Palo Alto Networks Patches Command Injection Vulnerabilities in PAN-OS
Palo Alto Networks informed customers on Wednesday that it has patched two high-severity vulnerabilities in PAN-OS, the software running on the company’s firewalls.
Based on their CVSS score, the more serious of the flaws is CVE-2020-2034, which impacts the GlobalProtect portal and allows an unauthenticated attacker with network access to the targeted system to execute arbitrary operating system commands with root permissions.
“An attacker would require some level of specific information about the configuration of an impacted firewall or perform brute-force attacks to exploit this issue,” the vendor said in its advisory.
The weakness can only be exploited if the GlobalProtect feature is enabled. The company says Prisma Access services are not impacted and the PAN-OS versions that patch CVE-2020-2021, a critical vulnerability that was disclosed recently, also fix this flaw.
The second high-severity vulnerability is tracked as CVE-2020-2030 and it allows an attacker with admin access to the PAN-OS management interface to execute arbitrary OS commands with root privileges.
Palo Alto Networks says both vulnerabilities were discovered internally and there is no evidence of malicious exploitation. However, a researcher noted that tens of thousands of devices could be vulnerable to attacks.
The company also informed customers that it has patched two medium-severity vulnerabilities in PAN-OS: one that can be exploited by an authenticated attacker with admin privileges for denial-of-service (DoS) attacks, and one related to the use of the outdated TLS 1.0 protocol for some communications between cloud-delivered services and PAN-OS.
These vulnerabilities do not appear to be as dangerous as CVE-2020-2021, which Palo Alto Networks patched in late June and which allows a network attacker to bypass authentication. Shortly after a patch was released, U.S. Cyber Command warned that foreign APTs will likely attempt to exploit it soon.
Over the past week, hackers have been exploiting a critical vulnerability affecting the BIG-IP application delivery controller (ADC) from F5 Networks. Proof-of-concept (PoC) exploits were made public shortly after disclosure and an increasing number of attacks have been spotted. Attackers have delivered various payloads, including web shells and DDoS malware.