Warning: High-severity vulnerability in Palo Alto's PAN-OS
Referentie:
Advisory #2023-150
Versie:
1.0
Geïmpacteerde software:
PAN-OS < 11.0.1
PAN-OS < 10.2.4
PAN-OS < 10.1.9
PAN-OS < 10.0.12
PAN-OS < 9.1.16
PAN-OS < 9.0.17
PAN-OS < 8.1.25
Type:
DOM-Based Cross-Site Scripting (XSS)
CVE/CVSS:
CVE-2023-6790
Datum:
15/12/2023
Bronnen
https://security.paloaltonetworks.com/CVE-2023-6790
Risico’s
The high-severity vulnerability in Palo Alto’s PAN-OS has a HIGH impact on Confidentiality, Integrity, and Availability. The attack complexity is low and no privileges are required to exploit this vulnerability.
Additionally, the vulnerability can be chained with 6 other newly discovered vulnerabilities (CVE-2023-6789, CVE-2023-6791, CVE-2023-6792, CVE-2023-6793, CVE-2023-6794, CVE-2023-6795) for even more impact.
Beschrijving
CVE-2023-6790: DOM-Based Cross-Site Scripting (XSS) Vulnerability in the Web Interface.
An attacker can execute a JavaScript payload in the context of an administrator’s browser when they view a specifically crafted link to the PAN-OS web interface. Successful exploitation of this vulnerability could allow an attacker to hijack the administrator's login session.
Aanbevolen acties
The Centre for Cyber Security Belgium strongly recommends system administrators to visit Palo Alto's PAN-OS customer portal to download and install the patched versions of this software.
Patched versions:
PAN-OS >= 11.0.1
PAN-OS >= 10.2.4
PAN-OS >= 10.1.9
PAN-OS >= 10.0.12
PAN-OS >= 9.1.16
PAN-OS >= 9.0.17
PAN-OS >= 8.1.25
Referenties
https://security.paloaltonetworks.com/CVE-2023-6789
https://security.paloaltonetworks.com/CVE-2023-6791
https://security.paloaltonetworks.com/CVE-2023-6792
https://security.paloaltonetworks.com/CVE-2023-6793
https://security.paloaltonetworks.com/CVE-2023-6794
https://security.paloaltonetworks.com/CVE-2023-6795