Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-2016

Опубликовано: 13 мая 2020
Источник: nvd
CVSS3: 7
CVSS2: 8.5
EPSS Низкий

Описание

A race condition due to insecure creation of a file in a temporary directory vulnerability in PAN-OS allows for root privilege escalation from a limited linux user account. This allows an attacker who has escaped the restricted shell as a low privilege administrator, possibly by exploiting another vulnerability, to escalate privileges to become root user. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.6; All versions of PAN-OS 8.0.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
Версия от 7.1.0 (включая) до 7.1.26 (исключая)
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
Версия от 8.0.0 (включая) до 8.0.20 (включая)
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
Версия от 8.1.0 (включая) до 8.1.13 (исключая)
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
Версия от 9.0.0 (включая) до 9.0.6 (исключая)

EPSS

Процентиль: 43%
0.00207
Низкий

7 High

CVSS3

8.5 High

CVSS2

Дефекты

CWE-377
CWE-362

Связанные уязвимости

github
больше 3 лет назад

A race condition due to insecure creation of a file in a temporary directory vulnerability in PAN-OS allows for root privilege escalation from a limited linux user account. This allows an attacker who has escaped the restricted shell as a low privilege administrator, possibly by exploiting another vulnerability, to escalate privileges to become root user.

EPSS

Процентиль: 43%
0.00207
Низкий

7 High

CVSS3

8.5 High

CVSS2

Дефекты

CWE-377
CWE-362