vulnerability

PAN-OS: Spoofed Kerberos key distribution center authentication bypass

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
May 13, 2020
Added
Jun 18, 2020
Modified
Oct 5, 2020

Description

An authentication bypass by spoofing vulnerability exists in the authentication daemon and User-ID components of Palo Alto Networks PAN-OS by failing to verify the integrity of the Kerberos key distribution center (KDC) before authenticating users. This affects all forms of authentication that use a Kerberos authentication profile. A man-in-the-middle type of attacker with the ability to intercept communication between PAN-OS and KDC can login to PAN-OS as an administrator. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.6; All version of PAN-OS 8.0.

Solutions

palo-alto-networks-pan-os-upgrade-7-1palo-alto-networks-pan-os-upgrade-8-0palo-alto-networks-pan-os-upgrade-8-1palo-alto-networks-pan-os-upgrade-9-0
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.