Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.3113 CVE-2020-2039 PAN-OS: Management web interface denial-of-service (DoS) through unauthenticated file upload 10 September 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: PAN-OS Publisher: Palo Alto Operating System: Network Appliance Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-2039 Original Bulletin: https://securityadvisories.paloaltonetworks.com/CVE-2020-2039 - --------------------------BEGIN INCLUDED TEXT-------------------- Palo Alto Networks Security Advisories / CVE-2020-2039 CVE-2020-2039 PAN-OS: Management web interface denial-of-service (DoS) through unauthenticated file upload 047910 Severity 5.3 . MEDIUM Attack Vector NETWORK Attack Complexity LOW Privileges Required NONE User Interaction NONE Scope UNCHANGED Confidentiality Impact NONE Integrity Impact NONE Availability Impact LOW NVD JSON Published 2020-09-09 Updated 2020-09-09 Reference PAN-148806 Discovered externally Description An uncontrolled resource consumption vulnerability in Palo Alto Networks PAN-OS allows for a remote unauthenticated user to upload temporary files through the management web interface that are not properly deleted after the request is finished. It is possible for an attacker to disrupt the availability of the management web interface by repeatedly uploading files until available disk space is exhausted. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.10; PAN-OS 9.1 versions earlier than PAN-OS 9.1.4; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. Product Status Versions Affected Unaffected PAN-OS 10.0 < 10.0.1 >= 10.0.1 PAN-OS 9.1 < 9.1.4 >= 9.1.4 PAN-OS 9.0 < 9.0.10 >= 9.0.10 PAN-OS 8.1 < 8.1.16 >= 8.1.16 Severity: MEDIUM CVSSv3.1 Base Score: 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) Weakness Type CWE-400 Uncontrolled Resource Consumption Solution This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.10, PAN-OS 9.1.4, PAN-OS 10.0.1, and all later PAN-OS versions. Workarounds and Mitigations This issue impacts the PAN-OS management web interface but you can mitigate the impact of this issue by following best practices for securing the PAN-OS management web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices. Acknowledgments Palo Alto Networks thanks Mikhail Klyuchnikov and Nikita Abramov of Positive Technologies for discovering and reporting this issue. Timeline 2020-09-09 Initial publication Terms of usePrivacyProduct Security Assurance and Vulnerability Disclosure Policy Report vulnerabilitiesManage subscriptions (C) 2020 Palo Alto Networks, Inc. All rights reserved. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBX1m/2+NLKJtyKPYoAQgmKQ//f+s3Z0IvXoGA1nL0b8GtVkclOSCI+SVF Vq9k1GQHu1bffWawleiiabvJb1lAsp29rm7/r8ayuyZ2bov/5oJm/bJXIb7In5BC inYGfGXTTv9ojyZRMf+iUuraHD0RoSo1WhAfyW1E+R9hmZMXxOdDvJKOoBEM+IZj Lye+RfN4jenVWTJZaO3HwZh3WXOc9TVuoY4nWFJdLGkAOSjKaSpOBE6CRda0/WZF CU94AUWl7HO8vX0ZAL4mcTBvpGf8nnmlj5QwuAkGbX87vnFVS+si73bxFCe4l+B8 xAVKAXdm3dbZN83nRPeLWoFurc1FkkhfFCmn1Wh9fiFH0v88lovKQ5uL+cx5O8Vl DVMO/uf9u2cAt+/RpD8zqAdcrzmhEOG4aWEDdoCxG13h+zE7ThoOZXVm8/McrR08 oqroP0imwmpR/MhJ5rt3fk5grg1qaoaqlFKC/s06Jio1+nd/SyiZ524a+ELJ3+j0 QBWZSYmY00IluaEnZ0Gqq2Q9U5TMeaf5sXtTEKdGzNj8QkibUMCg00fI0Yf/g4f1 pAXknUncNMngOK1lkJKgBJwqtmD5HUhVRL7iSoj9FzQRl+mQWiXW3xsVkLtXe58N huKeR9grNas4f399YyzzKrAaiQ84O9PmS0/vqozGSG52i51VRk6qKUi9hqUsojLD 088XEJZZErs= =Xhx5 -----END PGP SIGNATURE-----