The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of PAN-OS: information disclosure via SSL/TLS Forward Proxy Decryption URL Filtering Bypass

Synthesis of the vulnerability 

An attacker can bypass access restrictions to data via SSL/TLS Forward Proxy Decryption URL Filtering Bypass of PAN-OS, in order to obtain sensitive information.
Vulnerable products: Palo Alto Firewall PA***, PAN-OS.
Severity of this weakness: 2/4.
Creation date: 13/08/2020.
Références of this bulletin: CVE-2020-2035, VIGILANCE-VUL-33072.

Description of the vulnerability 

The PAN-OS product offers a web service.

However, an attacker can bypass access restrictions to data.

An attacker can therefore use a vulnerability via SSL/TLS Forward Proxy Decryption URL Filtering Bypass of PAN-OS, in order to obtain sensitive information.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This weakness alert impacts software or systems such as Palo Alto Firewall PA***, PAN-OS.

Our Vigil@nce team determined that the severity of this computer vulnerability note is medium.

The trust level is of type unique source, with an origin of intranet server.

An attacker with a expert ability can exploit this security bulletin.

Solutions for this threat 

PAN-OS: workaround for SSL/TLS Forward Proxy Decryption URL Filtering Bypass.
A workaround is indicated in the information source.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides software vulnerabilities patches. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.