Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2019.0354 AN-OS on PA-7000 Series: Improper restriction of communication to Log Forwarding Card (LFC) allows root access (CVE-2019-17440) (PAN-SA-2019-0040) 20 December 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: PAN-OS Operating System: Network Appliance Impact/Access: Root Compromise -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-17440 Member content until: Sunday, January 19 2020 OVERVIEW Palo-Alto advises that improper restriction of communication to Log Forwarding Card allows root access to PAN-OS 9.0 versions prior to 9.0.5-h3 on PA-7000 Series. [1] IMPACT "Improper restriction of communications to Log Forwarding Card (LFC) on PA-7000 Series devices with second-generation Switch Management Card (SMC) may allow an attacker with network access to the LFC to gain root access to PAN-OS."[1] "This has been assigned CVE-2019-17440. This issue is of type CWE-923 (Improper Restriction of Communication Channel to Intended Endpoints). This issue only affected a very limited number of customers and we undertook individual outreach to help them upgrade. At the time of publication, all identified customers have upgraded SW or content and are not impacted. Severity: CRITICAL CVSS Score for this issue is 10 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) as it allows an attacker with network access to the LFC to gain root access to the device."[1] MITIGATION "This issue is fixed in 9.0.5-h3 and all subsequent releases. Content update 8218-5815 also fixes the issue." REFERENCES [1] PAN-OS on PA-7000 Series: Improper restriction of communication to Log Forwarding Card (LFC) allows root access (CVE-2019-17440) https://securityadvisories.paloaltonetworks.com/Home/Detail/203 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXfx3mWaOgq3Tt24GAQid+w/9EO6cNnOuAMQz21MokhIx1E5F3Ghlhkeu aYx7V1st+w2Eve6iqM6m+KcRVO8aRiz2tJZjW0ERFQvEQC+fB3Eed93nPkY/2BjT LG7xhsRRD7p/yPUztq8RCA6BWG064R6lwC+sdWpmcQZppBTUne6+ICOrdpi5+995 nIE8ZI1eVPpottjr+9U8QNaXY3kiq+/etPAZCwBgOl6yaAhYUEvrLgVZVYo4Bemg F9+rC/YFfjNTuVRl7kKRlzfYvzM9s5NsYWXFPXaJmvT/8+dPKYiYqner/YqHsmZR Q1L/8UD89Yc4s+idtEfPdF0juMQuvNKLRAzR2MlFzxxpIZXj8ebuskBEfzhlpRlk uuG8ihrFu9MDLgKRzSDtFhkltTXSI0iQMjb4+WenYVzsQNEat25HqtLF3tIcFISH IK6Vruhc0vfxtdOy+/QPexqnFn/tDKLqwg+KL0bFmLAvyZdQ7n8dm6aC1TS+JYR9 nGANIATr8OkWujBvYm/jLkgA4Xio9tRx5rJ/0HFJtyW6viIqDtZpqltwrkT3nx8q x6Qi7LPT2tHd5HUycUbuVTjDGyqvyuhlCfBIXiV3dg+laTbgrPfEYviLULB41FXs +gB7tGjza7Y+2mh01NgSUMwk71uPDyvPUk4gPFIRDev1gjp4/cbTdzw+dtWdbhY1 B5sldepAJEY= =O0+e -----END PGP SIGNATURE-----