First published: Sat Aug 31 2013(Updated: )
The App-ID cache feature in Palo Alto Networks PAN-OS before 4.0.14, 4.1.x before 4.1.11, and 5.0.x before 5.0.2 allows remote attackers to bypass intended security policies via crafted requests that trigger invalid caching, as demonstrated by incorrect identification of HTTP traffic as SIP traffic, aka Ref ID 47195.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | <=4.0.8 | |
Palo Alto Networks PAN-OS | =4.0.0 | |
Palo Alto Networks PAN-OS | =4.0.1 | |
Palo Alto Networks PAN-OS | =4.0.2 | |
Palo Alto Networks PAN-OS | =4.0.3 | |
Palo Alto Networks PAN-OS | =4.0.4 | |
Palo Alto Networks PAN-OS | =4.0.5 | |
Palo Alto Networks PAN-OS | =4.0.6 | |
Palo Alto Networks PAN-OS | =4.0.7 | |
Palo Alto Networks PAN-OS | =4.1.0 | |
Palo Alto Networks PAN-OS | =4.1.1 | |
Palo Alto Networks PAN-OS | =4.1.2 | |
Palo Alto Networks PAN-OS | =4.1.3 | |
Palo Alto Networks PAN-OS | =4.1.4 | |
Palo Alto Networks PAN-OS | =4.1.5 | |
Palo Alto Networks PAN-OS | =4.1.6 | |
Palo Alto Networks PAN-OS | =4.1.7 | |
Palo Alto Networks PAN-OS | =4.1.8 | |
Palo Alto Networks PAN-OS | =4.1.8-h3 | |
Palo Alto Networks PAN-OS | =4.1.9 | |
Palo Alto Networks PAN-OS | =4.1.10 | |
Palo Alto Networks PAN-OS | =5.0.0 | |
Palo Alto Networks PAN-OS | =5.0.0-h1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5663 is classified as a high severity vulnerability due to its potential to bypass security policies.
To fix CVE-2013-5663, upgrade your Palo Alto Networks PAN-OS to version 4.0.14, 4.1.11, or 5.0.2 or later.
CVE-2013-5663 allows remote attackers to bypass intended security policies by exploiting invalid caching mechanisms.
CVE-2013-5663 affects Palo Alto Networks PAN-OS versions prior to 4.0.14, 4.1.x before 4.1.11, and 5.0.x before 5.0.2.
Yes, CVE-2013-5663 can be exploited remotely by attackers through crafted requests.