Paloaltonetworks

Pan-os

229 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.21%
  • Veröffentlicht 13.05.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:48

The GlobalProtect Portal feature in PAN-OS does not set a new session identifier after a successful user login, which allows session fixation attacks, if an attacker is able to control a user's session ID. This issue affects: All PAN-OS 7.1 and 8.0 v...

  • EPSS 0.06%
  • Veröffentlicht 13.05.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:48

A predictable temporary file vulnerability in PAN-OS allows a local authenticated user with shell access to corrupt arbitrary system files affecting the integrity of the system. This issue affects: All versions of PAN-OS 7.1 and 8.0; PAN-OS 8.1 versi...

  • EPSS 0.32%
  • Veröffentlicht 13.05.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:48

A NULL pointer dereference vulnerability in Palo Alto Networks PAN-OS allows an authenticated administrator to send a request that causes the rasmgr daemon to crash. Repeated attempts to send this request result in denial of service to all PAN-OS ser...

  • EPSS 0.7%
  • Veröffentlicht 13.05.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:48

A missing authorization vulnerability in the management server component of PAN-OS Panorama allows a remote unauthenticated user to inject messages into the management server ms.log file. This vulnerability can be leveraged to obfuscate an ongoing at...

  • EPSS 0.28%
  • Veröffentlicht 13.05.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:48

An open redirection vulnerability in the GlobalProtect component of Palo Alto Networks PAN-OS allows an attacker to specify an arbitrary redirection target away from the trusted GlobalProtect gateway. If the user then successfully authenticates it wi...

  • EPSS 0.22%
  • Veröffentlicht 13.05.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:49

An improper authorization vulnerability in PAN-OS that mistakenly uses the permissions of local linux users instead of the intended SAML permissions of the account when the username is shared for the purposes of SSO authentication. This can result in...

  • EPSS 1.53%
  • Veröffentlicht 13.05.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:24:24

An external control of path and data vulnerability in the Palo Alto Networks PAN-OS Panorama XSLT processing logic that allows an unauthenticated user with network access to PAN-OS management interface to write attacker supplied file on the system an...

  • EPSS 0.58%
  • Veröffentlicht 13.05.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:24:24

An authentication bypass by spoofing vulnerability exists in the authentication daemon and User-ID components of Palo Alto Networks PAN-OS by failing to verify the integrity of the Kerberos key distribution center (KDC) before authenticating users. T...

  • EPSS 1.38%
  • Veröffentlicht 08.04.2020 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:11:47

A stack-based buffer overflow vulnerability in the management server component of PAN-OS allows an authenticated user to upload a corrupted PAN-OS configuration and potentially execute code with root privileges. This issue affects Palo Alto Networks ...

  • EPSS 2.05%
  • Veröffentlicht 08.04.2020 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:11:48

A format string vulnerability in the Varrcvr daemon of PAN-OS on PA-7000 Series devices with a Log Forwarding Card (LFC) allows remote attackers to crash the daemon creating a denial of service condition or potentially execute code with root privileg...