A cleartext transmission of sensitive information vulnerability in Palo Alto Networks PAN-OS Panorama that discloses an authenticated PAN-OS administrator's PAN-OS session cookie. When an administrator issues a context switch request into a managed firewall with an affected PAN-OS Panorama version, their PAN-OS session cookie is transmitted over cleartext to the firewall. An attacker with the ability to intercept this network traffic between the firewall and Panorama can access the administrator's account and further manipulate devices managed by Panorama. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.6; PAN-OS 9.1 versions earlier than 9.1.1; All version of PAN-OS 8.0;
References
Link | Resource |
---|---|
https://security.paloaltonetworks.com/CVE-2020-2013 | Vendor Advisory |
https://security.paloaltonetworks.com/CVE-2020-2013 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:24
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.3 |
References | () https://security.paloaltonetworks.com/CVE-2020-2013 - Vendor Advisory |
Information
Published : 2020-05-13 19:15
Updated : 2024-11-21 05:24
NVD link : CVE-2020-2013
Mitre link : CVE-2020-2013
CVE.ORG link : CVE-2020-2013
JSON object : View
Products Affected
paloaltonetworks
- pan-os
CWE
CWE-319
Cleartext Transmission of Sensitive Information