First published: Wed Mar 11 2020(Updated: )
A format string vulnerability in the PAN-OS log daemon (logd) on Panorama allows a network based attacker with knowledge of registered firewall devices and access to Panorama management interfaces to execute arbitrary code, bypassing the restricted shell and escalating privileges. This issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13 on Panorama. This issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | <8.1.13 |
This issue is fixed in PAN-OS 8.1.13 and all later PAN-OS 8.1 versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1979 has been rated as critical due to its potential for arbitrary code execution and privilege escalation.
To fix CVE-2020-1979, upgrade PAN-OS to version 8.1.13 or later as recommended by Palo Alto Networks.
Organizations using PAN-OS versions prior to 8.1.13 are vulnerable to CVE-2020-1979.
CVE-2020-1979 is a format string vulnerability allowing code execution and privilege escalation.
Yes, CVE-2020-1979 can be exploited by a network-based attacker with access to Panorama management interfaces.