8.1
CVE-2019-1579
- EPSS 92.68%
- Veröffentlicht 19.07.2019 22:15:11
- Zuletzt bearbeitet 07.02.2025 15:04:40
- Quelle psirt@paloaltonetworks.com
- Teams Watchlist Login
- Unerledigt Login
Remote Code Execution in PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and PAN-OS 8.1.2 and earlier with GlobalProtect Portal or GlobalProtect Gateway Interface enabled may allow an unauthenticated remote attacker to execute arbitrary code.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Paloaltonetworks ≫ Pan-os Version < 7.1.19
Paloaltonetworks ≫ Pan-os Version >= 8.0.0 < 8.0.12
Paloaltonetworks ≫ Pan-os Version >= 8.1.0 < 8.1.3
10.01.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog
Palo Alto Networks PAN-OS Remote Code Execution Vulnerability
SchwachstelleRemote Code Execution in PAN-OS with GlobalProtect Portal or GlobalProtect Gateway Interface enabled.
BeschreibungApply updates per vendor instructions.
Erforderliche MaßnahmenTyp | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 92.68% | 0.997 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.1 | 2.2 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 8.1 | 2.2 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-134 Use of Externally-Controlled Format String
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.