Palo Alto Networks informed customers on Wednesday that it has patched two high-severity vulnerabilities in PAN-OS, the software running on the company’s firewalls.
Based on their CVSS score, the more serious of the flaws is CVE-2020-2034, which impacts the GlobalProtect portal and allows an unauthenticated attacker with network access to the targeted system to execute arbitrary operating system commands with root permissions.
“An attacker would require some level of specific information about the configuration of an impacted firewall or perform brute-force attacks to exploit this issue,” the vendor said in its advisory.
The weakness can only be exploited if the GlobalProtect feature is enabled. The company says Prisma Access services are not impacted and the PAN-OS versions that patch CVE-2020-2021, a critical vulnerability that was disclosed recently, also fix this flaw.
The second high-severity vulnerability is tracked as CVE-2020-2030 and it allows an attacker with admin access to the PAN-OS management interface to execute arbitrary OS commands with root privileges.
Palo Alto Networks says both vulnerabilities were discovered internally and there is no evidence of malicious exploitation. However, a researcher noted that tens of thousands of devices could be vulnerable to attacks.
The company also informed customers that it has patched two medium-severity vulnerabilities in PAN-OS: one that can be exploited by an authenticated attacker with admin privileges for denial-of-service (DoS) attacks, and one related to the use of the outdated TLS 1.0 protocol for some communications between cloud-delivered services and PAN-OS.
These vulnerabilities do not appear to be as dangerous as CVE-2020-2021, which Palo Alto Networks patched in late June and which allows a network attacker to bypass authentication. Shortly after a patch was released, U.S. Cyber Command warned that foreign APTs will likely attempt to exploit it soon.
Over the past week, hackers have been exploiting a critical vulnerability affecting the BIG-IP application delivery controller (ADC) from F5 Networks. Proof-of-concept (PoC) exploits were made public shortly after disclosure and an increasing number of attacks have been spotted. Attackers have delivered various payloads, including web shells and DDoS malware.
Related: Palo Alto Networks Patches Many Vulnerabilities in PAN-OS
Related: Critical RCE Vulnerability Found in Palo Alto Networks VPN Product

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- In Other News: AI Regulation, Layoffs, US Aerospace Attacks, Post-Quantum Encryption
- Evidence Suggests Ransomware Group Knew About MOVEit Zero-Day Since 2021
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Google Patches Third Chrome Zero-Day of 2023
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
Latest News
- In Other News: AI Regulation, Layoffs, US Aerospace Attacks, Post-Quantum Encryption
- Blackpoint Raises $190 Million to Help MSPs Combat Cyber Threats
- Google Introduces SAIF, a Framework for Secure AI Development and Use
- ‘Asylum Ambuscade’ Group Hit Thousands in Cybercrime, Espionage Campaigns
- Evidence Suggests Ransomware Group Knew About MOVEit Zero-Day Since 2021
- SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint
- Google Cloud Now Offering $1 Million Cryptomining Protection
- Democrats and Republicans Are Skeptical of US Spying Practices, an AP-NORC Poll Finds
