First published: Wed May 13 2020(Updated: )
An authentication bypass vulnerability in the Panorama context switching feature allows an attacker with network access to a Panorama's management interface to gain privileged access to managed firewalls. An attacker requires some knowledge of managed firewalls to exploit this issue. This issue does not affect Panorama configured with custom certificates authentication for communication between Panorama and managed devices. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.12; PAN-OS 9.0 versions earlier than 9.0.6; All versions of PAN-OS 8.0.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=7.1.0<7.1.26 | |
Palo Alto Networks PAN-OS | >=8.0.0<=8.0.20 | |
Palo Alto Networks PAN-OS | >=8.1.0<8.1.12 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.6 |
This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.12, PAN-OS 9.0.6, and all later PAN-OS versions. Upgrading Panorama to a fixed version is sufficient to resolve the issue. PAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2018 is classified as a critical severity vulnerability.
To fix CVE-2020-2018, upgrade your PAN-OS to a version beyond 7.1.26, 8.0.20, 8.1.12, or 9.0.6.
The impact of CVE-2020-2018 allows an attacker to bypass authentication and gain unauthorized privileged access to managed firewalls.
CVE-2020-2018 affects multiple versions of Palo Alto Networks PAN-OS.
An attacker with network access and knowledge of managed firewalls can exploit CVE-2020-2018.