Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7m66-gpgj-f3cr

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A predictable temporary filename vulnerability in PAN-OS allows local privilege escalation. This issue allows a local attacker who bypassed the restricted shell to execute commands as a low privileged user and gain root access on the PAN-OS hardware or virtual appliance. This issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13. This issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.

A predictable temporary filename vulnerability in PAN-OS allows local privilege escalation. This issue allows a local attacker who bypassed the restricted shell to execute commands as a low privileged user and gain root access on the PAN-OS hardware or virtual appliance. This issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13. This issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.

EPSS

Процентиль: 12%
0.00042
Низкий

Связанные уязвимости

CVSS3: 7
nvd
почти 6 лет назад

A predictable temporary filename vulnerability in PAN-OS allows local privilege escalation. This issue allows a local attacker who bypassed the restricted shell to execute commands as a low privileged user and gain root access on the PAN-OS hardware or virtual appliance. This issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13. This issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.

CVSS3: 7
fstec
почти 6 лет назад

Уязвимость операционной системы PAN-OS, связанная с раскрытием ресурса для ошибочной области, позволяющая нарушителю повысить свои привилегии до уровня root

EPSS

Процентиль: 12%
0.00042
Низкий