2021-01-07 00:03:15 +00:00
{
"CVE_data_meta" : {
2021-11-10 09:00:08 -08:00
"ASSIGNER" : "psirt@paloaltonetworks.com" ,
"DATE_PUBLIC" : "2021-11-10T17:00:00.000Z" ,
2021-01-07 00:03:15 +00:00
"ID" : "CVE-2021-3062" ,
2021-11-10 09:00:08 -08:00
"STATE" : "PUBLIC" ,
"TITLE" : "PAN-OS: Improper Access Control Vulnerability Exposing AWS Instance Metadata Endpoint to GlobalProtect Users"
2021-01-07 00:03:15 +00:00
} ,
2021-11-10 09:00:08 -08:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "PAN-OS" ,
"version" : {
"version_data" : [
{
"platform" : "VM-Series" ,
"version_affected" : "<" ,
"version_name" : "9.1" ,
"version_value" : "9.1.11"
} ,
{
"platform" : "VM-Series" ,
"version_affected" : "<" ,
"version_name" : "8.1" ,
"version_value" : "8.1.20"
} ,
{
"platform" : "VM-Series" ,
"version_affected" : "<" ,
"version_name" : "9.0" ,
"version_value" : "9.0.14"
} ,
{
"platform" : "VM-Series" ,
"version_affected" : "!>=" ,
"version_name" : "9.1" ,
"version_value" : "9.1.11"
} ,
{
"platform" : "VM-Series" ,
"version_affected" : "!>=" ,
"version_name" : "8.1" ,
"version_value" : "8.1.20"
} ,
{
"platform" : "VM-Series" ,
"version_affected" : "!>=" ,
"version_name" : "9.0" ,
"version_value" : "9.0.14"
} ,
{
"platform" : "VM-Series" ,
"version_affected" : "<" ,
"version_name" : "10.0" ,
"version_value" : "10.0.8"
} ,
{
"platform" : "VM-Series" ,
"version_affected" : "!>=" ,
"version_name" : "10.0" ,
"version_value" : "10.0.8"
} ,
{
"platform" : "VM-Series" ,
"version_affected" : "!" ,
"version_name" : "10.1" ,
"version_value" : "10.1.*"
}
]
}
} ,
{
"product_name" : "Prisma Access" ,
"version" : {
"version_data" : [
{
"version_affected" : "!" ,
"version_name" : "2.1" ,
"version_value" : "all"
} ,
{
"version_affected" : "!" ,
"version_name" : "2.2" ,
"version_value" : "all"
}
]
}
}
]
} ,
"vendor_name" : "Palo Alto Networks"
}
]
}
} ,
"configuration" : [
{
"lang" : "eng" ,
"value" : "This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect portal or gateway enabled. You can verify whether you have a GlobalProtect portal or gateway configured by checking for entries in 'Network > GlobalProtect > Portals' and in 'Network > GlobalProtect > Gateways' on the web interface."
}
] ,
"credit" : [
{
"lang" : "eng" ,
"value" : "Palo Alto Networks thanks Matthew Flanagan of Computer Systems Australia (CSA) for discovering and reporting this issue."
}
] ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2021-01-07 00:03:15 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2021-11-10 18:01:05 +00:00
"value" : "An improper access control vulnerability in PAN-OS software enables an attacker with authenticated access to GlobalProtect portals and gateways to connect to the EC2 instance metadata endpoint for VM-Series firewalls hosted on Amazon AWS. Exploitation of this vulnerability enables an attacker to perform any operations allowed by the EC2 role in AWS. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20 VM-Series firewalls; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11 VM-Series firewalls; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14 VM-Series firewalls; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8 VM-Series firewalls. Prisma Access customers are not impacted by this issue."
2021-01-07 00:03:15 +00:00
}
]
2021-11-10 09:00:08 -08:00
} ,
"exploit" : [
{
"lang" : "eng" ,
"value" : "Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability."
