The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of PaloAlto PAN-OS

PAN-OS on PA-7000: privilege escalation via LFC / SMC
An attacker can bypass restrictions via LFC / SMC of PAN-OS on PA-7000, in order to escalate his privileges...
CERTFR-2019-AVI-648, CVE-2019-17440, PAN-SA-2019-0040, VIGILANCE-VUL-31213
Palo Alto PAN-OS: privilege escalation via Low Privileged Custom-role User
An attacker can bypass restrictions via Low Privileged Custom-role User of Palo Alto PAN-OS, in order to escalate his privileges...
CERTFR-2019-AVI-607, CVE-2019-17437, PAN-115697, PAN-SA-2019-0038, VIGILANCE-VUL-31072
PAN-OS: memory corruption via Interactive Session Rekeying
An attacker can trigger a memory corruption via Interactive Session Rekeying of PAN-OS, in order to trigger a denial of service, and possibly to run code...
CERTFR-2019-AVI-408, CVE-2019-1582, PAN-123700, PAN-SA-2019-0023, VIGILANCE-VUL-30133
PAN-OS: code execution via Mitigation Bypass
An attacker can use a vulnerability via Mitigation Bypass of PAN-OS, in order to run code...
CERTFR-2019-AVI-408, CVE-2019-1581, PAN-123564, PAN-SA-2019-0022, VIGILANCE-VUL-30132
PAN-OS: memory corruption via SSHD
An attacker can trigger a memory corruption via SSHD of PAN-OS, in order to trigger a denial of service, and possibly to run code...
CERTFR-2019-AVI-408, CVE-2019-1580, PAN-SA-2019-0021, VIGILANCE-VUL-30131
Palo Alto PAN-OS: code execution via GlobalProtect
An attacker can use a vulnerability via GlobalProtect of Palo Alto PAN-OS, in order to run code...
CERTFR-2019-AVI-350, CVE-2019-1579, PAN-SA-2019-0020, VIGILANCE-VUL-29835
Palo Alto PAN-OS: privilege escalation via Management API username/password
An attacker can bypass restrictions via Management API username/password of Palo Alto PAN-OS, in order to escalate his privileges...
CERTFR-2019-AVI-335, CVE-2019-1575, PAN-SA-2019-0019, VIGILANCE-VUL-29784
Palo Alto PAN-OS: privilege escalation via CLI Command Injection
An attacker can bypass restrictions via CLI Command Injection of Palo Alto PAN-OS, in order to escalate his privileges...
CERTFR-2019-AVI-335, CVE-2019-1576, PAN-SA-2019-0018, VIGILANCE-VUL-29783
Linux kernel: denial of service via TCP SACK Low MSS Panic
An attacker can send malicious TCP SACK Low MSS Panic packets to Linux kernel, in order to trigger a denial of service...
1074268, 1442037, ARUBA-PSA-2020-010, CERTFR-2019-AVI-276, CERTFR-2019-AVI-277, CERTFR-2019-AVI-278, CERTFR-2019-AVI-298, CERTFR-2019-AVI-303, CERTFR-2019-AVI-309, CERTFR-2019-AVI-429, CERTFR-2019-AVI-458, CERTFR-2019-AVI-561, CERTFR-2019-AVI-597, CERTFR-2020-AVI-575, cpujan2020, CTX256725, CVE-2019-11477, DLA-1823-1, DLA-1824-1, DSA-2019-117, DSA-4465-1, FEDORA-2019-6c3d89b3d0, FEDORA-2019-914542e05c, FG-IR-19-180, K78234183, openSUSE-SU-2019:1570-1, openSUSE-SU-2019:1571-1, openSUSE-SU-2019:1579-1, PAN-SA-2019-0013, RHSA-2019:1479-01, RHSA-2019:1480-01, RHSA-2019:1481-01, RHSA-2019:1482-01, RHSA-2019:1483-01, RHSA-2019:1484-01, RHSA-2019:1485-01, RHSA-2019:1486-01, RHSA-2019:1487-01, RHSA-2019:1488-01, RHSA-2019:1489-01, RHSA-2019:1490-01, RHSA-2019:1602-01, SA44193, SB10287, sk156192, SSA-462066, SSB-439005, SUSE-SU-2019:14089-1, SUSE-SU-2019:1527-1, SUSE-SU-2019:1529-1, SUSE-SU-2019:1530-1, SUSE-SU-2019:1532-1, SUSE-SU-2019:1533-1, SUSE-SU-2019:1534-1, SUSE-SU-2019:1535-1, SUSE-SU-2019:1536-1, SUSE-SU-2019:1550-1, SUSE-SU-2019:1692-1, SUSE-SU-2019:2430-1, SUSE-SU-2019:2450-1, SUSE-SU-2019:2950-1, SYMSA1492, Synology-SA-19:28, USN-4017-1, USN-4017-2, VIGILANCE-VUL-29543, VMSA-2019-0010, VMSA-2019-0010.1, VU#905115
Linux kernel: denial of service via TCP SACK Low MSS Resource
An attacker can trigger a fatal error via TCP SACK Low MSS Resource of the Linux kernel, in order to trigger a denial of service...
1074268, 6365341, ARUBA-PSA-2020-010, CERTFR-2019-AVI-277, CERTFR-2019-AVI-278, CERTFR-2019-AVI-298, CERTFR-2019-AVI-300, CERTFR-2019-AVI-429, CERTFR-2019-AVI-458, CERTFR-2019-AVI-597, CERTFR-2020-AVI-575, CERTFR-2021-AVI-146, cpujan2020, CVE-2019-11479, DLA-1823-1, DLA-1824-1, DSA-2019-117, DSA-4465-1, FEDORA-2019-6c3d89b3d0, FEDORA-2019-914542e05c, FG-IR-19-180, HPESBST04140, K35421172, openSUSE-SU-2019:1570-1, openSUSE-SU-2019:1571-1, openSUSE-SU-2019:1579-1, PAN-SA-2019-0013, RHSA-2019:1479-01, RHSA-2019:1480-01, RHSA-2019:1481-01, RHSA-2019:1482-01, RHSA-2019:1483-01, RHSA-2019:1484-01, RHSA-2019:1485-01, RHSA-2019:1486-01, RHSA-2019:1487-01, RHSA-2019:1488-01, RHSA-2019:1489-01, RHSA-2019:1490-01, RHSA-2019:1602-01, SA44193, SB10287, sk156192, SSA-462066, SSB-439005, SUSE-SU-2019:14089-1, SUSE-SU-2019:1527-1, SUSE-SU-2019:1529-1, SUSE-SU-2019:1530-1, SUSE-SU-2019:1532-1, SUSE-SU-2019:1533-1, SUSE-SU-2019:1534-1, SUSE-SU-2019:1535-1, SUSE-SU-2019:1536-1, SUSE-SU-2019:1550-1, SUSE-SU-2019:1692-1, SUSE-SU-2019:2430-1, SYMSA1492, Synology-SA-19:28, USN-4041-1, USN-4041-2, VIGILANCE-VUL-29546, VU#905115
Our database contains other pages. You can request a free trial to read them.

Display information about PaloAlto PAN-OS: