux or MacOS.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Traps |
Version: 5.0 < 5.0.8 Version: 6.1 < 6.1.4 |
||
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.653Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1991" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Traps", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.0.8", "status": "unaffected" } ], "lessThan": "5.0.8", "status": "affected", "version": "5.0", "versionType": "custom" }, { "changes": [ { "at": "6.1.4", "status": "unaffected" } ], "lessThan": "6.1.4", "status": "affected", "version": "6.1", "versionType": "custom" } ] }, { "product": "Cortex XDR", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "7.0.*" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Lasse Trolle Borup of Danish Cyber Defence for discovering and reporting this issue." } ], "datePublic": "2020-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "An insecure temporary file vulnerability in Palo Alto Networks Traps allows a local authenticated Windows user to escalate privileges or overwrite system files. This issue affects Palo Alto Networks Traps 5.0 versions before 5.0.8; 6.1 versions before 6.1.4 on Windows. This issue does not affect Cortex XDR 7.0. This issue does not affect Traps for Linux or MacOS." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-377", "description": "CWE-377 Insecure Temporary File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-08T18:41:58", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1991" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Traps 5.0.8, 6.1.4 and later versions." } ], "source": { "defect": [ "CPATR-7784" ], "discovery": "EXTERNAL" }, "title": "Traps: Insecure temporary file vulnerability may allow privilege escalation on Windows", "workarounds": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-04-08T16:00:00.000Z", "ID": "CVE-2020-1991", "STATE": "PUBLIC", "TITLE": "Traps: Insecure temporary file vulnerability may allow privilege escalation on Windows" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Traps", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.8" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.8" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "6.1", "version_value": "6.1.4" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "6.1", "version_value": "6.1.4" } ] } }, { "product_name": "Cortex XDR", "version": { "version_data": [ { "version_affected": "!", "version_name": "7.0", "version_value": "7.0.*" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Lasse Trolle Borup of Danish Cyber Defence for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An insecure temporary file vulnerability in Palo Alto Networks Traps allows a local authenticated Windows user to escalate privileges or overwrite system files. This issue affects Palo Alto Networks Traps 5.0 versions before 5.0.8; 6.1 versions before 6.1.4 on Windows. This issue does not affect Cortex XDR 7.0. This issue does not affect Traps for Linux or MacOS." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-377 Insecure Temporary File" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-1991", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-1991" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Traps 5.0.8, 6.1.4 and later versions." } ], "source": { "defect": [ "CPATR-7784" ], "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-1991", "datePublished": "2020-04-08T18:41:58.528818Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-17T00:17:10.408Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1985 (GCVE-0-2020-1985)
Vulnerability from cvelistv5
Published
2020-04-08 18:41
Modified
2024-09-16 18:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-276 - Incorrect Default Permissions
Summary
Incorrect Default Permissions on C:\Programdata\Secdo\Logs folder in Secdo allows local authenticated users to overwrite system files and gain escalated privileges. This issue affects all versions Secdo for Windows.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.336Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1985" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Secdo", "vendor": "Secdo", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "credits": [ { "lang": "en", "value": "We like to thank Eviatar Gerzi of CyberArk Labs Team for discovering and reporting this issue." } ], "datePublic": "2020-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect Default Permissions on C:\\Programdata\\Secdo\\Logs folder in Secdo allows local authenticated users to overwrite system files and gain escalated privileges. This issue affects all versions Secdo for Windows." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-08T18:41:58", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1985" } ], "solutions": [ { "lang": "en", "value": "This product is no longer supported and the issue will not be fixed. Change permission on C:\\Programdata\\Secdo\\Logs folder to not allow unprivileged users access." } ], "source": { "defect": [ "PDV-1614" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "title": "Secdo: Incorrect Default Permissions", "workarounds": [ { "lang": "en", "value": "Change permission on C:\\Programdata\\Secdo\\Logs to not allow unprivileged users access." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-04-08T16:00:00.000Z", "ID": "CVE-2020-1985", "STATE": "PUBLIC", "TITLE": "Secdo: Incorrect Default Permissions" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Secdo", "version": { "version_data": [ { "platform": "Windows", "version_affected": "=", "version_value": "all versions" } ] } } ] }, "vendor_name": "Secdo" } ] } }, "credit": [ { "lang": "eng", "value": "We like to thank Eviatar Gerzi of CyberArk Labs Team for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect Default Permissions on C:\\Programdata\\Secdo\\Logs folder in Secdo allows local authenticated users to overwrite system files and gain escalated privileges. This issue affects all versions Secdo for Windows." