First published: Wed Sep 08 2021(Updated: )
An improper restriction of XML external entity (XXE) reference vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to read any arbitrary file from the file system and send a specifically crafted request to the firewall that causes the service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.10; PAN-OS 10.0 versions earlier than PAN-OS 10.0.6. This issue does not affect Prisma Access.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | >=8.1.0<8.1.20 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.14 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.10 | |
Paloaltonetworks Pan-os | >=10.0.0<10.0.6 |
This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.10, PAN-OS 10.0.6, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3055 is an improper restriction of XML external entity (XXE) reference vulnerability in the Palo Alto Networks PAN-OS web interface.
CVE-2021-3055 allows an authenticated administrator to read any arbitrary file from the file system and crash the service by sending a specifically crafted request to the firewall.
Palo Alto Networks PAN-OS versions 8.1.0 to 8.1.20, 9.0.0 to 9.0.14, 9.1.0 to 9.1.10, and 10.0.0 to 10.0.6 are affected by CVE-2021-3055.
CVE-2021-3055 has a severity rating of 6.5, which is considered high.
To fix the CVE-2021-3055 vulnerability, Palo Alto Networks users should upgrade to a version that is not affected by the vulnerability. Please refer to the official Palo Alto Networks security advisory for specific version details.