First published: Wed Sep 09 2020(Updated: )
An insecure configuration of the appweb daemon of Palo Alto Networks PAN-OS 8.1 allows a remote unauthenticated user to send a specifically crafted request to the device that causes the appweb service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode. This issue impacts all versions of PAN-OS 8.0, and PAN-OS 8.1 versions earlier than 8.1.16.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | >=8.0.0<=8.0.20 | |
Paloaltonetworks Pan-os | >=8.1.0<8.1.16 |
This issue is fixed in PAN-OS 8.1.16 and all later PAN-OS versions. PAN-OS 7.1 and PAN-OS 8.0 are end-of-life and are no longer covered by our Product Security Assurance policies.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2041 is an insecure configuration vulnerability in the appweb daemon of Palo Alto Networks PAN-OS 8.1, which allows a remote unauthenticated user to crash the appweb service and cause denial of service to all PAN-OS services.
CVE-2020-2041 has a severity rating of 7.5 (high).
CVE-2020-2041 affects Palo Alto Networks PAN-OS versions 8.0.0 to 8.0.20 (inclusive) and versions 8.1.0 to 8.1.16 (exclusive).
To fix CVE-2020-2041, Palo Alto Networks recommends upgrading PAN-OS to a version that is not affected by this vulnerability.
You can find more information about CVE-2020-2041 on the Palo Alto Networks security advisory page at https://security.paloaltonetworks.com/CVE-2020-2041.