10
CVSSv2

CVE-2020-2040

Published: 09/09/2020 Updated: 15/09/2020
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A buffer overflow vulnerability in PAN-OS allows an unauthenticated malicious user to disrupt system processes and potentially execute arbitrary code with root privileges by sending a malicious request to the Captive Portal or Multi-Factor Authentication interface. This issue impacts: All versions of PAN-OS 8.0; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; PAN-OS 9.1 versions earlier than PAN-OS 9.1.3.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

paloaltonetworks pan-os

Recent Articles

Another month, another cryptocurrency exchange hacked and 'millions of dollars' stolen by miscreants
The Register • Iain Thomson in San Francisco • 14 Sep 2020

Plus get patching your Palo Alto kit, there's a nasty crit out there

In brief Cryptocurrency exchange Eterbase last week admitted hackers broke into its computers and made off with other people's coins, said to be worth $5.4m. The plug was pulled on the digital dosh exchange as a result, though it may return at some point: it claims to have enough capital to surmount the cyber-heist. Investigations by staff and law enforcement are ongoing. "We want to inform our users that we have enough capital to meet all our obligations," the site's operators said in a stateme...