fkie_cve-2022-0028
Vulnerability from fkie_nvd
Published
2022-08-10 16:15
Modified
2025-02-07 15:03
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Summary
A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series (virtual) and CN-Series (container) firewall against an attacker-specified target. To be misused by an external attacker, the firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a source zone that has an external facing interface. This configuration is not typical for URL filtering and, if set, is likely unintended by the administrator. If exploited, this issue would not impact the confidentiality, integrity, or availability of our products. However, the resulting denial-of-service (DoS) attack may help obfuscate the identity of the attacker and implicate the firewall as the source of the attack. We have taken prompt action to address this issue in our PAN-OS software. All software updates for this issue are expected to be released no later than the week of August 15, 2022. This issue does not impact Panorama M-Series or Panorama virtual appliances. This issue has been resolved for all Cloud NGFW and Prisma Access customers and no additional action is required from them.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@paloaltonetworks.com | https://security.paloaltonetworks.com/CVE-2022-0028 | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.paloaltonetworks.com/CVE-2022-0028 | Mitigation, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | pan-os | * | |
paloaltonetworks | pan-os | * | |
paloaltonetworks | pan-os | * | |
paloaltonetworks | pan-os | * | |
paloaltonetworks | pan-os | * | |
paloaltonetworks | pan-os | * | |
paloaltonetworks | pan-os | 8.1.23 | |
paloaltonetworks | pan-os | 9.0.16 | |
paloaltonetworks | pan-os | 9.0.16 | |
paloaltonetworks | pan-os | 9.1.14 | |
paloaltonetworks | pan-os | 9.1.14 | |
paloaltonetworks | pan-os | 10.0.11 | |
paloaltonetworks | pan-os | 10.1.6 | |
paloaltonetworks | pan-os | 10.1.6 | |
paloaltonetworks | pan-os | 10.2.2 | |
paloaltonetworks | pan-os | 10.2.2 |
{ cisaActionDue: "2022-09-12", cisaExploitAdd: "2022-08-22", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Palo Alto Networks PAN-OS Reflected Amplification Denial-of-Service Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", matchCriteriaId: "99EC0B3A-A8BE-4394-81F0-C05BA177F867", versionEndExcluding: "8.1.23", versionStartIncluding: "8.1.0", vulnerable: true, }, { criteria: "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", matchCriteriaId: "0E3757E3-17C0-4D42-A31A-78F40A774F41", versionEndExcluding: "9.0.16", versionStartIncluding: "9.0.0", vulnerable: true, }, { criteria: "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", matchCriteriaId: "D457521C-1D9D-46C2-A1EE-3999A1F054A1", versionEndExcluding: "9.1.14", versionStartIncluding: "9.1.0", vulnerable: true, }, { criteria: "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", matchCriteriaId: "30D919C6-068E-4C81-A7A7-261F0D9E4B66", versionEndExcluding: "10.0.11", versionStartIncluding: "10.0.0", vulnerable: true, }, { criteria: "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", matchCriteriaId: "E6EB81D3-ADC7-4114-8FFB-C15780239391", versionEndExcluding: "10.1.6", versionStartIncluding: "10.1.0", vulnerable: true, }, { criteria: "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", matchCriteriaId: "22513B1B-6022-4732-8CD4-6E74E40D664A", versionEndExcluding: "10.2.2", versionStartIncluding: "10.2.0", vulnerable: true, }, { criteria: "cpe:2.3:o:paloaltonetworks:pan-os:8.1.23:-:*:*:*:*:*:*", matchCriteriaId: "2377E54D-3B6F-4DA3-9A82-355AAFA26BC1", vulnerable: true, }, { criteria: "cpe:2.3:o:paloaltonetworks:pan-os:9.0.16:-:*:*:*:*:*:*", matchCriteriaId: "C099A5E1-849D-4A3B-B780-C994EFFC6783", vulnerable: true, }, { criteria: "cpe:2.3:o:paloaltonetworks:pan-os:9.0.16:h2:*:*:*:*:*:*", matchCriteriaId: "7BB17CCF-BE75-4B23-91C5-397BE25C1DC7", vulnerable: true, }, { criteria: "cpe:2.3:o:paloaltonetworks:pan-os:9.1.14:-:*:*:*:*:*:*", matchCriteriaId: "39BA8B04-A3A5-4636-867C-C6BB3F24C3B6", vulnerable: true, }, { criteria: "cpe:2.3:o:paloaltonetworks:pan-os:9.1.14:h1:*:*:*:*:*:*", matchCriteriaId: "431E508F-3A80-4146-B88E-CEBA0AB5A850", vulnerable: true, }, { criteria: "cpe:2.3:o:paloaltonetworks:pan-os:10.0.11:*:*:*:*:*:*:*", matchCriteriaId: "142E4A38-662F-4DF9-9E0E-4B9BB9A78F7F", vulnerable: true, }, { criteria: "cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*", matchCriteriaId: "443462D5-461E-46A0-80E6-61CF30D4D71F", vulnerable: true, }, { criteria: "cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:h3:*:*:*:*:*:*", matchCriteriaId: "299A820D-E4E7-40FA-A4C2-6F1699E13DFA", vulnerable: true, }, { criteria: "cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:-:*:*:*:*:*:*", matchCriteriaId: "33340036-0E81-41CD-AFC4-480F509F8DD2", vulnerable: true, }, { criteria: "cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h1:*:*:*:*:*:*", matchCriteriaId: "5D7986DC-187D-4798-8B4A-7D23DF0EE0C8", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series (virtual) and CN-Series (container) firewall against an attacker-specified target. To be misused by an external attacker, the firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a source zone that has an external facing interface. This configuration is not typical for URL filtering and, if set, is likely unintended by the administrator. If exploited, this issue would not impact the confidentiality, integrity, or availability of our products. However, the resulting denial-of-service (DoS) attack may help obfuscate the identity of the attacker and implicate the firewall as the source of the attack. We have taken prompt action to address this issue in our PAN-OS software. All software updates for this issue are expected to be released no later than the week of August 15, 2022. This issue does not impact Panorama M-Series or Panorama virtual appliances. This issue has been resolved for all Cloud NGFW and Prisma Access customers and no additional action is required from them.", }, { lang: "es", value: "Una mala configuración de la política de filtrado de URL de PAN-OS podría permitir a un atacante basado en la red conducir ataques de denegación de servicio TCP reflejados y amplificados (RDoS). El ataque de denegación de servicio parecería originarse desde un firewall de la serie PA (hardware), la serie VM (virtual) y la serie CN (contenedor) de Palo Alto Networks contra un objetivo especificado por el atacante. Para que un atacante externo haga un uso no debido, la configuración del firewall debe tener un perfil de filtrado de URL con una o más categorías bloqueadas asignadas a una zona de origen que tenga una interfaz de cara al exterior. Esta configuración no es típica para el filtrado de URL y, si es establecido, es probable que no sea intencionada por el administrador. Si es explotado, este problema no afectaría a la confidencialidad, integridad o disponibilidad de nuestros productos. Sin embargo, el ataque de denegación de servicio (DoS) resultando puede ayudar a ofuscar la identidad del atacante e implicar al firewall como la fuente del ataque. Hemos tomado medidas rápidas para abordar este problema en nuestro software PAN-OS. Es esperado que todas las actualizaciones de software para este problema sean publicadas a más tardar en la semana del 15 de agosto de 2022. Este problema no afecta a dispositivos virtuales de Panorama M-Series o Panorama. Este problema ha sido resuelto para todos los clientes de Cloud NGFW y Prisma Access y no es requerida ninguna acción adicional por su parte", }, ], id: "CVE-2022-0028", lastModified: "2025-02-07T15:03:58.277", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "psirt@paloaltonetworks.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-08-10T16:15:08.343", references: [ { source: "psirt@paloaltonetworks.com", tags: [ "Mitigation", "Third Party Advisory", ], url: "https://security.paloaltonetworks.com/CVE-2022-0028", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mitigation", "Third Party Advisory", ], url: "https://security.paloaltonetworks.com/CVE-2022-0028", }, ], sourceIdentifier: "psirt@paloaltonetworks.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-406", }, ], source: "psirt@paloaltonetworks.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.