Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x3hm-crq5-m74w

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A format string vulnerability in the PAN-OS log daemon (logd) on Panorama allows a local authenticated user to execute arbitrary code, bypassing the restricted shell and escalating privileges. This issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13 on Panorama. This issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions. This issue is fixed in PAN-OS 8.1.13 and all later PAN-OS 8.1 versions.

A format string vulnerability in the PAN-OS log daemon (logd) on Panorama allows a local authenticated user to execute arbitrary code, bypassing the restricted shell and escalating privileges. This issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13 on Panorama. This issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions. This issue is fixed in PAN-OS 8.1.13 and all later PAN-OS 8.1 versions.

EPSS

Процентиль: 46%
0.00235
Низкий

Связанные уязвимости

CVSS3: 8.1
nvd
почти 6 лет назад

A format string vulnerability in the PAN-OS log daemon (logd) on Panorama allows a network based attacker with knowledge of registered firewall devices and access to Panorama management interfaces to execute arbitrary code, bypassing the restricted shell and escalating privileges. This issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13 on Panorama. This issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions.

CVSS3: 8.1
fstec
почти 6 лет назад

Уязвимость демона logd операционной системы PAN-OS, позволяющая нарушителю выполнить произвольный код и повысить свои привилегии

EPSS

Процентиль: 46%
0.00235
Низкий