First published: Wed Jul 08 2020(Updated: )
Certain communication between PAN-OS and cloud-delivered services inadvertently use TLS 1.0, which is known to be a cryptographically weak protocol. These cloud services include Cortex Data Lake, the Customer Support Portal, and the Prisma Access infrastructure. Conditions required for exploitation of known TLS 1.0 weaknesses do not exist for the communication between PAN-OS and cloud-delivered services. We do not believe that any communication is impacted as a result of known attacks against TLS 1.0. This issue impacts: All versions of PAN-OS 8.0; PAN-OS 8.1 versions earlier than PAN-OS 8.1.14; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; PAN-OS 9.1 versions earlier than PAN-OS 9.1.3. PAN-OS 7.1 is not impacted by this issue.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | >=8.0.0<=8.0.20 | |
Paloaltonetworks Pan-os | >=8.1.0<8.1.14 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.9 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.3 |
This issue is fixed in PAN-OS 8.1.15, PAN-OS 9.0.9, PAN-OS 9.1.3, and all later PAN-OS versions. A fixed version of PAN-OS is required to ensure secure usage of cloud-delivered services without interruption. PAN-OS 7.1 and PAN-OS 8.0 are end-of-life (as of June 30, 2020 and October 31, 2019 respectively) and are no longer covered by our Product Security Assurance policies.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability identifier is CVE-2020-1982.
The severity of CVE-2020-1982 is medium with a CVSS score of 4.8.
PAN-OS versions 8.0.0 to 8.0.20, 8.1.0 to 8.1.14, 9.0.0 to 9.0.9, and 9.1.0 to 9.1.3 are affected by CVE-2020-1982.
TLS 1.0 is a cryptographically weak protocol, which increases the risk of unauthorized access to sensitive data.
You can find more information about CVE-2020-1982 on the Palo Alto Networks security advisory page at https://security.paloaltonetworks.com/CVE-2020-1982.