First published: Wed Sep 08 2021(Updated: )
A reflected cross-site scripting (XSS) vulnerability in the Palo Alto Network PAN-OS web interface enables an authenticated network-based attacker to mislead another authenticated PAN-OS administrator to click on a specially crafted link that performs arbitrary actions in the PAN-OS web interface as the targeted authenticated administrator. This issue impacts: PAN-OS 8.1 versions earlier than 8.1.20; PAN-OS 9.0 versions earlier than 9.0.14; PAN-OS 9.1 versions earlier than 9.1.10; PAN-OS 10.0 versions earlier than 10.0.2. This issue does not affect Prisma Access.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | >=8.1.0<8.1.20 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.14 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.10 | |
Paloaltonetworks Pan-os | >=10.0.0<10.0.2 |
This issue is fixed in PAN-OS 9.0.14, PAN-OS 8.1.20, PAN-OS 9.1.10, PAN-OS 10.0.2, PAN-OS 10.1.0, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3052 is a reflected cross-site scripting (XSS) vulnerability in the Palo Alto Network PAN-OS web interface.
CVE-2021-3052 allows an authenticated network-based attacker to mislead another authenticated PAN-OS administrator to click on a specially crafted link that performs arbitrary actions in the PAN-OS web interface.
Palo Alto Network PAN-OS versions 8.1.0 to 8.1.20, 9.0.0 to 9.0.14, 9.1.0 to 9.1.10, and 10.0.0 to 10.0.2 are affected by CVE-2021-3052.
CVE-2021-3052 has a severity value of 5.4, which is considered high.
To fix CVE-2021-3052, it is recommended to upgrade to a non-vulnerable version of Palo Alto Network PAN-OS.