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-276 Incorrect Default Permissions" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-1985", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-1985" } ] }, "solution": [ { "lang": "en", "value": "This product is no longer supported and the issue will not be fixed. Change permission on C:\\Programdata\\Secdo\\Logs folder to not allow unprivileged users access." } ], "source": { "defect": [ "PDV-1614" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "Change permission on C:\\Programdata\\Secdo\\Logs to not allow unprivileged users access." } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-1985", "datePublished": "2020-04-08T18:41:58.303212Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-16T18:28:43.796Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1986 (GCVE-0-2020-1986)
Vulnerability from cvelistv5
Published
2020-04-08 18:41
Modified
2024-09-16 20:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Improper input validation vulnerability in Secdo allows an authenticated local user with 'create folders or append data' access to the root of the OS disk (C:\) to cause a system crash on every login. This issue affects all versions Secdo for Windows.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.409Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1986" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Secdo", "vendor": "Secdo", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "credits": [ { "lang": "en", "value": "We like to thank Eviatar Gerzi of CyberArk Labs Team for discovering and reporting this issue." } ], "datePublic": "2020-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper input validation vulnerability in Secdo allows an authenticated local user with \u0027create folders or append data\u0027 access to the root of the OS disk (C:\\) to cause a system crash on every login. This issue affects all versions Secdo for Windows." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-08T18:41:58", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1986" } ], "solutions": [ { "lang": "en", "value": "This product is no longer supported and the issue will not be fixed. This issue can be easily mitigated by creating a \"C:\\proc\" folder and not allowing unprivileged users to access to that folder, or ensuring unprivileged users do not have \u0027create folder\u0027 access to the root of a disk (C:\\)." } ], "source": { "defect": [ "PDV-1615" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "title": "Secdo: Local authenticated users can cause Windows system crash", "workarounds": [ { "lang": "en", "value": "Exploitation of this issue can be prevented by creating a \"C:\\proc\" folder and not allowing unprivileged users to access that folder." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-04-08T16:00:00.000Z", "ID": "CVE-2020-1986", "STATE": "PUBLIC", "TITLE": "Secdo: Local authenticated users can cause Windows system crash" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Secdo", "version": { "version_data": [ { "platform": "Windows", "version_affected": "=", "version_value": "all versions" } ] } } ] }, "vendor_name": "Secdo" } ] } }, "credit": [ { "lang": "eng", "value": "We like to thank Eviatar Gerzi of CyberArk Labs Team for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation vulnerability in Secdo allows an authenticated local user with \u0027create folders or append data\u0027 access to the root of the OS disk (C:\\) to cause a system crash on every login. This issue affects all versions Secdo for Windows." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-1986", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-1986" } ] }, "solution": [ { "lang": "en", "value": "This product is no longer supported and the issue will not be fixed. This issue can be easily mitigated by creating a \"C:\\proc\" folder and not allowing unprivileged users to access to that folder, or ensuring unprivileged users do not have \u0027create folder\u0027 access to the root of a disk (C:\\)." } ], "source": { "defect": [ "PDV-1615" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "Exploitation of this issue can be prevented by creating a \"C:\\proc\" folder and not allowing unprivileged users to access that folder." } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-1986", "datePublished": "2020-04-08T18:41:58.340011Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-16T20:26:16.271Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1989 (GCVE-0-2020-1989)
Vulnerability from cvelistv5
Published
2020-04-08 18:41
Modified
2024-09-16 19:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-266 - Incorrect Privilege Assignment
Summary
An incorrect privilege assignment vulnerability when writing application-specific files in the Palo Alto Networks Global Protect Agent for Linux on ARM platform allows a local authenticated user to gain root privileges on the system. This issue affects Palo Alto Networks Global Protect Agent for Linux 5.0 versions before 5.0.8; 5.1 versions before 5.1.1.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Global Protect Agent |
