Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Palo Alto Networks Patches Command Injection Vulnerabilities in PAN-OS

Palo Alto Networks informed customers on Wednesday that it has patched two high-severity vulnerabilities in PAN-OS, the software running on the company’s firewalls.

Palo Alto Networks informed customers on Wednesday that it has patched two high-severity vulnerabilities in PAN-OS, the software running on the company’s firewalls.

Based on their CVSS score, the more serious of the flaws is CVE-2020-2034, which impacts the GlobalProtect portal and allows an unauthenticated attacker with network access to the targeted system to execute arbitrary operating system commands with root permissions.

“An attacker would require some level of specific information about the configuration of an impacted firewall or perform brute-force attacks to exploit this issue,” the vendor said in its advisory.

The weakness can only be exploited if the GlobalProtect feature is enabled. The company says Prisma Access services are not impacted and the PAN-OS versions that patch CVE-2020-2021, a critical vulnerability that was disclosed recently, also fix this flaw.

The second high-severity vulnerability is tracked as CVE-2020-2030 and it allows an attacker with admin access to the PAN-OS management interface to execute arbitrary OS commands with root privileges.

Palo Alto Networks says both vulnerabilities were discovered internally and there is no evidence of malicious exploitation. However, a researcher noted that tens of thousands of devices could be vulnerable to attacks.

The company also informed customers that it has patched two medium-severity vulnerabilities in PAN-OS: one that can be exploited by an authenticated attacker with admin privileges for denial-of-service (DoS) attacks, and one related to the use of the outdated TLS 1.0 protocol for some communications between cloud-delivered services and PAN-OS.

These vulnerabilities do not appear to be as dangerous as CVE-2020-2021, which Palo Alto Networks patched in late June and which allows a network attacker to bypass authentication. Shortly after a patch was released, U.S. Cyber Command warned that foreign APTs will likely attempt to exploit it soon.

Advertisement. Scroll to continue reading.

Over the past week, hackers have been exploiting a critical vulnerability affecting the BIG-IP application delivery controller (ADC) from F5 Networks. Proof-of-concept (PoC) exploits were made public shortly after disclosure and an increasing number of attacks have been spotted. Attackers have delivered various payloads, including web shells and DDoS malware.

Related: Palo Alto Networks Patches Many Vulnerabilities in PAN-OS

Related: Critical RCE Vulnerability Found in Palo Alto Networks VPN Product

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.