}
] ,
"generator" : {
"engine" : "Vulnogram 0.0.9"
} ,
"impact" : {
"cvss" : {
"attackComplexity" : "LOW" ,
"attackVector" : "NETWORK" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 8.1 ,
"baseSeverity" : "HIGH" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"privilegesRequired" : "LOW" ,
"scope" : "UNCHANGED" ,
"userInteraction" : "NONE" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" ,
"version" : "3.1"
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-284 Improper Access Control"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
2021-11-10 18:01:05 +00:00
"refsource" : "MISC" ,
"url" : "https://security.paloaltonetworks.com/CVE-2021-3062" ,
"name" : "https://security.paloaltonetworks.com/CVE-2021-3062"
2021-11-10 09:00:08 -08:00
}
]
} ,
"solution" : [
{
"lang" : "eng" ,
"value" : "This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.11, PAN-OS 10.0.8, and all later PAN-OS versions"
}
] ,
"source" : {
"defect" : [
"PAN-164422"
] ,
"discovery" : "EXTERNAL"
} ,
"timeline" : [
{
"lang" : "eng" ,
"time" : "2021-11-10T17:00:00.000Z" ,
"value" : "Initial publication"
}
] ,
"work_around" : [
{
"lang" : "eng" ,
"value" : "There are no known workarounds for this issue."
}
] ,
"x_advisoryEoL" : false ,
"x_affectedList" : [
"PAN-OS 10.0.7" ,
"PAN-OS 10.0.6" ,
"PAN-OS 10.0.5" ,
"PAN-OS 10.0.4" ,
"PAN-OS 10.0.3" ,
"PAN-OS 10.0.2" ,
"PAN-OS 10.0.1" ,
"PAN-OS 10.0.0" ,
"PAN-OS 10.0" ,
"PAN-OS 9.1.10" ,
"PAN-OS 9.1.9" ,
"PAN-OS 9.1.8" ,
"PAN-OS 9.1.7" ,
"PAN-OS 9.1.6" ,
"PAN-OS 9.1.5" ,
"PAN-OS 9.1.4" ,
"PAN-OS 9.1.3-h1" ,
"PAN-OS 9.1.3" ,
"PAN-OS 9.1.2-h1" ,
"PAN-OS 9.1.2" ,
"PAN-OS 9.1.1" ,
"PAN-OS 9.1.0-h3" ,
"PAN-OS 9.1.0-h2" ,
"PAN-OS 9.1.0-h1" ,
"PAN-OS 9.1.0" ,
"PAN-OS 9.1" ,
"PAN-OS 9.0.13" ,
"PAN-OS 9.0.12" ,
"PAN-OS 9.0.11" ,
"PAN-OS 9.0.10" ,
"PAN-OS 9.0.9-h1" ,
"PAN-OS 9.0.9" ,
"PAN-OS 9.0.8" ,
"PAN-OS 9.0.7" ,
"PAN-OS 9.0.6" ,
"PAN-OS 9.0.5" ,
"PAN-OS 9.0.4" ,
"PAN-OS 9.0.3-h3" ,
"PAN-OS 9.0.3-h2" ,
"PAN-OS 9.0.3-h1" ,
"PAN-OS 9.0.3" ,
"PAN-OS 9.0.2-h4" ,
"PAN-OS 9.0.2-h3" ,
