First published: Fri Aug 23 2019(Updated: )
Memory corruption in PAN-OS 7.1.24 and earlier, PAN-OS 8.0.19 and earlier, PAN-OS 8.1.9 and earlier, and PAN-OS 9.0.3 and earlier will allow a remote, unauthenticated user to craft a message to Secure Shell Daemon (SSHD) and corrupt arbitrary memory.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | <=7.1.24 | |
Palo Alto Networks PAN-OS | >=8.0.0<=8.0.19 | |
Palo Alto Networks PAN-OS | >=8.1.0<=8.1.9 | |
Palo Alto Networks PAN-OS | >=9.0.0<=9.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1580 is classified as a critical severity vulnerability that allows remote memory corruption.
To fix CVE-2019-1580, upgrade to PAN-OS version 7.1.25 or later, 8.0.20 or later, 8.1.10 or later, or 9.0.4 or later.
CVE-2019-1580 affects PAN-OS versions 7.1.24 and earlier, 8.0.19 and earlier, 8.1.9 and earlier, and 9.0.3 and earlier.
Yes, CVE-2019-1580 allows an unauthenticated remote user to exploit the vulnerability.
CVE-2019-1580 is a memory corruption vulnerability affecting the Secure Shell Daemon (SSHD) in PAN-OS.