2021-01-07 00:03:15 +00:00
{
"CVE_data_meta" : {
2021-11-10 09:00:08 -08:00
"ASSIGNER" : "psirt@paloaltonetworks.com" ,
"DATE_PUBLIC" : "2021-11-10T17:00:00.000Z" ,
2021-01-07 00:03:15 +00:00
"ID" : "CVE-2021-3063" ,
2021-11-10 09:00:08 -08:00
"STATE" : "PUBLIC" ,
"TITLE" : "PAN-OS: Denial-of-Service (DoS) Vulnerability in GlobalProtect Portal and Gateway Interfaces"
2021-01-07 00:03:15 +00:00
} ,
2021-11-10 09:00:08 -08:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "PAN-OS" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_name" : "8.1" ,
"version_value" : "8.1.21"
} ,
{
"version_affected" : "!>=" ,
"version_name" : "8.1" ,
"version_value" : "8.1.21"
} ,
{
"version_affected" : "<" ,
"version_name" : "9.0" ,
"version_value" : "9.0.14-h4"
} ,
{
"version_affected" : "!>=" ,
"version_name" : "9.0" ,
"version_value" : "9.0.14-h4"
} ,
{
"version_affected" : "<" ,
"version_name" : "10.0" ,
"version_value" : "10.0.8-h4"
} ,
{
"version_affected" : "!>=" ,
"version_name" : "10.0" ,
"version_value" : "10.0.8-h4"
} ,
{
"version_affected" : "<" ,
"version_name" : "10.1" ,
"version_value" : "10.1.3"
} ,
{
"version_affected" : "!>=" ,
"version_name" : "10.1" ,
"version_value" : "10.1.3"
} ,
{
"version_affected" : "<" ,
"version_name" : "9.1" ,
"version_value" : "9.1.11-h3"
} ,
{
"version_affected" : "!>=" ,
"version_name" : "9.1" ,
"version_value" : "9.1.11-h3"
}
]
}
} ,
{
"product_name" : "Prisma Access" ,
"version" : {
"version_data" : [
{
"version_affected" : "!" ,
"version_name" : "2.2" ,
"version_value" : "all"
} ,
{
"version_affected" : "!" ,
"version_name" : "2.1" ,
"version_value" : "all"
}
]
}
}
]
} ,
"vendor_name" : "Palo Alto Networks"
}
]
}
} ,
"configuration" : [
{
"lang" : "eng" ,
"value" : "This issue is applicable only to PAN-OS firewall configurations with a GlobalProtect portal or gateway enabled. You can verify whether you have a GlobalProtect portal or gateway configured by checking for entries in 'Network > GlobalProtect > Portals' and in 'Network > GlobalProtect > Gateways' from the web interface."
}
] ,
"credit" : [
{
"lang" : "eng" ,
"value" : " This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review."
}
] ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2021-01-07 00:03:15 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2021-11-10 18:01:05 +00:00
"value" : "An improper handling of exceptional conditions vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to send specifically crafted traffic to a GlobalProtect interface that causes the service to stop responding. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.21; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14-h4; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11-h3; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8-h4; PAN-OS 10.1 versions earlier than PAN-OS 10.1.3. Prisma Access customers are not impacted by this issue."
2021-01-07 00:03:15 +00:00
}
]
2021-11-10 09:00:08 -08:00
} ,
"exploit" : [
{
"lang" : "eng" ,
"value" : "Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability."
}
] ,
"generator" : {
"engine" : "Vulnogram 0.0.9"
} ,
"impact" : {
"cvss" : {
"attackComplexity" : "LOW" ,
"attackVector" : "NETWORK" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"privilegesRequired" : "NONE" ,
"scope" : "UNCHANGED" ,
"userInteraction" : "NONE" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
"version" : "3.1"
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-755 Improper Handling of Exceptional Conditions"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
2021-11-10 18:01:05 +00:00
"refsource" : "MISC" ,
"url" : "https://security.paloaltonetworks.com/CVE-2021-3063" ,
"name" : "https://security.paloaltonetworks.com/CVE-2021-3063"
2021-11-10 09:00:08 -08:00
}
]
} ,
"solution" : [
{
"lang" : "eng" ,
"value" : "This issue is fixed in PAN-OS 8.1.21, PAN-OS 9.0.14-h4, PAN-OS 9.1.11-h3, PAN-OS 10.0.8-h4, PAN-OS 10.1.3, and all later PAN-OS versions."
