An improper authentication check in Palo Alto Networks PAN-OS may allow an authenticated low privileged non-superuser custom role user to elevate privileges and become superuser. This issue affects PAN-OS 7.1 versions prior to 7.1.25; 8.0 versions prior to 8.0.20; 8.1 versions prior to 8.1.11; 9.0 versions prior to 9.0.5. PAN-OS version 7.0 and prior EOL versions have not been evaluated for this issue.
Metrics
Affected Vendors & Products
Fixes
Solution
This issue has been resolved in 7.1.25, 8.0.20, 8.1.11, 9.0.5 and all subsequent versions.
Workaround
Remove any untrusted custom-role users from the device or disable their access until fixes can be applied. Restrict access to the device to only trusted users.
References
History
No history.

Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-17T04:10:31.450Z
Reserved: 2019-10-10T00:00:00
Link: CVE-2019-17437

No data.

Status : Modified
Published: 2019-12-05T15:15:11.297
Modified: 2024-11-21T04:32:19.770
Link: CVE-2019-17437

No data.

No data.