Palo Alto Networks PAN-OS 6.1, 7.1, and 8.0.x prior to 8.0.7, when an interface implements SSL decryption with RSA enabled or hosts a GlobalProtect portal or gateway, might allow remote malicious users to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
paloaltonetworks pan-os 6.1.0 |
||
paloaltonetworks pan-os 7.1.4 |
||
paloaltonetworks pan-os 7.1.4-h2 |
||
paloaltonetworks pan-os 7.1.5 |
||
paloaltonetworks pan-os 7.1.6 |
||
paloaltonetworks pan-os 7.1.1 |
||
paloaltonetworks pan-os 7.1.3 |
||
paloaltonetworks pan-os 7.1.7 |
||
paloaltonetworks pan-os 7.1.9 |
||
paloaltonetworks pan-os 7.1.11 |
||
paloaltonetworks pan-os 7.1.12 |
||
paloaltonetworks pan-os 7.1.13 |
||
paloaltonetworks pan-os 7.1.14 |
||
paloaltonetworks pan-os 7.1.0 |
||
paloaltonetworks pan-os 7.1.2 |
||
paloaltonetworks pan-os 7.1.8 |
||
paloaltonetworks pan-os 7.1.10 |
||
paloaltonetworks pan-os 8.0.4 |
||
paloaltonetworks pan-os 8.0.5 |
||
paloaltonetworks pan-os 8.0.6 |
||
paloaltonetworks pan-os 8.0.0 |
||
paloaltonetworks pan-os 8.0.2 |
||
paloaltonetworks pan-os 8.0.1 |
||
paloaltonetworks pan-os 8.0.3 |