First published: Tue Apr 12 2016(Updated: )
The management web interface in Palo Alto Networks PAN-OS before 5.0.18, 6.0.x before 6.0.13, 6.1.x before 6.1.10, and 7.0.x before 7.0.5 allows remote attackers to execute arbitrary OS commands via an unspecified API call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=5.0.0<5.0.18 | |
Palo Alto Networks PAN-OS | >=5.1<5.1.11 | |
Palo Alto Networks PAN-OS | >=6.0.0<6.0.13 | |
Palo Alto Networks PAN-OS | >=6.1.0<6.1.10 | |
Palo Alto Networks PAN-OS | >=7.0.0<=7.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3655 has a high severity rating due to its ability to allow remote attackers to execute arbitrary OS commands.
To fix CVE-2016-3655, upgrade your Palo Alto Networks PAN-OS to versions 5.0.18, 6.0.13, 6.1.10, or 7.0.5 or later.
CVE-2016-3655 affects PAN-OS versions before 5.0.18, 6.0.x before 6.0.13, 6.1.x before 6.1.10, and 7.0.x before 7.0.5.
Yes, CVE-2016-3655 can be exploited remotely by attackers to execute arbitrary OS commands.
The potential impacts of CVE-2016-3655 include unauthorized access and control over the system, leading to data breaches or service disruption.