First published: Tue Jul 03 2018(Updated: )
The PAN-OS management web interface page in PAN-OS 6.1.20 and earlier, PAN-OS 7.1.16 and earlier, PAN-OS 8.0.8 and earlier, and PAN-OS 8.1.0 may allow an attacker to access the GlobalProtect password hashes of local users via manipulation of the HTML markup.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >6.0.0<=6.1.20 | |
Palo Alto Networks PAN-OS | >=7.1.0<=7.1.16 | |
Palo Alto Networks PAN-OS | >8.0.0<=8.0.8 | |
Palo Alto Networks PAN-OS | =8.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-9334 is considered a high severity vulnerability that could allow unauthorized access to sensitive password hashes.
To fix CVE-2018-9334, upgrade to a version of PAN-OS that is newer than 6.1.20, 7.1.16, 8.0.8, or 8.1.0.
CVE-2018-9334 affects users of PAN-OS versions 6.1.20 and earlier, 7.1.16 and earlier, 8.0.8 and earlier, and 8.1.0.
An attacker exploiting CVE-2018-9334 can access the GlobalProtect password hashes of local users.
CVE-2018-9334 was disclosed in 2018, but specific availability of patches and updates may vary.