First published: Wed Apr 08 2020(Updated: )
A format string vulnerability in the Varrcvr daemon of PAN-OS on PA-7000 Series devices with a Log Forwarding Card (LFC) allows remote attackers to crash the daemon creating a denial of service condition or potentially execute code with root privileges. This issue affects Palo Alto Networks PAN-OS 9.0 versions before 9.0.7; PAN-OS 9.1 versions before 9.1.2 on PA-7000 Series devices with an LFC installed and configured. This issue requires WildFire services to be configured and enabled. This issue does not affect PAN-OS 8.1 and earlier releases. This issue does not affect any other PA Series firewalls.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=9.0.0<9.0.7 | |
Palo Alto Networks PAN-OS | >=9.1.0<9.1.2 | |
Paloaltonetworks Pa-7050 | ||
Paloaltonetworks Pa-7080 |
This issue is fixed in PAN-OS 9.0.7, PAN-OS 9.1.2 and all later versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1992 has been classified as a high severity vulnerability due to its potential to crash the Varrcvr daemon and create a denial of service condition.
To fix CVE-2020-1992, upgrade the PAN-OS software on affected devices to a version later than 9.0.7 or 9.1.2.
CVE-2020-1992 affects devices in the PA-7000 Series with a Log Forwarding Card running specific versions of PAN-OS.
Yes, CVE-2020-1992 can potentially allow remote attackers to execute code with root privileges on vulnerable systems.
The primary impact of CVE-2020-1992 is a denial of service condition that may disrupt the normal operation of the Varrcvr daemon.