First published: Wed Sep 09 2020(Updated: )
A reflected cross-site scripting (XSS) vulnerability exists in the PAN-OS management web interface. A remote attacker able to convince an administrator with an active authenticated session on the firewall management interface to click on a crafted link to that management web interface could potentially execute arbitrary JavaScript code in the administrator's browser and perform administrative actions. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=8.1.0<8.1.16 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.9 |
This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.9, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2036 is a reflected cross-site scripting (XSS) vulnerability in the PAN-OS management web interface.
CVE-2020-2036 affects Palo Alto Networks PAN-OS versions 8.1.0 to 8.1.16 and versions 9.0.0 to 9.0.9.
CVE-2020-2036 has a severity score of 8.8, which is classified as high.
An attacker can exploit CVE-2020-2036 by convincing an administrator with an active authenticated session to click on a crafted link in the PAN-OS management web interface.
Yes, it is recommended to update to a fixed version of PAN-OS provided by Palo Alto Networks.