First published: Fri Aug 23 2019(Updated: )
A remote code execution vulnerability in the PAN-OS SSH device management interface that can lead to unauthenticated remote users with network access to the SSH management interface gaining root access to PAN-OS. This issue affects PAN-OS 7.1 versions prior to 7.1.24-h1, 7.1.25; 8.0 versions prior to 8.0.19-h1, 8.0.20; 8.1 versions prior to 8.1.9-h4, 8.1.10; 9.0 versions prior to 9.0.3-h3, 9.0.4.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | <=7.1.24 | |
Palo Alto Networks PAN-OS | >=8.0.0<=8.0.19 | |
Palo Alto Networks PAN-OS | >=8.1.0<=8.1.9 | |
Palo Alto Networks PAN-OS | >=9.0.0<=9.0.3 |
This issue has been resolved in PAN-OS 7.1.24-h1 and later, PAN-OS 8.0.19-h1 and later, PAN-OS 8.1.9-h4 and later, and PAN-OS 9.0.3-h3 and later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1581 has a high severity rating due to its potential for remote code execution.
To fix CVE-2019-1581, upgrade to PAN-OS versions 7.1.24-h1, 7.1.25, 8.0.20, 8.1.10, or 9.0.4 or later.
CVE-2019-1581 affects PAN-OS versions prior to 7.1.24-h1, 7.1.25, 8.0.19, 8.1.9, and 9.0.3.
Yes, an unauthenticated remote user can exploit CVE-2019-1581 if they have access to the SSH management interface.
CVE-2019-1581 is classified as a remote code execution vulnerability.