Lucene search

K
cvelistPalo_altoCVELIST:CVE-2021-3056
HistoryNov 10, 2021 - 5:10 p.m.

CVE-2021-3056 PAN-OS: Memory Corruption Vulnerability in GlobalProtect Clientless VPN During SAML Authentication

2021-11-1017:10:20
CWE-120
palo_alto
www.cve.org
5
memory corruption
pan-os
globalprotect
vpn
saml authentication
vulnerability
prisma access
firewall
code execution

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

44.6%

A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables an authenticated attacker to execute arbitrary code with root user privileges during SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. Prisma Access customers with Prisma Access 2.1 Preferred firewalls are impacted by this issue.

CNA Affected

[
  {
    "product": "PAN-OS",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "status": "unaffected",
        "version": "10.1.*"
      },
      {
        "changes": [
          {
            "at": "9.0.14",
            "status": "unaffected"
          }
        ],
        "lessThan": "9.0.14",
        "status": "affected",
        "version": "9.0",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "8.1.20",
            "status": "unaffected"
          }
        ],
        "lessThan": "8.1.20",
        "status": "affected",
        "version": "8.1",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "9.1.9",
            "status": "unaffected"
          }
        ],
        "lessThan": "9.1.9",
        "status": "affected",
        "version": "9.1",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "10.0.1",
            "status": "unaffected"
          }
        ],
        "lessThan": "10.0.1",
        "status": "affected",
        "version": "10.0",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Prisma Access",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "status": "unaffected",
        "version": "2.2 all"
      },
      {
        "status": "affected",
        "version": "2.1 Preferred"
      },
      {
        "status": "unaffected",
        "version": "2.1 Innovation"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

44.6%

Related for CVELIST:CVE-2021-3056