First published: Wed Aug 11 2021(Updated: )
An OS command argument injection vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to read any arbitrary file from the file system. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.19; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.10. PAN-OS 10.0 and later versions are not impacted.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | >=8.1.0<8.1.19 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.14 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.10 |
This issue is fixed in PAN-OS 8.1.19, PAN-OS 9.0.14, PAN-OS 9.1.10, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-3045.
The title of this vulnerability is 'An OS command argument injection vulnerability in the Palo Alto Networks PAN-OS web interface enable…'
The severity of CVE-2021-3045 is medium.
This vulnerability affects PAN-OS 8.1 versions earlier than PAN-OS 8.1.19, PAN-OS 9.0 versions earlier than PAN-OS 9.0.14, and PAN-OS 9.1 versions earlier than PAN-OS 9.1.10.
An authenticated administrator can exploit this vulnerability to read any arbitrary file from the file system.