First published: Wed Apr 08 2020(Updated: )
A stack-based buffer overflow vulnerability in the management server component of PAN-OS allows an authenticated user to upload a corrupted PAN-OS configuration and potentially execute code with root privileges. This issue affects Palo Alto Networks PAN-OS 8.1 versions before 8.1.13; 9.0 versions before 9.0.7. This issue does not affect PAN-OS 7.1.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=8.1.0<8.1.13 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.7 |
This issue is fixed in PAN-OS 8.1.13, PAN-OS 9.0.7 and all later versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1990 is classified as a critical severity vulnerability due to its potential to allow code execution with root privileges.
To fix CVE-2020-1990, you should upgrade to Palo Alto Networks PAN-OS version 8.1.13 or higher, or 9.0.8 or higher.
CVE-2020-1990 affects authenticated users of Palo Alto Networks PAN-OS versions prior to 8.1.13 and 9.0.7.
CVE-2020-1990 is a stack-based buffer overflow vulnerability in the management server component.
An attacker exploiting CVE-2020-1990 can potentially upload a corrupted configuration and execute arbitrary code on the device.