First published: Thu Nov 12 2020(Updated: )
An information exposure vulnerability exists in Palo Alto Networks Panorama software that discloses the token for the Panorama web interface administrator's session to a managed device when the Panorama administrator performs a context switch into that device. This vulnerability allows an attacker to gain privileged access to the Panorama web interface. An attacker requires some knowledge of managed firewalls to exploit this issue. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.5.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | >=8.1.0<8.1.17 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.11 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.5 |
This issue is fixed in PAN-OS 8.1.17, PAN-OS 9.0.11, PAN-OS 9.1.5, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2022 is an information exposure vulnerability in Palo Alto Networks Panorama software.
CVE-2020-2022 discloses the token for the Panorama web interface administrator's session to a managed device when the Panorama administrator performs a context switch into that device.
Versions between 8.1.0 to 8.1.17, 9.0.0 to 9.0.11, and 9.1.0 to 9.1.5 of Palo Alto Networks Panorama software are affected by CVE-2020-2022.
CVE-2020-2022 has a severity rating of 7.5 (high).
You can find more information about CVE-2020-2022 at the following link: [https://security.paloaltonetworks.com/CVE-2020-2022](https://security.paloaltonetworks.com/CVE-2020-2022).