The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of PaloAlto Firewall PA-***

computer vulnerability bulletin 20918

PAN-OS: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of PAN-OS, in order to run JavaScript code in the context of the web site.
Impacted products: Palo Alto Firewall PA***, PAN-OS.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 19/10/2016.
Identifiers: PAN-SA-2016-0031, VIGILANCE-VUL-20918.

Description of the vulnerability

The PAN-OS product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of PAN-OS, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce 20917

PAN-OS: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of PAN-OS, in order to run JavaScript code in the context of the web site.
Impacted products: Palo Alto Firewall PA***, PAN-OS.
Severity: 1/4.
Consequences: client access/rights.
Provenance: privileged account.
Creation date: 19/10/2016.
Identifiers: PAN-SA-2016-0029, VIGILANCE-VUL-20917.

Description of the vulnerability

The PAN-OS product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of PAN-OS, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert 20846

PAN-OS: denial of service via Web Management Server

Synthesis of the vulnerability

An attacker can generate a fatal error via Web Management Server of PAN-OS, in order to trigger a denial of service.
Impacted products: Palo Alto Firewall PA***, PAN-OS.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: intranet client.
Creation date: 12/10/2016.
Identifiers: PAN-SA-2016-0027, VIGILANCE-VUL-20846.

Description of the vulnerability

An attacker can generate a fatal error via Web Management Server of PAN-OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability note 20774

PAN-OS: information disclosure via GlobalProtect Portal

Synthesis of the vulnerability

An attacker can use GlobalProtect Portal of PAN-OS, in order to obtain sensitive information.
Impacted products: Palo Alto Firewall PA***, PAN-OS.
Severity: 2/4.
Consequences: data reading.
Provenance: intranet client.
Creation date: 05/10/2016.
Identifiers: PAN-SA-2016-0026, VIGILANCE-VUL-20774.

Description of the vulnerability

The PAN-OS product offers a GlobalProtect Portal web service.

However, this service displays the version of PAN-OS.

An attacker can therefore use GlobalProtect Portal of PAN-OS, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce 20562

PAN-OS: denial of service via Web Management Interface

Synthesis of the vulnerability

An attacker can generate a fatal error via Web Management Interface of PAN-OS, in order to trigger a denial of service.
Impacted products: Palo Alto Firewall PA***, PAN-OS.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 09/09/2016.
Identifiers: PAN-SA-2016-0024, VIGILANCE-VUL-20562.

Description of the vulnerability

An attacker can generate a fatal error in the Web Management Interface of PAN-OS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2016-1712

PAN-OS: five vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of PAN-OS.
Impacted products: Palo Alto Firewall PA***, PAN-OS.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, client access/rights, data reading, denial of service on server, denial of service on service.
Provenance: user account.
Number of vulnerabilities in this bulletin: 5.
Creation date: 15/07/2016.
Identifiers: CVE-2016-1712, PAN-SA-2016-0012, PAN-SA-2016-0013, PAN-SA-2016-0014, PAN-SA-2016-0015, PAN-SA-2016-0016, VIGILANCE-VUL-20121.

Description of the vulnerability

Several vulnerabilities were announced in PAN-OS.

An attacker can bypass security features via root_reboot, in order to escalate his privileges. [severity:2/4; CVE-2016-1712, PAN-SA-2016-0012]

An attacker can trigger a fatal error via Captive Portal, in order to trigger a denial of service. [severity:2/4; PAN-SA-2016-0013]

An attacker can trigger a Cross Site Scripting via Policy, in order to run JavaScript code in the context of the web site. [severity:2/4; PAN-SA-2016-0014]

An attacker can bypass security features via cron, in order to escalate his privileges. [severity:2/4; PAN-SA-2016-0015]

An attacker can bypass security features via Web Interface, in order to escalate his privileges. [severity:2/4; PAN-SA-2016-0016]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2016-2219

PAN-OS: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of PAN-OS, in order to run JavaScript code in the context of the web site.
Impacted products: Palo Alto Firewall PA***, PAN-OS.
Severity: 2/4.
Consequences: client access/rights.
Provenance: intranet client.
Creation date: 28/06/2016.
Identifiers: CVE-2016-2219, PAN-SA-2016-0009, VIGILANCE-VUL-19986.

