First published: Sat Nov 19 2016(Updated: )
Palo Alto Networks PAN-OS before 5.0.20, 5.1.x before 5.1.13, 6.0.x before 6.0.15, 6.1.x before 6.1.15, 7.0.x before 7.0.11, and 7.1.x before 7.1.6 allows local users to gain privileges via crafted values of unspecified environment variables.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=5.0.0<5.0.20 | |
Palo Alto Networks PAN-OS | >=5.1<5.1.13 | |
Palo Alto Networks PAN-OS | >=6.0.0<6.0.15 | |
Palo Alto Networks PAN-OS | >=6.1.0<6.1.15 | |
Palo Alto Networks PAN-OS | >=7.0.0<7.0.11 | |
Palo Alto Networks PAN-OS | >=7.1.0<7.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-9151 is considered moderate as it allows local users to gain elevated privileges through unsanitized environment variables.
To fix CVE-2016-9151, upgrade your PAN-OS to the recommended versions or later that are not affected, specifically versions 5.0.20, 5.1.13, 6.0.15, 6.1.15, 7.0.11, or 7.1.6.
Local users of Palo Alto Networks PAN-OS versions before 5.0.20, 5.1.13, 6.0.15, 6.1.15, 7.0.11, and 7.1.6 are affected by CVE-2016-9151.
CVE-2016-9151 is a privilege escalation vulnerability caused by improper handling of environment variables.
There are no known workarounds for CVE-2016-9151, and it is recommended to upgrade to a secure version.