}
] ,
"source" : {
"defect" : [
"PAN-180032"
] ,
"discovery" : "EXTERNAL"
} ,
"timeline" : [
{
"lang" : "eng" ,
"time" : "2021-11-10T17:00:00.000Z" ,
"value" : "Initial publication"
}
] ,
"work_around" : [
{
"lang" : "eng" ,
"value" : "Enable signatures for Unique Threat IDs 91820 and 91855 on traffic destined for GlobalProtect interfaces to block attacks against CVE-2021-3063."
}
] ,
"x_advisoryEoL" : false ,
"x_affectedList" : [
"Prisma Access 2.2" ,
"Prisma Access 2.1" ,
"PAN-OS 10.1.2" ,
"PAN-OS 10.1.1" ,
"PAN-OS 10.1.0" ,
"PAN-OS 10.1" ,
"PAN-OS 10.0.8-h2" ,
"PAN-OS 10.0.8-h1" ,
"PAN-OS 10.0.8" ,
"PAN-OS 10.0.7" ,
"PAN-OS 10.0.6" ,
"PAN-OS 10.0.5" ,
"PAN-OS 10.0.4" ,
"PAN-OS 10.0.3" ,
"PAN-OS 10.0.2" ,
"PAN-OS 10.0.1" ,
"PAN-OS 10.0.0" ,
"PAN-OS 10.0" ,
"PAN-OS 9.1.11-h2" ,
"PAN-OS 9.1.11-h1" ,
"PAN-OS 9.1.11" ,
"PAN-OS 9.1.10" ,
"PAN-OS 9.1.9" ,
"PAN-OS 9.1.8" ,
"PAN-OS 9.1.7" ,
"PAN-OS 9.1.6" ,
"PAN-OS 9.1.5" ,
"PAN-OS 9.1.4" ,
"PAN-OS 9.1.3-h1" ,
"PAN-OS 9.1.3" ,
"PAN-OS 9.1.2-h1" ,
"PAN-OS 9.1.2" ,
"PAN-OS 9.1.1" ,
"PAN-OS 9.1.0-h3" ,
"PAN-OS 9.1.0-h2" ,
"PAN-OS 9.1.0-h1" ,
"PAN-OS 9.1.0" ,
"PAN-OS 9.1" ,
"PAN-OS 9.0.14-h3" ,
"PAN-OS 9.0.14-h2" ,
"PAN-OS 9.0.14-h1" ,
"PAN-OS 9.0.14" ,
"PAN-OS 9.0.13" ,
"PAN-OS 9.0.12" ,
"PAN-OS 9.0.11" ,
"PAN-OS 9.0.10" ,
"PAN-OS 9.0.9-h1" ,
"PAN-OS 9.0.9" ,
"PAN-OS 9.0.8" ,
"PAN-OS 9.0.7" ,
"PAN-OS 9.0.6" ,
"PAN-OS 9.0.5" ,
"PAN-OS 9.0.4" ,
"PAN-OS 9.0.3-h3" ,
"PAN-OS 9.0.3-h2" ,
"PAN-OS 9.0.3-h1" ,
"PAN-OS 9.0.3" ,
"PAN-OS 9.0.2-h4" ,
"PAN-OS 9.0.2-h3" ,
"PAN-OS 9.0.2-h2" ,
"PAN-OS 9.0.2-h1" ,
"PAN-OS 9.0.2" ,
"PAN-OS 9.0.1" ,
"PAN-OS 9.0.0" ,
"PAN-OS 9.0" ,
"PAN-OS 8.1.20-h1" ,
"PAN-OS 8.1.20" ,
"PAN-OS 8.1.19" ,
"PAN-OS 8.1.18" ,
"PAN-OS 8.1.17" ,
"PAN-OS 8.1.16" ,
"PAN-OS 8.1.15-h3" ,
"PAN-OS 8.1.15-h2" ,
"PAN-OS 8.1.15-h1" ,
"PAN-OS 8.1.15" ,
"PAN-OS 8.1.14-h2" ,
"PAN-OS 8.1.14-h1" ,
"PAN-OS 8.1.14" ,
"PAN-OS 8.1.13" ,
"PAN-OS 8.1.12" ,
"PAN-OS 8.1.11" ,
"PAN-OS 8.1.10" ,
"PAN-OS 8.1.9-h4" ,
"PAN-OS 8.1.9-h3" ,
"PAN-OS 8.1.9-h2" ,
"PAN-OS 8.1.9-h1" ,
"PAN-OS 8.1.9" ,
"PAN-OS 8.1.8-h5" ,
"PAN-OS 8.1.8-h4" ,
"PAN-OS 8.1.8-h3" ,
"PAN-OS 8.1.8-h2" ,
"PAN-OS 8.1.8-h1" ,
"PAN-OS 8.1.8" ,
"PAN-OS 8.1.7" ,
"PAN-OS 8.1.6-h2" ,
"PAN-OS 8.1.6-h1" ,
"PAN-OS 8.1.6" ,
"PAN-OS 8.1.5" ,
"PAN-OS 8.1.4" ,
"PAN-OS 8.1.3" ,
"PAN-OS 8.1.2" ,
"PAN-OS 8.1.1" ,
"PAN-OS 8.1.0" ,
"PAN-OS 8.1"
] ,
"x_likelyAffectedList" : [
"PAN-OS 8.0.20" ,
"PAN-OS 8.0.19-h1" ,
"PAN-OS 8.0.19" ,
"PAN-OS 8.0.18" ,
"PAN-OS 8.0.17" ,
"PAN-OS 8.0.16" ,
"PAN-OS 8.0.15" ,
"PAN-OS 8.0.14" ,
"PAN-OS 8.0.13" ,
"PAN-OS 8.0.12" ,
"PAN-OS 8.0.11-h1" ,
"PAN-OS 8.0.10" ,
"PAN-OS 8.0.9" ,
"PAN-OS 8.0.8" ,
"PAN-OS 8.0.7" ,
"PAN-OS 8.0.6-h3" ,
"PAN-OS 8.0.6-h2" ,
"PAN-OS 8.0.6-h1" ,
"PAN-OS 8.0.6" ,
"PAN-OS 8.0.5" ,
"PAN-OS 8.0.4" ,
"PAN-OS 8.0.3-h4" ,
"PAN-OS 8.0.3-h3" ,
"PAN-OS 8.0.3-h2" ,
"PAN-OS 8.0.3-h1" ,
"PAN-OS 8.0.3" ,
"PAN-OS 8.0.2" ,
"PAN-OS 8.0.1" ,
"PAN-OS 8.0.0" ,
"PAN-OS 8.0" ,
"PAN-OS 7.1.26" ,
"PAN-OS 7.1.25" ,
"PAN-OS 7.1.24-h1" ,
"PAN-OS 7.1.24" ,
"PAN-OS 7.1.23" ,
"PAN-OS 7.1.22" ,
"PAN-OS 7.1.21" ,
"PAN-OS 7.1.20" ,
"PAN-OS 7.1.19" ,
"PAN-OS 7.1.18" ,
"PAN-OS 7.1.17" ,
"PAN-OS 7.1.16" ,
"PAN-OS 7.1.15" ,
"PAN-OS 7.1.14" ,
"PAN-OS 7.1.13" ,
"PAN-OS 7.1.12" ,
"PAN-OS 7.1.11" ,
"PAN-OS 7.1.10" ,
"PAN-OS 7.1.9-h4" ,
"PAN-OS 7.1.9-h3" ,
"PAN-OS 7.1.9-h2" ,
"PAN-OS 7.1.9-h1" ,
"PAN-OS 7.1.9" ,
"PAN-OS 7.1.8" ,
"PAN-OS 7.1.7" ,
"PAN-OS 7.1.6" ,
"PAN-OS 7.1.5" ,
"PAN-OS 7.1.4-h2" ,
"PAN-OS 7.1.4-h1" ,
"PAN-OS 7.1.4" ,
"PAN-OS 7.1.3" ,
"PAN-OS 7.1.2" ,
"PAN-OS 7.1.1" ,
"PAN-OS 7.1.0" ,
"PAN-OS 7.1"
]
2021-01-07 00:03:15 +00:00
}