Version: 5.0 < 5.0.8 Version: 5.1 < 5.1.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.592Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1989" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Linux ARM" ], "product": "Global Protect Agent", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.0.8", "status": "unaffected" } ], "lessThan": "5.0.8", "status": "affected", "version": "5.0", "versionType": "custom" }, { "changes": [ { "at": "5.1.1", "status": "unaffected" } ], "lessThan": "5.1.1", "status": "affected", "version": "5.1", "versionType": "custom" } ] } ], "datePublic": "2020-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "An incorrect privilege assignment vulnerability when writing application-specific files in the Palo Alto Networks Global Protect Agent for Linux on ARM platform allows a local authenticated user to gain root privileges on the system. This issue affects Palo Alto Networks Global Protect Agent for Linux 5.0 versions before 5.0.8; 5.1 versions before 5.1.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-266", "description": "CWE-266 Incorrect Privilege Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-08T18:41:58", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1989" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Global Protect Agent 5.0.8, Global Protect Agent 5.1.1 and all later versions." } ], "source": { "defect": [ "GPC-9358" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "title": "Global Protect Agent: Incorrect privilege assignment allows local privilege escalation", "workarounds": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-04-08T16:00:00.000Z", "ID": "CVE-2020-1989", "STATE": "PUBLIC", "TITLE": "Global Protect Agent: Incorrect privilege assignment allows local privilege escalation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Global Protect Agent", "version": { "version_data": [ { "platform": "Linux ARM", "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.8" }, { "platform": "Linux ARM", "version_affected": "\u003c", "version_name": "5.1", "version_value": "5.1.1" }, { "platform": "Linux ARM", "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.8" }, { "platform": "Linux ARM", "version_affected": "!\u003e=", "version_name": "5.1", "version_value": "5.1.1" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An incorrect privilege assignment vulnerability when writing application-specific files in the Palo Alto Networks Global Protect Agent for Linux on ARM platform allows a local authenticated user to gain root privileges on the system. This issue affects Palo Alto Networks Global Protect Agent for Linux 5.0 versions before 5.0.8; 5.1 versions before 5.1.1." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-266 Incorrect Privilege Assignment" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-1989", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-1989" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Global Protect Agent 5.0.8, Global Protect Agent 5.1.1 and all later versions." } ], "source": { "defect": [ "GPC-9358" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-1989", "datePublished": "2020-04-08T18:41:58.456857Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-16T19:14:44.124Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-6111 (GCVE-0-2019-6111)
Vulnerability from cvelistv5
Published
2019-01-31 00:00
Modified
2024-08-04 20:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:16:23.623Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4387", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4387" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190213-0001/" }, { "name": "106741", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106741" }, { "tags": [ "x_transferred" ], "url": "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c" }, { "name": "USN-3885-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/3885-1/" }, { "name": "USN-3885-2", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/3885-2/" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677794" }, { "tags": [ "x_transferred" ], "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" }, { "name": "46193", "tags": [ "exploit", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/46193/" }, { "name": "GLSA-201903-16", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201903-16" }, { "name": "[debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html" }, { "name": "[oss-security] 20190417 Announce: OpenSSH 8.0 released", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/18/1" }, { "name": "FEDORA-2019-0f4190cdb0", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/" }, { "name": "[mina-dev] 20190620 [jira] [Created] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23%40%3Cdev.mina.apache.org%3E" }, { "name": "[mina-dev] 20190623 [jira] [Comment Edited] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b%40%3Cdev.mina.apache.org%3E" }, { "name": "[mina-dev] 20190623 [jira] [Commented] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f%40%3Cdev.mina.apache.org%3E" }, { "name": "openSUSE-SU-2019:1602", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html" }, { "name": "FreeBSD-EN-19:10", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc" }, { "name": "[mina-dev] 20190820 [jira] [Resolved] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a%40%3Cdev.mina.apache.org%3E" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3702", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "name": "[oss-security] 20220802 CVE-2022-29154: Rsync client-side arbitrary file write vulnerability.", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/02/1" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4387", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2019/dsa-4387" }, { "url": "https://security.netapp.com/advisory/ntap-20190213-0001/" }, { "name": "106741", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/106741" }, { "url": "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c" }, { "name": "USN-3885-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/3885-1/" }, { "name": "USN-3885-2", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/3885-2/" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1677794" }, { "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" }, { "name": "46193", "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/46193/" }, { "name": "GLSA-201903-16", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/201903-16" }, { "name": "[debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html" }, { "name": "[oss-security] 