A race condition due to insecure creation of a file in a temporary directory vulnerability in PAN-OS allows for root privilege escalation from a limited linux user account. This allows an attacker who has escaped the restricted shell as a low privilege administrator, possibly by exploiting another vulnerability, to escalate privileges to become root user. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.6; All versions of PAN-OS 8.0.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://security.paloaltonetworks.com/CVE-2020-2016 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: palo_alto
Published: 2020-05-13T19:07:14.700757Z
Updated: 2024-09-16T23:31:31.207Z
Reserved: 2019-12-04T00:00:00
Link: CVE-2020-2016
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2020-05-13T19:15:14.317
Modified: 2020-05-15T19:00:47.587
Link: CVE-2020-2016
Redhat
No data.