Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.1751 PAN-OS: Temporary file race condition vulnerability leads to local privilege escalation 18 May 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: PAN-OS Publisher: Palo Alto Operating System: Network Appliance Impact/Access: Root Compromise -- Existing Account Increased Privileges -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2020-2016 Original Bulletin: https://securityadvisories.paloaltonetworks.com/CVE-2020-2016 - --------------------------BEGIN INCLUDED TEXT-------------------- Palo Alto Networks Security Advisories / CVE-2020-2016 CVE-2020-2016 PAN-OS: Temporary file race condition vulnerability in PAN-OS leads to local privilege escalation 047910 Severity 7 . HIGH Attack Vector LOCAL Attack Complexity HIGH Privileges Required LOW User Interaction NONE Scope UNCHANGED Confidentiality Impact HIGH Integrity Impact HIGH Availability Impact HIGH NVD JSON Published: 2020-05-13 Updated: 2020-05-13 Ref#: PAN-128248 Description A race condition due to insecure creation of a file in a temporary directory vulnerability in PAN-OS allows for root privilege escalation from a limited linux user account. This allows an attacker who has escaped the restricted shell as a low privilege administrator, possibly by exploiting another vulnerability, to escalate privileges to become root user. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.6; All versions of PAN-OS 8.0. Product Status PAN-OS Versions Affected Unaffected 9.2 >= 9.2.0 9.1 >= 9.1.0 9.0 < 9.0.6 >= 9.0.6 8.1 < 8.1.13 >= 8.1.13 8.0 8.0.* 7.1 < 7.1.26 >= 7.1.26 Severity: HIGH CVSSv3.1 Base Score: 7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) Solution This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.6, PAN-OS 9.1.0, PAN-OS 9.2.0, and all later PAN-OS versions. PAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies. Workarounds and Mitigations This issue affects the management interface of PAN-OS and is strongly mitigated by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at: https://docs.paloaltonetworks.com . Acknowledgements Palo Alto Networks thanks the UK's National Cyber Security Centre (NCSC) for discovering and reporting this issue. Palo Alto Networks thanks the NCC Group for finding this issue independently during a contracted PAN-OS security assessment. Timeline 2020-05-13 Initial publication - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXsIBgeNLKJtyKPYoAQjEZxAAqPsjJ9Wmd4aFhgMU0HTx0L3WAGOnld6t q7Y0FcSkdvmNwXHjRjT5Ym1HZ6UO7iTUkK8I/UMLhXNvFw7AOcKliFenkZgxPt5Z K6ch3ZlPxORIwhPgjKlVpMphFnVZwCulsleoaOOm4LxMm5rTvjvSvV0j6xGE/sCh FG71wlWyLhzel0ZR5HrfJE3Gc8g2waN+HIhgo6h8/dn5DcNOo+wi8B0FEPnydxDP jqg890OIOFHFGAU6uXToB7AY4RP/4phWaCLFrm0T0AHTfGu8a1N/LN1sYD2o+vRX v9gBdTmiCZEzllcWGOUAZ2mZOECCSbW7wQDE4lW/67PE5w9LhfYyt6BifmJ3jVvm 4ASH1G/HjgaK27pEQsTN18lJ7hJancAdR17+lE3ieQImwW498J2JkH+091snr0AP N1lwADtTffOmph55Uv0emY9VxUThDDCxr+5celbUUUH7mBBq8qyyq7UKCFhlBwBR U4VApClB5pdiHlNUQiSNjEbnC07bB+LLZoIg8AM8qh0YkDaVNh0fNOsvxtQ7bslQ 88cmSJ6AcRWCUL7ROaYkjjGxTpd+EIuO2FUzJjabKy1O76bOzWQ24gH/G878eUOm TVVUjE9VC2+lwz+A832EVOK96zBPGoPtSOqADo1f8BL5Wps8q9X1jBVwqbRLGySw P5mS43S+TWc= =HJei -----END PGP SIGNATURE-----