First published: Sat Aug 31 2013(Updated: )
The device-management command-line interface in Palo Alto Networks PAN-OS before 3.1.11, 4.0.x before 4.0.8, and 4.1.x before 4.1.1 allows remote authenticated administrators to execute arbitrary commands via unspecified vectors, aka Ref ID 34299.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | <=3.1.10 | |
Palo Alto Networks PAN-OS | =3.1.9 | |
Palo Alto Networks PAN-OS | =4.0.0 | |
Palo Alto Networks PAN-OS | =4.0.1 | |
Palo Alto Networks PAN-OS | =4.0.2 | |
Palo Alto Networks PAN-OS | =4.0.3 | |
Palo Alto Networks PAN-OS | =4.0.4 | |
Palo Alto Networks PAN-OS | =4.0.5 | |
Palo Alto Networks PAN-OS | =4.0.6 | |
Palo Alto Networks PAN-OS | =4.0.7 | |
Palo Alto Networks PAN-OS | =4.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6594 has a high severity rating due to its ability to allow remote authenticated administrators to execute arbitrary commands.
To fix CVE-2012-6594, upgrade Palo Alto Networks PAN-OS to version 3.1.11, 4.0.8, or 4.1.1 or later.
PAN-OS versions prior to 3.1.11, 4.0.x before 4.0.8, and 4.1.x before 4.1.1 are affected by CVE-2012-6594.
Administrators of Palo Alto Networks PAN-OS versions prior to the patched versions are vulnerable to CVE-2012-6594.
CVE-2012-6594 is classified as an arbitrary command execution vulnerability.