20190417 Announce: OpenSSH 8.0 released", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2019/04/18/1" }, { "name": "FEDORA-2019-0f4190cdb0", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/" }, { "name": "[mina-dev] 20190620 [jira] [Created] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23%40%3Cdev.mina.apache.org%3E" }, { "name": "[mina-dev] 20190623 [jira] [Comment Edited] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b%40%3Cdev.mina.apache.org%3E" }, { "name": "[mina-dev] 20190623 [jira] [Commented] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f%40%3Cdev.mina.apache.org%3E" }, { "name": "openSUSE-SU-2019:1602", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html" }, { "name": "FreeBSD-EN-19:10", "tags": [ "vendor-advisory" ], "url": "https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc" }, { "name": "[mina-dev] 20190820 [jira] [Resolved] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a%40%3Cdev.mina.apache.org%3E" }, { "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3702", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "name": "[oss-security] 20220802 CVE-2022-29154: Rsync client-side arbitrary file write vulnerability.", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/02/1" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-6111", "datePublished": "2019-01-31T00:00:00", "dateReserved": "2019-01-10T00:00:00", "dateUpdated": "2024-08-04T20:16:23.623Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-20685 (GCVE-0-2018-20685)
Vulnerability from cvelistv5
Published
2019-01-10 00:00
Modified
2024-08-05 12:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:05:17.712Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4387", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4387" }, { "name": "USN-3885-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/3885-1/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2" }, { "tags": [ "x_transferred" ], "url": "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197\u0026r2=1.198\u0026f=h" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190215-0001/" }, { "name": "106531", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106531" }, { "tags": [ "x_transferred" ], "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" }, { "name": "GLSA-201903-16", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201903-16" }, { "name": "[debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3702", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "name": "GLSA-202007-53", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202007-53" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4387", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2019/dsa-4387" }, { "name": "USN-3885-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/3885-1/" }, { "url": "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2" }, { "url": "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197\u0026r2=1.198\u0026f=h" }, { "url": "https://security.netapp.com/advisory/ntap-20190215-0001/" }, { "name": "106531", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/106531" }, { "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" }, { "name": "GLSA-201903-16", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/201903-16" }, { "name": "[debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html" }, { "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3702", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "name": "GLSA-202007-53", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202007-53" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-20685", "datePublished": "2019-01-10T00:00:00", "dateReserved": "2019-01-10T00:00:00", "dateUpdated": "2024-08-05T12:05:17.712Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-6109 (GCVE-0-2019-6109)
Vulnerability from cvelistv5
Published
2019-01-31 00:00
Modified
2024-08-04 20:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
References
URL | Tags | ||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:16:24.501Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4387", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4387" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190213-0001/" }, { "tags": [ "x_transferred" ], "url": "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c" }, { "name": "USN-3885-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/3885-1/" }, { "tags": [ "x_transferred" ], "url": "https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c" }, { "tags": [ "x_transferred" ], "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" }, { "name": "GLSA-201903-16", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201903-16" }, { "name": "[debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html" }, { "name": "FEDORA-2019-0f4190cdb0", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/" }, { "name": "openSUSE-SU-2019:1602", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3702", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-01-31T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4387", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2019/dsa-4387" }, { "url": "https://security.netapp.com/advisory/ntap-20190213-0001/" }, { "url": "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c" }, { "name": "USN-3885-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/3885-1/" }, { "url": "https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c" }, { "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" }, { "name": "GLSA-201903-16", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/201903-16" }, { "name": "[debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html" }, { "name": "FEDORA-2019-0f4190cdb0", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/" }, { "name": "openSUSE-SU-2019:1602", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html" }, { "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3702", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-6109", "datePublished": "2019-01-31T00:00:00", "dateReserved": "2019-01-10T00:00:00", "dateUpdated": "2024-08-04T20:16:24.501Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1990 (GCVE-0-2020-1990)
