First published: Tue Aug 02 2016(Updated: )
Palo Alto Networks PAN-OS before 5.0.19, 5.1.x before 5.1.12, 6.0.x before 6.0.14, 6.1.x before 6.1.12, and 7.0.x before 7.0.8 might allow local users to gain privileges by leveraging improper sanitization of the root_reboot local invocation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=5.0.0<5.0.19 | |
Palo Alto Networks PAN-OS | >=5.1<5.1.12 | |
Palo Alto Networks PAN-OS | >=6.0.0<6.0.14 | |
Palo Alto Networks PAN-OS | >=6.1.0<6.1.12 | |
Palo Alto Networks PAN-OS | >=7.0.0<7.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1712 is rated as a high severity vulnerability due to its potential to allow local users to gain elevated privileges.
To mitigate CVE-2016-1712, upgrade to PAN-OS version 5.0.19 or later, 5.1.12 or later, 6.0.14 or later, 6.1.12 or later, or 7.0.8 or later.
CVE-2016-1712 affects users of Palo Alto Networks PAN-OS versions prior to the specified secure versions.
CVE-2016-1712 impacts systems running various vulnerable versions of Palo Alto Networks PAN-OS.
CVE-2016-1712 is not a remote vulnerability; it requires local user access to exploit.