An authentication bypass by spoofing vulnerability exists in the authentication daemon and User-ID components of Palo Alto Networks PAN-OS by failing to verify the integrity of the Kerberos key distribution center (KDC) before authenticating users. This affects all forms of authentication that use a Kerberos authentication profile. A man-in-the-middle type of attacker with the ability to intercept communication between PAN-OS and KDC can login to PAN-OS as an administrator. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.6; All version of PAN-OS 8.0.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://security.paloaltonetworks.com/CVE-2020-2002 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: palo_alto
Published: 2020-05-13T19:07:14.142942Z
Updated: 2024-09-17T04:03:36.143Z
Reserved: 2019-12-04T00:00:00
Link: CVE-2020-2002
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2020-05-13T19:15:12.987
Modified: 2020-05-19T16:02:21.327
Link: CVE-2020-2002
Redhat
No data.