Vulnerability identifier: #VU27900
Vulnerability risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2020-1996
CWE-ID:
CWE-285
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Palo Alto PAN-OS
Operating systems & Components /
Operating system
Vendor: Palo Alto Networks, Inc.
Description
The vulnerability allows a remote attacker to bypass authorization and manipulate log files.
The vulnerability exists in the management server component of PAN-OS Panorama. A remote non-authenticated attacker can send a specially crafted request to the system and inject messages into the management server ms.log file.
Successful exploitation of the vulnerability may allow an attacker to obfuscate log files and hide malicious presence on the system.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Palo Alto PAN-OS: 7.1.0 - 7.1.26, 8.0.0 - 8.0.21, 8.1.0 - 8.1.13, 9.0.0 - 9.0.8
External links
https://security.paloaltonetworks.com/CVE-2020-1996
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.