First published: Wed Sep 09 2020(Updated: )
A buffer overflow vulnerability in PAN-OS allows an unauthenticated attacker to disrupt system processes and potentially execute arbitrary code with root privileges by sending a malicious request to the Captive Portal or Multi-Factor Authentication interface. This issue impacts: All versions of PAN-OS 8.0; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; PAN-OS 9.1 versions earlier than PAN-OS 9.1.3.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | >=8.0.0<=8.0.20 | |
Paloaltonetworks Pan-os | >=8.1.0<8.1.15 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.9 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.3 |
This issue is fixed in PAN-OS 8.1.15, PAN-OS 9.0.9, PAN-OS 9.1.3, and all later PAN-OS versions. All Prisma Access services are now upgraded to resolve this issue and are no longer vulnerable. PAN-OS 7.1 and 8.0 are end-of-life and are no longer covered by our Product Security Assurance policies.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2040 is a buffer overflow vulnerability in PAN-OS that allows an unauthenticated attacker to disrupt system processes and potentially execute arbitrary code with root privileges.
This vulnerability impacts all versions of Paloaltonetworks Pan-os from 8.0.0 to 8.0.20, from 8.1.0 to 8.1.15, from 9.0.0 to 9.0.9, and from 9.1.0 to 9.1.3.
An attacker can exploit CVE-2020-2040 by sending a malicious request to the Captive Portal or Multi-Factor Authentication interface.
The severity of CVE-2020-2040 is rated as critical with a severity score of 9.8.
More information about CVE-2020-2040 can be found at the following reference: [Security Palo Alto Networks](https://security.paloaltonetworks.com/CVE-2020-2040).