First published: Tue Apr 12 2016(Updated: )
The GlobalProtect Portal in Palo Alto Networks PAN-OS before 5.0.18, 6.0.x before 6.0.13, 6.1.x before 6.1.10, and 7.0.x before 7.0.5H2 allows remote attackers to cause a denial of service (service crash) via a crafted request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=5.0.0<5.0.18 | |
Palo Alto Networks PAN-OS | >=5.1<5.1.11 | |
Palo Alto Networks PAN-OS | >=6.0.0<6.0.13 | |
Palo Alto Networks PAN-OS | >=6.1.0<6.1.10 | |
Palo Alto Networks PAN-OS | >=7.0.0<=7.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3656 has a CVSS score indicating it can lead to a denial of service through crafted requests.
To remediate CVE-2016-3656, upgrade your PAN-OS to one of the patched versions: 5.0.18, 6.0.13, 6.1.10, or 7.0.5H2.
CVE-2016-3656 affects PAN-OS versions below 5.0.18, 6.0.x below 6.0.13, 6.1.x below 6.1.10, and 7.0.x below 7.0.5H2.
CVE-2016-3656 allows remote attackers to crash the GlobalProtect Portal service, resulting in potential denial of service.
There is no known workaround for CVE-2016-3656; updating to a secure version is the recommended action.