From 914df61efa57e5a6c55229b5ebdafc8a6858d65f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 10 Jun 2021 13:00:57 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2016/1xxx/CVE-2016-1548.json | 95 ++++++++++++++++++++++++++++++++++++ 2016/1xxx/CVE-2016-1550.json | 95 ++++++++++++++++++++++++++++++++++++ 2016/2xxx/CVE-2016-2518.json | 90 ++++++++++++++++++++++++++++++++++ 2020/2xxx/CVE-2020-2035.json | 14 +++--- 2021/3xxx/CVE-2021-3039.json | 7 +-- 2021/3xxx/CVE-2021-3040.json | 7 +-- 2021/3xxx/CVE-2021-3041.json | 7 +-- 7 files changed, 300 insertions(+), 15 deletions(-) diff --git a/2016/1xxx/CVE-2016-1548.json b/2016/1xxx/CVE-2016-1548.json index 7acc163454a..fd5a44e55f8 100644 --- a/2016/1xxx/CVE-2016-1548.json +++ b/2016/1xxx/CVE-2016-1548.json @@ -69,6 +69,11 @@ }, "references": { "reference_data": [ + { + "refsource": "UBUNTU", + "name": "USN-3096-1", + "url": "http://www.ubuntu.com/usn/USN-3096-1" + }, { "name": "DSA-3629", "refsource": "DEBIAN", @@ -89,11 +94,21 @@ "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:1912", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" + }, { "name": "88264", "refsource": "BID", "url": "http://www.securityfocus.com/bid/88264" }, + { + "refsource": "CERT-VN", + "name": "VU#718152", + "url": "https://www.kb.cert.org/vuls/id/718152" + }, { "name": "RHSA-2016:1552", "refsource": "REDHAT", @@ -114,16 +129,91 @@ "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, + { + "refsource": "CISCO", + "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" + }, { "name": "FreeBSD-SA-16:16", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc" }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:2094", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2016:1423", + "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" + }, { "name": "GLSA-201607-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201607-15" }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2016:1329", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html", + "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" + }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:1471", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" + }, + { + "refsource": "MISC", + "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0082", + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0082" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2016-5b2eb0bf9c", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" + }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:1291", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-3629", + "url": "https://www.debian.org/security/2016/dsa-3629" + }, + { + "refsource": "BUGTRAQ", + "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", + "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" + }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:1568", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" + }, + { + "refsource": "BUGTRAQ", + "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", + "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" + }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:1278", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2016-ed8c6c0426", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" + }, { "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf", @@ -138,6 +228,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" + }, + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" } ] } diff --git a/2016/1xxx/CVE-2016-1550.json b/2016/1xxx/CVE-2016-1550.json index 221d1add153..d9c9c097f30 100644 --- a/2016/1xxx/CVE-2016-1550.json +++ b/2016/1xxx/CVE-2016-1550.json @@ -72,6 +72,11 @@ }, "references": { "reference_data": [ + { + "refsource": "UBUNTU", + "name": "USN-3096-1", + "url": "http://www.ubuntu.com/usn/USN-3096-1" + }, { "name": "DSA-3629", "refsource": "DEBIAN", @@ -87,6 +92,16 @@ "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:1912", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" + }, + { + "refsource": "CERT-VN", + "name": "VU#718152", + "url": "https://www.kb.cert.org/vuls/id/718152" + }, { "name": "RHSA-2016:1552", "refsource": "REDHAT", @@ -112,6 +127,11 @@ "refsource": "MISC", "url": "http://www.talosintelligence.com/reports/TALOS-2016-0084/" }, + { + "refsource": "CISCO", + "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" + }, { "name": "FreeBSD-SA-16:16", "refsource": "FREEBSD", @@ -122,11 +142,81 @@ "refsource": "BID", "url": "http://www.securityfocus.com/bid/88261" }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:2094", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" + }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2016:1423", + "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" + }, { "name": "GLSA-201607-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201607-15" }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2016:1329", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html", + "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" + }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:1471", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2016-5b2eb0bf9c", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" + }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:1291", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-3629", + "url": "https://www.debian.org/security/2016/dsa-3629" + }, + { + "refsource": "MISC", + "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0084", + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0084" + }, + { + "refsource": "BUGTRAQ", + "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", + "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" + }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:1568", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" + }, + { + "refsource": "BUGTRAQ", + "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", + "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" + }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:1278", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2016-ed8c6c0426", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" + }, { "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf", @@ -141,6 +231,11 @@ "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" + }, + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" } ] } diff --git a/2016/2xxx/CVE-2016-2518.json b/2016/2xxx/CVE-2016-2518.json index f8d884ad183..e261c384417 100644 --- a/2016/2xxx/CVE-2016-2518.json +++ b/2016/2xxx/CVE-2016-2518.json @@ -52,6 +52,11 @@ }, "references": { "reference_data": [ + { + "refsource": "UBUNTU", + "name": "USN-3096-1", + "url": "http://www.ubuntu.com/usn/USN-3096-1" + }, { "name": "DSA-3629", "refsource": "DEBIAN", @@ -77,6 +82,11 @@ "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:1912", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" + }, { "name": "VU#718152", "refsource": "CERT-VN", @@ -107,25 +117,105 @@ "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security" }, + { + "refsource": "CISCO", + "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", + "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" + }, { "name": "FreeBSD-SA-16:16", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc" }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:2094", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" + }, { "name": "88226", "refsource": "BID", "url": "http://www.securityfocus.com/bid/88226" }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2016:1423", + "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" + }, { "name": "GLSA-201607-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201607-15" }, + { + "refsource": "SUSE", + "name": "openSUSE-SU-2016:1329", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html", + "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" + }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:1471", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2016-5b2eb0bf9c", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" + }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:1291", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" + }, + { + "refsource": "DEBIAN", + "name": "DSA-3629", + "url": "https://www.debian.org/security/2016/dsa-3629" + }, + { + "refsource": "BUGTRAQ", + "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", + "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K20804323", + "url": "https://support.f5.com/csp/article/K20804323" + }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:1568", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" + }, + { + "refsource": "BUGTRAQ", + "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", + "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" + }, + { + "refsource": "SUSE", + "name": "SUSE-SU-2016:1278", + "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2016-ed8c6c0426", + "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" + }, { "refsource": "CONFIRM", "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" + }, + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" } ] } diff --git a/2020/2xxx/CVE-2020-2035.json b/2020/2xxx/CVE-2020-2035.json index 5eaf41f5710..c5449a49515 100644 --- a/2020/2xxx/CVE-2020-2035.json +++ b/2020/2xxx/CVE-2020-2035.json @@ -70,7 +70,7 @@ "description_data": [ { "lang": "eng", - "value": "When SSL/TLS Forward Proxy Decryption mode has been configured to decrypt the web transactions, the PAN-OS URL filtering feature inspects the HTTP Host and URL path headers for policy enforcement on the decrypted HTTPS web transactions but does not consider Server Name Indication (SNI) field within the TLS Client Hello handshake.\n\nThis allows a compromised host in a protected network to evade any security policy that uses URL filtering on a firewall configured with SSL Decryption in the Forward Proxy mode. A malicious actor can then use this technique to evade detection of communication on the TLS handshake phase between a compromised host and a remote malicious server.\n\nThis technique does not increase the risk of a host being compromised in the network. It does not impact the confidentiality or availability of a firewall. This is considered to have a low impact on the integrity of the firewall because the firewall fails to enforce a policy on certain traffic that should have been blocked.\n\nThis issue does not impact the URL filtering policy enforcement on clear text or encrypted web transactions.