René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

242 lines
9.4 KiB
JSON

{
"id": "CVE-2017-7945",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-04-29T00:59:00.197",
"lastModified": "2020-02-17T16:15:22.443",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The GlobalProtect external interface in Palo Alto Networks PAN-OS before 6.1.17, 7.x before 7.0.15, 7.1.x before 7.1.9, and 8.x before 8.0.2 provides different error messages for failed login attempts depending on whether the username exists, which allows remote attackers to enumerate account names and conduct brute-force attacks via a series of requests, aka PAN-SA-2017-0014 and PAN-72769."
},
{
"lang": "es",
"value": "La interfaz externa de GlobalProtect en PAN-OS de Palo Alto Networks en versiones anteriores a 6.1.17, en versiones 7.x, anteriores a 7.0.15, en versiones 7.1.x anteriores a 7.1.9, y versiones 8.x anteriores a 8.0.2 proporciona diferentes mensajes de error para los intentos fallidos de inicio de sesi\u00f3n dependiendo de si el nombre de usuario existe, lo que permite a los atacantes remotos enumerar nombres de cuentas y realizar ataques de fuerza bruta a trav\u00e9s de una serie de solicitudes. Esta vulnerabilidad tambi\u00e9n es conocida como PAN-SA-2017-0014 y PAN-72769."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": true,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.1.15",
"matchCriteriaId": "E21D41C6-2ED7-46E1-A75D-62A9D8A671FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "624F100E-2163-4B32-8F9A-02CB98A54F8B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4EE577FC-15FF-4E57-8257-DCDFFB2A9985"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6BCC7DB4-24B3-4F4A-86C5-B9D59E891E2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC541C0-0BB9-4011-A3B8-DDCD00A324F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D8F8C2BE-21DE-49FE-A58F-97158657EF24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BDB6D0AB-5364-432A-8F7A-9DB53E1BF5D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.5:h2:*:*:*:*:*:*",
"matchCriteriaId": "DB55A087-CFA7-45F3-8FEF-9A37804073A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0BEEBF0F-FBB2-43B7-9F56-0FBF2DADCA2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "831890DD-6702-4AA1-9F20-B0E22B06043A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "448EC192-C6FD-4E97-AE26-51001986E7FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A02BEFED-A8AB-4A51-8E01-69123C20F9FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "59E29A65-120E-4FB6-B54B-8E86B52CED05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "C9A95E6A-CD9A-473B-A6DC-AE2E48684A02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F9C19ADE-22F7-42D0-A6FD-81EDB334B484"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "E8AAF08A-5478-4942-8CC0-0F267F464684"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "033CDBB8-59A7-44BA-B28C-57A91CCD0B83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "685DCF3A-39BD-4C38-9DC4-2AF715BB65AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "94C08178-C348-4B87-B951-27BA9102E60C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DEFDAAE0-7A3B-4B9A-BC2A-AE5E8BCAE406"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "32839A0C-6229-430C-88A7-9E0ECC9F49CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A695BB-D919-4025-B5C3-7BFDF4D602F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.4:h2:*:*:*:*:*:*",
"matchCriteriaId": "EEA3E4BA-6127-4864-BFD8-6A14BA99BD3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5D0EB9B8-42D6-4011-81E6-90E3A9773D9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7F9B6C6A-4FF5-4807-AC02-F9E5526C4B28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AE7CE914-E21C-4850-96D8-A5C31C32C065"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7B7D2AA1-7381-436E-A080-87867C681DF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:8.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A47526-2888-49CC-895F-F7361A35C45C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:8.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2A5715D2-8821-4704-B977-D3550E94DFCD"
}
]
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2017-7945",
"source": "cve@mitre.org"
}
]
}