First published: Wed Sep 08 2021(Updated: )
A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permission to upload plugins to execute arbitrary code with root user privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11; PAN-OS 10.0 versions earlier than PAN-OS 10.0.7; PAN-OS 10.1 versions earlier than PAN-OS 10.1.2. This issue does not affect Prisma Access.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=8.1.0<8.1.20 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.14 | |
Palo Alto Networks PAN-OS | >=9.1.0<9.1.11 | |
Palo Alto Networks PAN-OS | >=10.0.0<10.0.7 | |
Palo Alto Networks PAN-OS | >=10.1.0<10.1.2 |
This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.11, PAN-OS 10.0.7, PAN-OS 10.1.2, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3054 is a time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface.
CVE-2021-3054 enables an authenticated administrator with permission to upload plugins to execute arbitrary code with root user privileges.
PAN-OS 8.1 versions earlier than 8.1.20, PAN-OS 9.0 versions earlier than 9.0.14, PAN-OS 9.1 versions earlier than 9.1.11, PAN-OS 10.0 versions earlier than 10.0.7, and PAN-OS 10.1 versions earlier than 10.1.2 are affected by CVE-2021-3054.
CVE-2021-3054 has a severity of 6.6 (high).
Updating PAN-OS to version 8.1.20, 9.0.14, 9.1.11, 10.0.7, or 10.1.2 will mitigate the CVE-2021-3054 vulnerability.