paloaltonetworks pan-os 认证机制不恰当
CVE编号
CVE-2021-3046利用情况
暂无补丁情况
N/A披露时间
2021-08-12漏洞描述
An improper authentication vulnerability exists in Palo Alto Networks PAN-OS software that enables a SAML authenticated attacker to impersonate any other user in the GlobalProtect Portal and GlobalProtect Gateway when they are configured to use SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.19; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.5. PAN-OS 10.1 versions are not impacted.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://security.paloaltonetworks.com/CVE-2021-3046 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | fedora_33 | runc-debugsource | * | Up to (excluding) 1.0.0-378.rc95.fc33 | |||||
运行在以下环境 | |||||||||
系统 | fedora_34 | runc-debugsource | * | Up to (excluding) 1.0.0-378.rc95.fc34 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.2 | docker-bash-completion | * | Up to (excluding) 20.10.6_ce-lp152.2.12.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | docker-bash-completion | * | Up to (excluding) 20.10.6_ce-6.49.3 | |||||
运行在以下环境 | |||||||||
系统 | paloaltonetworks | pan-os | * | From (including) 10.0.0 | Up to (excluding) 10.0.5 | ||||
运行在以下环境 | |||||||||
系统 | paloaltonetworks | pan-os | * | From (including) 8.1.0 | Up to (excluding) 8.1.19 | ||||
运行在以下环境 | |||||||||
系统 | paloaltonetworks | pan-os | * | From (including) 9.0.0 | Up to (excluding) 9.0.14 | ||||
运行在以下环境 | |||||||||
系统 | paloaltonetworks | pan-os | * | From (including) 9.1.0 | Up to (excluding) 9.1.9 | ||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04.5_lts | runc | * | Up to (excluding) 1.0.0~rc93-0ubuntu1~18.04.2 | |||||
- 攻击路径 网络
- 攻击复杂度 高
- 权限要求 低
- 影响范围 未更改
- 用户交互 无
- 可用性 无
- 保密性 高
- 完整性 高
CWE-ID | 漏洞类型 |
CWE-287 | 认证机制不恰当 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论