Vulnerability from cvelistv5
Published
2020-04-08 18:41
Modified
2024-09-17 01:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-121 - Stack-based Buffer Overflow
Summary
A stack-based buffer overflow vulnerability in the management server component of PAN-OS allows an authenticated user to upload a corrupted PAN-OS configuration and potentially execute code with root privileges. This issue affects Palo Alto Networks PAN-OS 8.1 versions before 8.1.13; 9.0 versions before 9.0.7. This issue does not affect PAN-OS 7.1.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | PAN-OS |
Version: 8.1 < 8.1.13 Version: 9.0 < 9.0.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.591Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1990" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "PAN-OS", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "7.1.*" }, { "changes": [ { "at": "8.1.13", "status": "unaffected" } ], "lessThan": "8.1.13", "status": "affected", "version": "8.1", "versionType": "custom" }, { "changes": [ { "at": "9.0.7", "status": "unaffected" } ], "lessThan": "9.0.7", "status": "affected", "version": "9.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "This issue was discovered by Nicholas Newsom of Palo Alto Networks during internal security review." } ], "datePublic": "2020-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability in the management server component of PAN-OS allows an authenticated user to upload a corrupted PAN-OS configuration and potentially execute code with root privileges. This issue affects Palo Alto Networks PAN-OS 8.1 versions before 8.1.13; 9.0 versions before 9.0.7. This issue does not affect PAN-OS 7.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-08T18:41:58", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1990" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7 and all later versions." } ], "source": { "defect": [ "PAN-121319" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "title": "PAN-OS: Buffer overflow in the management server", "workarounds": [ { "lang": "en", "value": "These issues affect the management interface of PAN-OS and are strongly mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 9.0 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-04-08T16:00:00.000Z", "ID": "CVE-2020-1990", "STATE": "PUBLIC", "TITLE": "PAN-OS: Buffer overflow in the management server" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "PAN-OS", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "8.1", "version_value": "8.1.13" }, { "version_affected": "\u003c", "version_name": "9.0", "version_value": "9.0.7" }, { "version_affected": "!\u003e=", "version_name": "8.1", "version_value": "8.1.13" }, { "version_affected": "!\u003e=", "version_name": "9.0", "version_value": "9.0.7" }, { "version_affected": "!", "version_name": "7.1", "version_value": "7.1.*" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "This issue was discovered by Nicholas Newsom of Palo Alto Networks during internal security review." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A stack-based buffer overflow vulnerability in the management server component of PAN-OS allows an authenticated user to upload a corrupted PAN-OS configuration and potentially execute code with root privileges. This issue affects Palo Alto Networks PAN-OS 8.1 versions before 8.1.13; 9.0 versions before 9.0.7. This issue does not affect PAN-OS 7.1." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-121 Stack-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-1990", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-1990" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7 and all later versions." } ], "source": { "defect": [ "PAN-121319" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "These issues affect the management interface of PAN-OS and are strongly mitigated by following best practices for securing the PAN-OS management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 9.0 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html." } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-1990", "datePublished": "2020-04-08T18:41:58.493602Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-17T01:16:16.817Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1987 (GCVE-0-2020-1987)
Vulnerability from cvelistv5
Published
2020-04-08 18:41
Modified
2024-09-16 19:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Information Exposure
Summary
An information exposure vulnerability in the logging component of Palo Alto Networks Global Protect Agent allows a local authenticated user to read VPN cookie information when the troubleshooting logging level is set to "Dump". This issue affects Palo Alto Networks Global Protect Agent 5.0 versions prior to 5.0.9; 5.1 versions prior to 5.1.1.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Global Protect Agent |
