A buffer overflow vulnerability in PAN-OS allows an unauthenticated attacker to disrupt system processes and potentially execute arbitrary code with root privileges by sending a malicious request to the Captive Portal or Multi-Factor Authentication interface. This issue impacts: All versions of PAN-OS 8.0; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; PAN-OS 9.1 versions earlier than PAN-OS 9.1.3.
Fixes

Solution

This issue is fixed in PAN-OS 8.1.15, PAN-OS 9.0.9, PAN-OS 9.1.3, and all later PAN-OS versions. All Prisma Access services are now upgraded to resolve this issue and are no longer vulnerable. PAN-OS 7.1 and 8.0 are end-of-life and are no longer covered by our Product Security Assurance policies.


Workaround

Until PAN-OS software is upgraded to a fixed version, enabling signatures in content update version 8317 will block attacks against CVE-2020-2040.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2024-09-16T22:40:15.121Z

Reserved: 2019-12-04T00:00:00

Link: CVE-2020-2040

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-09-09T17:15:25.900

Modified: 2024-11-21T05:24:31.737

Link: CVE-2020-2040

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.