Palo Alto Networks PAN-OS < 4.0.14 / 4.1.x < 4.1.11 / 5.0.x < 5.0.2 Security Bypass

medium Nessus Plugin ID 72826

Synopsis

The remote host is affected by a security bypass vulnerability.

Description

The remote host is running a version of Palo Alto Networks PAN-OS prior to 4.0.14 / 4.1.11 / 5.0.2. It is, therefore, affected by a security bypass vulnerability due to a flaw in the App-ID cache function. A remote attacker can exploit this vulnerability to run blocked applications.

Solution

Upgrade to PAN-OS version 4.0.14 / 4.1.11 / 5.0.2 or later.

See Also

https://securityadvisories.paloaltonetworks.com/Home/Detail/19

Plugin Details

Severity: Medium

ID: 72826

File Name: palo_alto_PAN-SA-2013-0001.nasl

Version: 1.6

Type: combined

Published: 3/5/2014

Updated: 7/24/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/o:paloaltonetworks:pan-os

Required KB Items: Host/Palo_Alto/Firewall/Version, Host/Palo_Alto/Firewall/Full_Version

Exploit Ease: No known exploits are available

Patch Publication Date: 1/15/2013

Vulnerability Publication Date: 1/7/2013

Reference Information

CVE: CVE-2013-5663

BID: 62111