First published: Sat Nov 19 2016(Updated: )
Buffer overflow in the management web interface in Palo Alto Networks PAN-OS before 5.0.20, 5.1.x before 5.1.13, 6.0.x before 6.0.15, 6.1.x before 6.1.15, 7.0.x before 7.0.11, and 7.1.x before 7.1.6 allows remote attackers to execute arbitrary code via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=5.0.0<5.0.20 | |
Palo Alto Networks PAN-OS | >=5.1<5.1.13 | |
Palo Alto Networks PAN-OS | >=6.0.0<6.0.15 | |
Palo Alto Networks PAN-OS | >=6.1.0<6.1.15 | |
Palo Alto Networks PAN-OS | >=7.0.0<7.0.11 | |
Palo Alto Networks PAN-OS | >=7.1.0<7.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9150 is classified as a high-severity vulnerability due to its potential for remote code execution.
To fix CVE-2016-9150, upgrade your Palo Alto Networks PAN-OS to versions 5.0.20 or later, 5.1.13 or later, 6.0.15 or later, 6.1.15 or later, 7.0.11 or later, or 7.1.6 or later.
CVE-2016-9150 affects PAN-OS versions before 5.0.20, 5.1.x before 5.1.13, 6.0.x before 6.0.15, 6.1.x before 6.1.15, 7.0.x before 7.0.11, and 7.1.x before 7.1.6.
CVE-2016-9150 can be exploited by remote attackers to execute arbitrary code through unspecified vectors.
There is no known workaround for CVE-2016-9150; the recommended action is to upgrade to a patched version of PAN-OS.