\n\nThis technique can be used only after a malicious actor has compromised a host in the protected network and the TLS/SSL Decryption feature is enabled for the traffic that the attacker controls.\n\nPalo Alto Networks is not aware of any malware that uses this technique to exfiltrate data.\n\nThis issue is applicable to all current versions of PAN-OS. This issue does not impact Panorama or WF-500 appliances." + "value": "When SSL/TLS Forward Proxy Decryption mode has been configured to decrypt the web transactions, the PAN-OS URL filtering feature inspects the HTTP Host and URL path headers for policy enforcement on the decrypted HTTPS web transactions but does not consider Server Name Indication (SNI) field within the TLS Client Hello handshake. This allows a compromised host in a protected network to evade any security policy that uses URL filtering on a firewall configured with SSL Decryption in the Forward Proxy mode. A malicious actor can then use this technique to evade detection of communication on the TLS handshake phase between a compromised host and a remote malicious server. This technique does not increase the risk of a host being compromised in the network. It does not impact the confidentiality or availability of a firewall. This is considered to have a low impact on the integrity of the firewall because the firewall fails to enforce a policy on certain traffic that should have been blocked. This issue does not impact the URL filtering policy enforcement on clear text or encrypted web transactions. This technique can be used only after a malicious actor has compromised a host in the protected network and the TLS/SSL Decryption feature is enabled for the traffic that the attacker controls. Palo Alto Networks is not aware of any malware that uses this technique to exfiltrate data. This issue is applicable to all current versions of PAN-OS. This issue does not impact Panorama or WF-500 appliances." } ] }, @@ -114,12 +114,14 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://security.paloaltonetworks.com/CVE-2020-2035" + "refsource": "MISC", + "url": "https://security.paloaltonetworks.com/CVE-2020-2035", + "name": "https://security.paloaltonetworks.com/CVE-2020-2035" }, { - "refsource": "CONFIRM", - "url": "https://www.mnemonic.no/blog/introducing-snicat/" + "refsource": "MISC", + "url": "https://www.mnemonic.no/blog/introducing-snicat/", + "name": "https://www.mnemonic.no/blog/introducing-snicat/" } ] }, @@ -155,7 +157,7 @@ "work_around": [ { "lang": "eng", - "value": "Customers concerned about the risk described in this advisory are encouraged to review the KB article https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008V4J for more information on background and mitigation options. To enforce URL filtering policy on TLS handshakes for decrypted HTTPS sessions, we suggest you use any one of the following workarounds:\n\n1. Route outbound traffic between two virtual systems (vsys) on PAN-OS firewalls that have vsys capability and perform URL Filtering on one vsys and perform SSL/TLS Decryption on the other vsys.\n\n2. Add two additional Security Zones and route outbound traffic between the two zones so that you can apply both \"Decrypt\" and \"No Decrypt\" Decryption policy rules. For example, configure your next-generation firewall so that traffic travels from the Inside zone to the Internal-DMZ zone where you applied a “No Decrypt” rule along with URL Filtering and then the traffic passes to the External-DMZ zone and from External-DMZ to the Internet zone where you applied a \"Decrypt\" rule. Be aware that this workaround configuration may significantly increase the load on your firewall.\n\n3. Use the additional security device in the traffic chain. \nThe SSL/TLS Decryption and URL Filtering functions should be separated (for example, the first device is performing URL Filtering and the second device is performing SSL/TLS Decryption).\n\nThese workarounds are described in detail at https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008V4J\n\nWe recommend you use an endpoint protection solution such as the Cortex XDR agent to significantly reduce the potential risk of hosts being compromised. See https://www.paloaltonetworks.com/cortex/endpoint-protection.\n\nCaution: We recommend that you do not disable SSL/TLS Decryption as a workaround to this issue. There are additional risks associated with this action. \n" + "value": "Customers concerned about the risk described in this advisory are encouraged to review the KB article https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008V4J for more information on background and mitigation options. To enforce URL filtering policy on TLS handshakes for decrypted HTTPS sessions, we suggest you use any one of the following workarounds:\n\n1. Route outbound traffic between two virtual systems (vsys) on PAN-OS firewalls that have vsys capability and perform URL Filtering on one vsys and perform SSL/TLS Decryption on the other vsys.\n\n2. Add two additional Security Zones and route outbound traffic between the two zones so that you can apply both \"Decrypt\" and \"No Decrypt\" Decryption policy rules. For example, configure your next-generation firewall so that traffic travels from the Inside zone to the Internal-DMZ zone where you applied a \u201cNo Decrypt\u201d rule along with URL Filtering and then the traffic passes to the External-DMZ zone and from External-DMZ to the Internet zone where you applied a \"Decrypt\" rule. Be aware that this workaround configuration may significantly increase the load on your firewall.