First published: Thu Aug 16 2018(Updated: )
The PAN-OS response for GlobalProtect Gateway in Palo Alto Networks PAN-OS 6.1.21 and earlier, PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11 and earlier may allow an unauthenticated attacker to inject arbitrary JavaScript or HTML. PAN-OS 8.1 is NOT affected.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | <=6.1.21 | |
Palo Alto Networks PAN-OS | >=7.1.0<=7.1.18 | |
Palo Alto Networks PAN-OS | >=8.0.0<=8.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10139 has a high severity rating due to its potential for allowing unauthenticated attackers to inject arbitrary JavaScript or HTML.
To fix CVE-2018-10139, upgrade to PAN-OS version 8.1 or later, as earlier versions are vulnerable.
CVE-2018-10139 affects PAN-OS 6.1.21 and earlier, 7.1.18 and earlier, and 8.0.11 and earlier.
Yes, CVE-2018-10139 can be exploited remotely by unauthenticated attackers.
No, PAN-OS version 8.1 is not affected by CVE-2018-10139.