First published: Sat Aug 31 2013(Updated: )
The App-ID cache feature in Palo Alto Networks PAN-OS before 4.0.14, 4.1.x before 4.1.11, and 5.0.x before 5.0.2 allows remote attackers to bypass intended security policies via crafted requests that trigger invalid caching, as demonstrated by incorrect identification of HTTP traffic as SIP traffic, aka Ref ID 47195.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | <=4.0.8 | |
Paloaltonetworks Pan-os | =4.0.0 | |
Paloaltonetworks Pan-os | =4.0.1 | |
Paloaltonetworks Pan-os | =4.0.2 | |
Paloaltonetworks Pan-os | =4.0.3 | |
Paloaltonetworks Pan-os | =4.0.4 | |
Paloaltonetworks Pan-os | =4.0.5 | |
Paloaltonetworks Pan-os | =4.0.6 | |
Paloaltonetworks Pan-os | =4.0.7 | |
Paloaltonetworks Pan-os | =4.1.0 | |
Paloaltonetworks Pan-os | =4.1.1 | |
Paloaltonetworks Pan-os | =4.1.2 | |
Paloaltonetworks Pan-os | =4.1.3 | |
Paloaltonetworks Pan-os | =4.1.4 | |
Paloaltonetworks Pan-os | =4.1.5 | |
Paloaltonetworks Pan-os | =4.1.6 | |
Paloaltonetworks Pan-os | =4.1.7 | |
Paloaltonetworks Pan-os | =4.1.8 | |
Paloaltonetworks Pan-os | =4.1.8-h3 | |
Paloaltonetworks Pan-os | =4.1.9 | |
Paloaltonetworks Pan-os | =4.1.10 | |
Paloaltonetworks Pan-os | =5.0.0 | |
Paloaltonetworks Pan-os | =5.0.0-h1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.