Description of the vulnerability

The PAN-OS product offers a web service.

However, the data echo does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of PAN-OS, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability 19985

Palo Alto Networks firewalls: denial of service via API

Synthesis of the vulnerability

An unauthenticated attacker can make the API fail for a key authentication in Palo Alto Networks firewalls, in order to trigger a denial of service.
Impacted products: Palo Alto Firewall PA***, PAN-OS.
Severity: 1/4.
Consequences: denial of service on service.
Provenance: intranet client.
Creation date: 28/06/2016.
Identifiers: PAN-SA-2016-0008, VIGILANCE-VUL-19985.

Description of the vulnerability

The Palo Alto Networks firewalls product includes an API for product configuration.

However, an error of key authentication integration in API enable to generates a fatal error via API.

An unauthenticated attacker can therefore make the API fail for a key authentication in Palo Alto Networks firewalls, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2016-4971

wget: file corruption via a redirecton to an FTP URL

Synthesis of the vulnerability

An attacker can corrupt an arbitrary file by redirecting an HTTP request to an FTP location.
Impacted products: Debian, Fedora, openSUSE, openSUSE Leap, Solaris, Palo Alto Firewall PA***, PAN-OS, RHEL, Ubuntu.
Severity: 2/4.
Consequences: data reading, data creation/edition.
Provenance: internet server.
Creation date: 20/06/2016.
Identifiers: bulletinjul2016, CVE-2016-4971, DLA-536-1, FEDORA-2016-24135dfe43, FEDORA-2016-2db8cbc2fd, openSUSE-SU-2016:2027-1, openSUSE-SU-2016:2277-1, PAN-SA-2017-0003, PAN-SA-2017-0012, PAN-SA-2017-0013, PAN-SA-2017-0014, PAN-SA-2017-0016, RHSA-2016:2587-02, USN-3012-1, VIGILANCE-VUL-19927.

Description of the vulnerability

An attacker can corrupt an arbitrary file by redirecting an HTTP request to an FTP location.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2016-2105 CVE-2016-2106 CVE-2016-2107

