First published: Wed Nov 10 2021(Updated: )
A memory corruption vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to disrupt system processes and potentially execute arbitrary code with root privileges. The attacker must have network access to the GlobalProtect interface to exploit this issue. This issue impacts PAN-OS 8.1 versions earlier than PAN-OS 8.1.17. Prisma Access customers are not impacted by this issue.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=8.1.0<8.1.17 |
This issue is fixed in PAN-OS 8.1.17 and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3064 is a memory corruption vulnerability in Palo Alto Networks GlobalProtect portal and gateway interfaces that allows an unauthenticated attacker to disrupt system processes and potentially execute arbitrary code with root privileges.
The severity of CVE-2021-3064 is critical, with a CVSS score of 9.8.
Palo Alto Networks PAN-OS versions 8.1.0 to 8.1.17 are affected by CVE-2021-3064.
An unauthenticated network-based attacker with access to the Palo Alto Networks GlobalProtect portal and gateway interfaces can exploit CVE-2021-3064 to disrupt system processes and potentially execute arbitrary code with root privileges.
Yes, Palo Alto Networks has released a security advisory and patches to address the vulnerability. It is recommended to update to a fixed version of PAN-OS.