Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-12769 | A format string vulnerability in the PAN-OS log daemon (logd) on Panorama allows a network based attacker with knowledge of registered firewall devices and access to Panorama management interfaces to execute arbitrary code, bypassing the restricted shell and escalating privileges. This issue affects only PAN-OS 8.1 versions earlier than PAN-OS 8.1.13 on Panorama. This issue does not affect PAN-OS 7.1, PAN-OS 9.0, or later PAN-OS versions. |
Solution
This issue is fixed in PAN-OS 8.1.13 and all later PAN-OS 8.1 versions.
Workaround
This issue affects the management interface of Panorama and is mitigated by following best practices for securing the Panorama management interface. Our best practices guidelines reduce the exposure of the management interface to potential attackers. Please review the Best Practices for Securing Administrative Access in the PAN-OS 8.1 technical documentation, available at: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2020-1979 |
|
No history.
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-17T00:10:53.810Z
Reserved: 2019-12-04T00:00:00
Link: CVE-2020-1979
No data.
Status : Modified
Published: 2020-03-11T19:15:13.327
Modified: 2024-11-21T05:11:46.530
Link: CVE-2020-1979
No data.
OpenCVE Enrichment
No data.
EUVD