First published: Wed Nov 10 2021(Updated: )
A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables an authenticated attacker to execute arbitrary code with root user privileges during SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. Prisma Access customers with Prisma Access 2.1 Preferred firewalls are impacted by this issue.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | >=8.1.0<8.1.20 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.14 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.9 | |
Paloaltonetworks Pan-os | =10.0.0 |
This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.9, PAN-OS 10.0.1, and all later PAN-OS versions. This issue is fixed in Prisma Access 2.2 Preferred and all later Prisma Access versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3056 is a memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN.
CVE-2021-3056 impacts PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; and PAN-OS 10.0.0.
CVE-2021-3056 has a severity score of 8.8, which is classified as high.
An authenticated attacker can exploit CVE-2021-3056 during SAML authentication to execute arbitrary code with root user privileges.
To mitigate CVE-2021-3056, upgrade PAN-OS to version 8.1.20 or later, 9.0.14 or later, 9.1.9 or later, or 10.0.0.