"PAN-OS 9.0.2-h2" ,
"PAN-OS 9.0.2-h1" ,
"PAN-OS 9.0.2" ,
"PAN-OS 9.0.1" ,
"PAN-OS 9.0.0" ,
"PAN-OS 9.0" ,
"PAN-OS 8.1.19" ,
"PAN-OS 8.1.18" ,
"PAN-OS 8.1.17" ,
"PAN-OS 8.1.16" ,
"PAN-OS 8.1.15-h3" ,
"PAN-OS 8.1.15-h2" ,
"PAN-OS 8.1.15-h1" ,
"PAN-OS 8.1.15" ,
"PAN-OS 8.1.14-h2" ,
"PAN-OS 8.1.14-h1" ,
"PAN-OS 8.1.14" ,
"PAN-OS 8.1.13" ,
"PAN-OS 8.1.12" ,
"PAN-OS 8.1.11" ,
"PAN-OS 8.1.10" ,
"PAN-OS 8.1.9-h4" ,
"PAN-OS 8.1.9-h3" ,
"PAN-OS 8.1.9-h2" ,
"PAN-OS 8.1.9-h1" ,
"PAN-OS 8.1.9" ,
"PAN-OS 8.1.8-h5" ,
"PAN-OS 8.1.8-h4" ,
"PAN-OS 8.1.8-h3" ,
"PAN-OS 8.1.8-h2" ,
"PAN-OS 8.1.8-h1" ,
"PAN-OS 8.1.8" ,
"PAN-OS 8.1.7" ,
"PAN-OS 8.1.6-h2" ,
"PAN-OS 8.1.6-h1" ,
"PAN-OS 8.1.6" ,
"PAN-OS 8.1.5" ,
"PAN-OS 8.1.4" ,
"PAN-OS 8.1.3" ,
"PAN-OS 8.1.2" ,
"PAN-OS 8.1.1" ,
"PAN-OS 8.1.0" ,
"PAN-OS 8.1"
] ,
"x_likelyAffectedList" : [
"PAN-OS 8.0.20" ,
"PAN-OS 8.0.19-h1" ,
"PAN-OS 8.0.19" ,
"PAN-OS 8.0.18" ,
"PAN-OS 8.0.17" ,
"PAN-OS 8.0.16" ,
"PAN-OS 8.0.15" ,
"PAN-OS 8.0.14" ,
"PAN-OS 8.0.13" ,
"PAN-OS 8.0.12" ,
"PAN-OS 8.0.11-h1" ,
"PAN-OS 8.0.10" ,
"PAN-OS 8.0.9" ,
"PAN-OS 8.0.8" ,
"PAN-OS 8.0.7" ,
"PAN-OS 8.0.6-h3" ,
"PAN-OS 8.0.6-h2" ,
"PAN-OS 8.0.6-h1" ,
"PAN-OS 8.0.6" ,
"PAN-OS 8.0.5" ,
"PAN-OS 8.0.4" ,
"PAN-OS 8.0.3-h4" ,
"PAN-OS 8.0.3-h3" ,
"PAN-OS 8.0.3-h2" ,
"PAN-OS 8.0.3-h1" ,
"PAN-OS 8.0.3" ,
"PAN-OS 8.0.2" ,
"PAN-OS 8.0.1" ,
"PAN-OS 8.0.0" ,
"PAN-OS 8.0" ,
"PAN-OS 7.1.26" ,
"PAN-OS 7.1.25" ,
"PAN-OS 7.1.24-h1" ,
"PAN-OS 7.1.24" ,
"PAN-OS 7.1.23" ,
"PAN-OS 7.1.22" ,
"PAN-OS 7.1.21" ,
"PAN-OS 7.1.20" ,
"PAN-OS 7.1.19" ,
"PAN-OS 7.1.18" ,
"PAN-OS 7.1.17" ,
"PAN-OS 7.1.16" ,
"PAN-OS 7.1.15" ,
"PAN-OS 7.1.14" ,
"PAN-OS 7.1.13" ,
"PAN-OS 7.1.12" ,
"PAN-OS 7.1.11" ,
"PAN-OS 7.1.10" ,
"PAN-OS 7.1.9-h4" ,
"PAN-OS 7.1.9-h3" ,
"PAN-OS 7.1.9-h2" ,
"PAN-OS 7.1.9-h1" ,
"PAN-OS 7.1.9" ,
"PAN-OS 7.1.8" ,
"PAN-OS 7.1.7" ,
"PAN-OS 7.1.6" ,
"PAN-OS 7.1.5" ,
"PAN-OS 7.1.4-h2" ,
"PAN-OS 7.1.4-h1" ,
"PAN-OS 7.1.4" ,
"PAN-OS 7.1.3" ,
"PAN-OS 7.1.2" ,
"PAN-OS 7.1.1" ,
"PAN-OS 7.1.0" ,
"PAN-OS 7.1"
]
2021-01-07 00:03:15 +00:00
}