First published: Thu Nov 12 2020(Updated: )
A vulnerability exists in the Palo Alto Network PAN-OS signature-based threat detection engine that allows an attacker to communicate with devices in the network in a way that is not analyzed for threats by sending data through specifically crafted TCP packets. This technique evades signature-based threat detection. This issue impacts: PAN-OS 8.1 versions earlier than 8.1.17; PAN-OS 9.0 versions earlier than 9.0.11; PAN-OS 9.1 versions earlier than 9.1.5; All versions of PAN-OS 7.1 and PAN-OS 8.0.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | >=7.1.0<=7.1.26 | |
Paloaltonetworks Pan-os | >=8.0.0<=8.0.20 | |
Paloaltonetworks Pan-os | >=8.1.0<8.1.17 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.11 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.5 |
This issue is fixed in PAN-OS 8.1.17, PAN-OS 9.0.11, PAN-OS 9.1.5, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1999 is a vulnerability that exists in the Palo Alto Network PAN-OS signature-based threat detection engine.
CVE-2020-1999 allows an attacker to communicate with devices in the network by sending data through specifically crafted TCP packets.
Palo Alto Network PAN-OS versions 7.1.0 to 7.1.26, 8.0.0 to 8.0.20, 8.1.0 to 8.1.17, 9.0.0 to 9.0.11, and 9.1.0 to 9.1.5 are affected by CVE-2020-1999.
CVE-2020-1999 has a severity rating of 5.3, which is considered medium.
Palo Alto Networks has released a security advisory and software updates to address CVE-2020-1999. It is recommended to update to the latest version of PAN-OS.