Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cm7j-2j4j-9pf4

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A stack-based buffer overflow vulnerability in the management server component of PAN-OS allows an authenticated user to upload a corrupted PAN-OS configuration and potentially execute code with root privileges. This issue affects Palo Alto Networks PAN-OS 8.1 versions before 8.1.13; 9.0 versions before 9.0.7. This issue does not affect PAN-OS 7.1.

A stack-based buffer overflow vulnerability in the management server component of PAN-OS allows an authenticated user to upload a corrupted PAN-OS configuration and potentially execute code with root privileges. This issue affects Palo Alto Networks PAN-OS 8.1 versions before 8.1.13; 9.0 versions before 9.0.7. This issue does not affect PAN-OS 7.1.

EPSS

Процентиль: 80%
0.01381
Низкий

Связанные уязвимости

CVSS3: 7.2
nvd
почти 6 лет назад

A stack-based buffer overflow vulnerability in the management server component of PAN-OS allows an authenticated user to upload a corrupted PAN-OS configuration and potentially execute code with root privileges. This issue affects Palo Alto Networks PAN-OS 8.1 versions before 8.1.13; 9.0 versions before 9.0.7. This issue does not affect PAN-OS 7.1.

CVSS3: 7.2
fstec
почти 6 лет назад

Уязвимость компонента management server операционной системы PAN-OS, позволяющая нарушителю загрузить поврежденную конфигурацию операционной системы и выполнить код с привилегиями root

EPSS

Процентиль: 80%
0.01381
Низкий