OpenSSL: six vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of OpenSSL.
Impacted products: SDS, SES, SNS, Tomcat, Mac OS X, StormShield, Blue Coat CAS, ProxyAV, ProxySG par Blue Coat, Cisco ASR, Cisco Aironet, Cisco ATA, Cisco AnyConnect Secure Mobility Client, Cisco ACE, ASA, Cisco Catalyst, Cisco Content SMA, Cisco ESA, IOS by Cisco, IOS XE Cisco, IOS XR Cisco, Cisco IPS, IronPort Email, IronPort Encryption, Nexus by Cisco, NX-OS, Cisco Prime Access Registrar, Prime Collaboration Assurance, Cisco Prime DCNM, Prime Infrastructure, Cisco Prime LMS, Cisco PRSM, Cisco Router, Secure ACS, Cisco CUCM, Cisco IP Phone, Cisco MeetingPlace, Cisco Wireless IP Phone, Cisco WSA, Cisco Wireless Controller, XenServer, Debian, PowerPath, Black Diamond, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FileZilla Server, FortiAnalyzer, FortiAnalyzer Virtual Appliance, FortiOS, FreeBSD, Android OS, HP Operations, HP Switch, AIX, IRAD, QRadar SIEM, IBM System x Server, Tivoli Storage Manager, Tivoli Workload Scheduler, WebSphere MQ, Juniper J-Series, Junos OS, Junos Space, NSM Central Manager, NSMXpress, MariaDB ~ precise, McAfee NSM, Meinberg NTP Server, MySQL Community, MySQL Enterprise, Data ONTAP, NETASQ, NetScreen Firewall, ScreenOS, Nodejs Core, OpenBSD, OpenSSL, openSUSE, openSUSE Leap, Oracle Communications, Oracle Directory Server, Oracle Directory Services Plus, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Oracle iPlanet Web Proxy Server, Oracle iPlanet Web Server, Solaris, Tuxedo, VirtualBox, WebLogic, Oracle Web Tier, Palo Alto Firewall PA***, PAN-OS, Percona Server, pfSense, Pulse Connect Secure, Puppet, Python, RHEL, JBoss EAP by Red Hat, SAS Management Console, Shibboleth SP, Slackware, Splunk Enterprise, stunnel, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Nessus, Ubuntu, VxWorks, X2GoClient.
Severity: 3/4.
Consequences: user access/rights, data reading, data creation/edition, denial of service on service, denial of service on client.
Provenance: internet client.
Number of vulnerabilities in this bulletin: 6.
Creation date: 03/05/2016.
Identifiers: 1982949, 1985850, 1987779, 1993215, 1995099, 1998797, 2003480, 2003620, 2003673, 510853, 9010083, bulletinapr2016, bulletinapr2017, CERTFR-2016-AVI-151, CERTFR-2016-AVI-153, CERTFR-2018-AVI-160, cisco-sa-20160504-openssl, cpuapr2017, cpujan2018, cpujul2016, cpujul2017, cpujul2018, cpuoct2016, cpuoct2017, cpuoct2018, CTX212736, CTX233832, CVE-2016-2105, CVE-2016-2106, CVE-2016-2107, CVE-2016-2108, CVE-2016-2109, CVE-2016-2176, DLA-456-1, DSA-3566-1, ESA-2017-142, FEDORA-2016-05c567df1a, FEDORA-2016-1e39d934ed, FEDORA-2016-e1234b65a2, FG-IR-16-026, FreeBSD-SA-16:17.openssl, HPESBGN03728, HPESBHF03756, HT206903, JSA10759, K23230229, K36488941, K51920288, K75152412, K93600123, MBGSA-1603, MIGR-5099595, MIGR-5099597, NTAP-20160504-0001, openSUSE-SU-2016:1237-1, openSUSE-SU-2016:1238-1, openSUSE-SU-2016:1239-1, openSUSE-SU-2016:1240-1, openSUSE-SU-2016:1241-1, openSUSE-SU-2016:1242-1, openSUSE-SU-2016:1243-1, openSUSE-SU-2016:1273-1, openSUSE-SU-2016:1566-1, openSUSE-SU-2017:0487-1, PAN-SA-2016-0020, PAN-SA-2016-0028, RHSA-2016:0722-01, RHSA-2016:0996-01, RHSA-2016:1137-01, RHSA-2016:1648-01, RHSA-2016:1649-01, RHSA-2016:1650-01, RHSA-2016:2054-01, RHSA-2016:2055-01, RHSA-2016:2056-01, RHSA-2016:2073-01, SA123, SA40202, SB10160, SOL23230229, SOL36488941, SOL51920288, SOL75152412, SP-CAAAPPQ, SPL-119440, SPL-121159, SPL-123095, SSA:2016-124-01, STORM-2016-002, SUSE-SU-2016:1206-1, SUSE-SU-2016:1228-1, SUSE-SU-2016:1231-1, SUSE-SU-2016:1233-1, SUSE-SU-2016:1267-1, SUSE-SU-2016:1290-1, SUSE-SU-2016:1360-1, SUSE-SU-2018:0112-1, TNS-2016-10, USN-2959-1, VIGILANCE-VUL-19512, VN-2016-006, VN-2016-007.

Description of the vulnerability

Several vulnerabilities were announced in OpenSSL.

An attacker can act as a Man-in-the-Middle and use the AES CBC algorithm with a server supporting AES-NI, in order to read or write data in the session. This vulnerability was initially fixed in versions 1.0.1o and 1.0.2c, but it was not disclosed at that time. [severity:3/4; CVE-2016-2108]

An attacker can act as a Man-in-the-Middle and use the AES CBC algorithm with a server supporting AES-NI, in order to read or write data in the session. [severity:3/4; CVE-2016-2107]

An attacker can generate a buffer overflow in EVP_EncodeUpdate(), which is mainly used by command line applications, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2016-2105]

An attacker can generate a buffer overflow in EVP_EncryptUpdate(), which is difficult to reach, in order to trigger a denial of service, and possibly to run code. [severity:2/4; CVE-2016-2106]

An attacker can trigger an excessive memory usage in d2i_CMS_bio(), in order to trigger a denial of service. [severity:2/4; CVE-2016-2109]

An attacker can force a read at an invalid address in applications using X509_NAME_oneline(), in order to trigger a denial of service, or to obtain sensitive information. [severity:2/4; CVE-2016-2176]
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about PaloAlto Firewall PA-***: