Palo Alto Networks PAN-OS 6.1.x < 6.1.19 Multiple Vulnerabilities

critical Nessus Plugin ID 105295

Synopsis

The remote PAN-OS host is affected by multiple vulnerabilities.

Description

The version of Palo Alto Networks PAN-OS running on the remote host is 6.1.x prior to 6.1.19. It is, therefore, affected by multiple vulnerabilities.

Solution

Upgrade to Palo Alto Networks PAN-OS version 6.1.19 or later.

See Also

http://www.nessus.org/u?06c321db

http://www.nessus.org/u?2462d7e7

http://www.nessus.org/u?d9a7eb24

http://www.nessus.org/u?bbe4facb

http://www.nessus.org/u?fa24076a

Plugin Details

Severity: Critical

ID: 105295

File Name: palo_alto_pan-os_6_1_19.nasl

Version: 1.8

Type: combined

Published: 12/15/2017

Updated: 8/19/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2017-15940

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

CVSS Score Source: CVE-2017-15944

Vulnerability Information

CPE: cpe:/o:paloaltonetworks:pan-os

Required KB Items: Host/Palo_Alto/Firewall/Version, Host/Palo_Alto/Firewall/Full_Version, Host/Palo_Alto/Firewall/Source

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/5/2017

Vulnerability Publication Date: 12/5/2017

CISA Known Exploited Vulnerability Due Dates: 9/8/2022

Exploitable With

Metasploit (Palo Alto Networks readSessionVarsFromFile() Session Corruption)

Reference Information

CVE: CVE-2017-15940, CVE-2017-15942, CVE-2017-15943, CVE-2017-15944

BID: 102074, 102075, 102076, 102079