Version: 5.0 < 5.0.9 Version: 5.1 < 5.1.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.525Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1987" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Global Protect Agent", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.0.9", "status": "unaffected" } ], "lessThan": "5.0.9", "status": "affected", "version": "5.0", "versionType": "custom" }, { "changes": [ { "at": "5.1.1", "status": "unaffected" } ], "lessThan": "5.1.1", "status": "affected", "version": "5.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Ahmet Hrnjadovic for discovering and reporting this issue." } ], "datePublic": "2020-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "An information exposure vulnerability in the logging component of Palo Alto Networks Global Protect Agent allows a local authenticated user to read VPN cookie information when the troubleshooting logging level is set to \"Dump\". This issue affects Palo Alto Networks Global Protect Agent 5.0 versions prior to 5.0.9; 5.1 versions prior to 5.1.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-08T18:41:58", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1987" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Global Protect Agent 5.0.9, Global Protect Agent 5.1.1 and all later versions." } ], "source": { "defect": [ "GPC-9393" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "title": "Global Protect Agent: VPN cookie local information disclosure", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-04-08T16:00:00.000Z", "ID": "CVE-2020-1987", "STATE": "PUBLIC", "TITLE": "Global Protect Agent: VPN cookie local information disclosure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Global Protect Agent", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.9" }, { "version_affected": "\u003c", "version_name": "5.1", "version_value": "5.1.1" }, { "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.9" }, { "version_affected": "!\u003e=", "version_name": "5.1", "version_value": "5.1.1" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Ahmet Hrnjadovic for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An information exposure vulnerability in the logging component of Palo Alto Networks Global Protect Agent allows a local authenticated user to read VPN cookie information when the troubleshooting logging level is set to \"Dump\". This issue affects Palo Alto Networks Global Protect Agent 5.0 versions prior to 5.0.9; 5.1 versions prior to 5.1.1." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-1987", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-1987" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Global Protect Agent 5.0.9, Global Protect Agent 5.1.1 and all later versions." } ], "source": { "defect": [ "GPC-9393" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-1987", "datePublished": "2020-04-08T18:41:58.380348Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-16T19:14:19.257Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1984 (GCVE-0-2020-1984)
Vulnerability from cvelistv5
Published
2020-04-08 18:41
Modified
2024-09-17 04:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-73 - External Control of File Name or Path
Summary
Secdo tries to execute a script at a hardcoded path if present, which allows a local authenticated user with 'create folders or append data' access to the root of the OS disk (C:\) to gain system privileges if the path does not already exist or is writable. This issue affects all versions of Secdo for Windows.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.417Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1984" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Secdo", "vendor": "Secdo", "versions": [ { "status": "affected", "version": "all versions" } ] } ], "credits": [ { "lang": "en", "value": "We like to thank Eviatar Gerzi of CyberArk Labs Team for discovering and reporting this issue." } ], "datePublic": "2020-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Secdo tries to execute a script at a hardcoded path if present, which allows a local authenticated user with \u0027create folders or append data\u0027 access to the root of the OS disk (C:\\) to gain system privileges if the path does not already exist or is writable. This issue affects all versions of Secdo for Windows." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-73", "description": "CWE-73 External Control of File Name or Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-08T18:41:58", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1984" } ], "solutions": [ { "lang": "en", "value": "This product is no longer supported and the issue is not going to be fixed. The issue can be completely mitigated by ensuring that unprivileged users do not have \u0027create folder\u0027 access on the root of the filesystem such as C:\\ or on a folder named C:\\Common." } ], "source": { "defect": [ "PDV-1613" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "title": "Secdo: Privilege escalation via hardcoded script path", "workarounds": [ { "lang": "en", "value": "This issue can be mitigated by :\n- Ensure unprivileged users do not have \u0027create folder\u0027 access on the root of filesystem such as C:\\.\nor\n- Creating a folder named C:\\Common and ensuring unprivileged users do not have \u0027create folder\u0027 access." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-04-08T16:00:00.000Z", "ID": "CVE-2020-1984", "STATE": "PUBLIC", "TITLE": "Secdo: Privilege escalation via hardcoded script path" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Secdo", "version": { "version_data": [ { "platform": "Windows", "version_affected": "=", "version_value": "all versions" } ] } } ] }, "vendor_name": "Secdo" } ] } }, "credit": [ { "lang": "eng", "value": "We like to thank Eviatar Gerzi of CyberArk Labs Team for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Secdo tries to execute a script at a hardcoded path if present, which allows a local authenticated user with \u0027create folders or append data\u0027 access to the root of the OS disk (C:\\) to gain system privileges if the path does not already exist or is writable. This issue affects all versions of Secdo for Windows." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-73 External Control of File Name or Path" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-1984", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-1984" } ] }, "solution": [ { "lang": "en", "value": "This product is no longer supported and the issue is not going to be fixed. The issue can be completely mitigated by ensuring that unprivileged users do not have \u0027create folder\u0027 access on the root of the filesystem such as C:\\ or on a folder named C:\\Common." } ], "source": { "defect": [ "PDV-1613" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "This issue can be mitigated by :\n- Ensure unprivileged users do not have \u0027create folder\u0027 access on the root of filesystem such as C:\\.\nor\n- Creating a folder named C:\\Common and ensuring unprivileged users do not have \u0027create folder\u0027 access." } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-1984", "datePublished": "2020-04-08T18:41:58.264586Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-17T04:20:08.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1992 (GCVE-0-2020-1992)
Vulnerability from cvelistv5
Published
2020-04-08 18:41
Modified
2024-09-17 03:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-134 - Use of Externally-Controlled Format String
Summary
A format string vulnerability in the Varrcvr daemon of PAN-OS on PA-7000 Series devices with a Log Forwarding Card (LFC) allows remote attackers to crash the daemon creating a denial of service condition or potentially execute code with root privileges. This issue affects Palo Alto Networks PAN-OS 9.0 versions before 9.0.7; PAN-OS 9.1 versions before 9.1.2 on PA-7000 Series devices with an LFC installed and configured. This issue requires WildFire services to be configured and enabled. This issue does not affect PAN-OS 8.1 and earlier releases. This issue does not affect any other PA Series firewalls.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | PAN-OS |
Version: 9.0 < 9.0.7 Version: 9.1 < 9.1.2 |
||
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1992" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "PA-7000 series with LFC" ], "product": "PAN-OS", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "9.0.7", "status": "unaffected" } ], "lessThan": "9.0.7", "status": "affected", "version": "9.0", "versionType": "custom" }, { "changes": [ { "at": "9.1.2", "status": "unaffected" } ], "lessThan": "9.1.2", "status": "affected", "version": "9.1", "versionType": "custom" } ] }, { "product": "PAN-OS", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "8.1.*" }, { "status": "unaffected", "version": "8.0.*" }, { "status": "unaffected", "version": "7.1.*" } ] } ], "configurations": [ { "lang": "en", "value": "This issue requires WildFire services to be configured and enabled." } ], "credits": [ { "lang": "en", "value": "This issue was found by a customer." } ], "datePublic": "2020-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "A format string vulnerability in the Varrcvr daemon of PAN-OS on PA-7000 Series devices with a Log Forwarding Card (LFC) allows remote attackers to crash the daemon creating a denial of service condition or potentially execute code with root privileges. This issue affects Palo Alto Networks PAN-OS 9.0 versions before 9.0.7; PAN-OS 9.1 versions before 9.1.2 on PA-7000 Series devices with an LFC installed and configured. This issue requires WildFire services to be configured and enabled. This issue does not affect PAN-OS 8.1 and earlier releases. This issue does not affect any other PA Series firewalls." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-134", "description": "CWE-134 Use of Externally-Controlled Format String", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-08T18:41:58", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1992" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in PAN-OS 9.0.7, PAN-OS 9.1.2 and all later versions." } ], "source": { "defect": [ "PAN-135103" ], "discovery": "USER" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "title": "PAN-OS on PA-7000 Series: Varrcvr daemon network-based denial of service or privilege escalation", "workarounds": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-04-08T16:00:00.000Z", "ID": "CVE-2020-1992", "STATE": "PUBLIC", "TITLE": "PAN-OS on PA-7000 Series: Varrcvr daemon network-based denial of service or privilege escalation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "PAN-OS", "version": { "version_data": [ { "platform": "PA-7000 series with LFC", "version_affected": "\u003c", "version_name": "9.0", "version_value": "9.0.7" }, { "platform": "PA-7000 series with LFC", "version_affected": "\u003c", "version_name": "9.1", "version_value": "9.1.2" }, { "platform": "PA-7000 series with LFC", "version_affected": "!\u003e=", "version_name": "9.0", "version_value": "9.0.7" }, { "platform": "PA-7000 series with LFC", "version_affected": "!\u003e=", "version_name": "9.1", "version_value": "9.1.2" }, { "version_affected": "!", "version_name": "8.1", "version_value": "8.1.*" }, { "version_affected": "!", "version_name": "8.0", "version_value": "8.0.*" }, { "version_affected": "!", "version_name": "7.1", "version_value": "7.1.*" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "configuration": [ { "lang": "en", "value": "This issue requires WildFire services to be configured and enabled." } ], "credit": [ { "lang": "eng", "value": "This issue was found by a customer." