A format string vulnerability in the PAN-OS log daemon (logd) on Panorama allows a network based attacker with knowledge of registered firewall devices and access to Panorama management interfaces to execute arbitrary code, bypassing the restricted shell and escalating privileges. This issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13 on Panorama. This issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.
References
Link | Resource |
---|---|
https://security.paloaltonetworks.com/CVE-2020-1979 | Vendor Advisory |
https://security.paloaltonetworks.com/CVE-2020-1979 | Vendor Advisory |
Configurations
History
21 Nov 2024, 05:11
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 8.1 |
References | () https://security.paloaltonetworks.com/CVE-2020-1979 - Vendor Advisory |
Information
Published : 2020-03-11 19:15
Updated : 2024-11-21 05:11
NVD link : CVE-2020-1979
Mitre link : CVE-2020-1979
CVE.ORG link : CVE-2020-1979
JSON object : View
Products Affected
paloaltonetworks
- pan-os
CWE
CWE-134
Use of Externally-Controlled Format String