\n\n3. Use the additional security device in the traffic chain. \nThe SSL/TLS Decryption and URL Filtering functions should be separated (for example, the first device is performing URL Filtering and the second device is performing SSL/TLS Decryption).\n\nThese workarounds are described in detail at https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008V4J\n\nWe recommend you use an endpoint protection solution such as the Cortex XDR agent to significantly reduce the potential risk of hosts being compromised. See https://www.paloaltonetworks.com/cortex/endpoint-protection.\n\nCaution: We recommend that you do not disable SSL/TLS Decryption as a workaround to this issue. There are additional risks associated with this action. \n" } ] } \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3039.json b/2021/3xxx/CVE-2021-3039.json index fe06e32c081..3e0844c3b94 100644 --- a/2021/3xxx/CVE-2021-3039.json +++ b/2021/3xxx/CVE-2021-3039.json @@ -49,7 +49,7 @@ "description_data": [ { "lang": "eng", - "value": "An information exposure through log file vulnerability exists in the Palo Alto Networks Prisma Cloud Compute Console where a secret used to authorize the role of the authenticated user is logged to a debug log file.\n\nAuthenticated Operator role and Auditor role users with access to the debug log files can use this secret to gain Administrator role access for their active session in Prisma Cloud Compute.\n\nPrisma Cloud Compute SaaS versions were automatically upgraded to the fixed release.\nThis issue impacts all Prisma Cloud Compute versions earlier than Prisma Cloud Compute 21.04.412." + "value": "An information exposure through log file vulnerability exists in the Palo Alto Networks Prisma Cloud Compute Console where a secret used to authorize the role of the authenticated user is logged to a debug log file. Authenticated Operator role and Auditor role users with access to the debug log files can use this secret to gain Administrator role access for their active session in Prisma Cloud Compute. Prisma Cloud Compute SaaS versions were automatically upgraded to the fixed release. This issue impacts all Prisma Cloud Compute versions earlier than Prisma Cloud Compute 21.04.412." } ] }, @@ -93,8 +93,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://security.paloaltonetworks.com/CVE-2021-3039" + "refsource": "MISC", + "url": "https://security.paloaltonetworks.com/CVE-2021-3039", + "name": "https://security.paloaltonetworks.com/CVE-2021-3039" } ] }, diff --git a/2021/3xxx/CVE-2021-3040.json b/2021/3xxx/CVE-2021-3040.json index 6c3d6b53523..fe21bd39530 100644 --- a/2021/3xxx/CVE-2021-3040.json +++ b/2021/3xxx/CVE-2021-3040.json @@ -54,7 +54,7 @@ "description_data": [ { "lang": "eng", - "value": "An unsafe deserialization vulnerability in Bridgecrew Checkov by Prisma Cloud allows arbitrary code execution when processing a malicious terraform file.\n\nThis issue impacts Checkov 2.0 versions earlier than Checkov 2.0.139.\n\nCheckov 1.0 versions are not impacted." + "value": "An unsafe deserialization vulnerability in Bridgecrew Checkov by Prisma Cloud allows arbitrary code execution when processing a malicious terraform file. This issue impacts Checkov 2.0 versions earlier than Checkov 2.0.139. Checkov 1.0 versions are not impacted." } ] }, @@ -98,8 +98,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://security.paloaltonetworks.com/CVE-2021-3040" + "refsource": "MISC", + "url": "https://security.paloaltonetworks.com/CVE-2021-3040", + "name": "https://security.paloaltonetworks.com/CVE-2021-3040" } ] }, diff --git a/2021/3xxx/CVE-2021-3041.json b/2021/3xxx/CVE-2021-3041.json index 4a697c98412..3691d09c1bf 100644 --- a/2021/3xxx/CVE-2021-3041.json +++ b/2021/3xxx/CVE-2021-3041.json @@ -69,7 +69,7 @@ "description_data": [ { "lang": "eng", - "value": "A local privilege escalation vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges.\n\nThis requires the user to have the privilege to create files in the Windows root directory or to manipulate key registry values.\nThis issue impacts:\nCortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.11;\nCortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.8;\nCortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.3;\nAll versions of Cortex XDR agent 7.2 without content update release 171 or a later version.\n" + "value": "A local privilege escalation vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory or to manipulate key registry values. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.11; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.8; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.3; All versions of Cortex XDR agent 7.2 without content update release 171 or a later version." } ] }, @@ -113,8 +113,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://security.paloaltonetworks.com/CVE-2021-3041" + "refsource": "MISC", + "url": "https://security.paloaltonetworks.com/CVE-2021-3041", + "name": "https://security.paloaltonetworks.com/CVE-2021-3041" } ] },