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A format string vulnerability in the Varrcvr daemon of PAN-OS on PA-7000 Series devices with a Log Forwarding Card (LFC) allows remote attackers to crash the daemon creating a denial of service condition or potentially execute code with root privileges. This issue affects Palo Alto Networks PAN-OS 9.0 versions before 9.0.7; PAN-OS 9.1 versions before 9.1.2 on PA-7000 Series devices with an LFC installed and configured. This issue requires WildFire services to be configured and enabled. This issue does not affect PAN-OS 8.1 and earlier releases. This issue does not affect any other PA Series firewalls." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-134 Use of Externally-Controlled Format String" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-1992", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-1992" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in PAN-OS 9.0.7, PAN-OS 9.1.2 and all later versions." } ], "source": { "defect": [ "PAN-135103" ], "discovery": "USER" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-1992", "datePublished": "2020-04-08T18:41:58.564278Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-17T03:44:20.914Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1988 (GCVE-0-2020-1988)
Vulnerability from cvelistv5
Published
2020-04-08 18:41
Modified
2024-09-16 18:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-428 - Unquoted Search Path or Element
Summary
An unquoted search path vulnerability in the Windows release of Global Protect Agent allows an authenticated local user with file creation privileges on the root of the OS disk (C:\) or to Program Files directory to gain system privileges. This issue affects Palo Alto Networks GlobalProtect Agent 5.0 versions before 5.0.5; 4.1 versions before 4.1.13 on Windows;
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Global Protect Agent |
Version: 5.0 < 5.0.5 Version: 4.1 < 4.1.13 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.605Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1988" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Global Protect Agent", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.0.5", "status": "unaffected" } ], "lessThan": "5.0.5", "status": "affected", "version": "5.0", "versionType": "custom" }, { "changes": [ { "at": "4.1.13", "status": "unaffected" } ], "lessThan": "4.1.13", "status": "affected", "version": "4.1", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "This issue only affects Windows systems where local users are configured with file creation privileges to the root of the OS disk (C:\\) or \u0027Program Files\u0027 directory." } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Ratnesh Pandey of Bromium and Matthew Batten for discovering and reporting this issue." } ], "datePublic": "2020-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "An unquoted search path vulnerability in the Windows release of Global Protect Agent allows an authenticated local user with file creation privileges on the root of the OS disk (C:\\) or to Program Files directory to gain system privileges. This issue affects Palo Alto Networks GlobalProtect Agent 5.0 versions before 5.0.5; 4.1 versions before 4.1.13 on Windows;" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-428", "description": "CWE-428 Unquoted Search Path or Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-08T18:41:58", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1988" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Global Protect Agent 5.0.5, Global Protect Agent 4.1.13 and all later versions." } ], "source": { "defect": [ "GPC-9320" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "title": "Global Protect Agent: Local privilege escalation due to an unquoted search path vulnerability", "workarounds": [ { "lang": "en", "value": "Do not grant file creation privileges on the root of the OS disk (C:\\) or \u0027Program Files\u0027 directory to unprivileged users." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-04-08T16:00:00.000Z", "ID": "CVE-2020-1988", "STATE": "PUBLIC", "TITLE": "Global Protect Agent: Local privilege escalation due to an unquoted search path vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Global Protect Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.5" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "4.1", "version_value": "4.1.13" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.5" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "4.1", "version_value": "4.1.13" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "configuration": [ { "lang": "en", "value": "This issue only affects Windows systems where local users are configured with file creation privileges to the root of the OS disk (C:\\) or \u0027Program Files\u0027 directory." } ], "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Ratnesh Pandey of Bromium and Matthew Batten for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unquoted search path vulnerability in the Windows release of Global Protect Agent allows an authenticated local user with file creation privileges on the root of the OS disk (C:\\) or to Program Files directory to gain system privileges. This issue affects Palo Alto Networks GlobalProtect Agent 5.0 versions before 5.0.5; 4.1 versions before 4.1.13 on Windows;" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-428 Unquoted Search Path or Element" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-1988", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-1988" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Global Protect Agent 5.0.5, Global Protect Agent 4.1.13 and all later versions." } ], "source": { "defect": [ "GPC-9320" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "Do not grant file creation privileges on the root of the OS disk (C:\\) or \u0027Program Files\u0027 directory to unprivileged users." } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-1988", "datePublished": "2020-04-08T18:41:58.415618Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-16T18:03:55.930Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…