-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2019.0354
   AN-OS on PA-7000 Series: Improper restriction of communication to Log
         Forwarding Card (LFC) allows root access (CVE-2019-17440)
                            (PAN-SA-2019-0040)
                             20 December 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              PAN-OS
Operating System:     Network Appliance
Impact/Access:        Root Compromise -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2019-17440  
Member content until: Sunday, January 19 2020

OVERVIEW

        Palo-Alto advises that improper restriction of communication to Log
        Forwarding Card allows root access to PAN-OS 9.0 versions prior to 
        9.0.5-h3 on PA-7000 Series. [1]


IMPACT

        "Improper restriction of communications to Log Forwarding Card (LFC)
        on PA-7000 Series devices with second-generation Switch Management 
        Card (SMC) may allow an attacker with network access to the LFC to 
        gain root access to PAN-OS."[1]
        
        "This has been assigned CVE-2019-17440. This issue is of type 
        CWE-923 (Improper Restriction of Communication Channel to Intended 
        Endpoints). This issue only affected a very limited number of 
        customers and we undertook individual outreach to help them upgrade.
        At the time of publication, all identified customers have upgraded 
        SW or content and are not impacted.
        
        Severity: CRITICAL
        
        CVSS Score for this issue is 10 
        (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) as it allows an 
        attacker with network access to the LFC to gain root access to the 
        device."[1]


MITIGATION

        
        "This issue is fixed in 9.0.5-h3 and all subsequent releases. Content update
        8218-5815 also fixes the issue."


REFERENCES

        [1] PAN-OS on PA-7000 Series: Improper restriction of communication to
            Log Forwarding Card (LFC) allows root access (CVE-2019-17440)
            https://securityadvisories.paloaltonetworks.com/Home/Detail/203

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=O0+e
-----END PGP SIGNATURE-----