Lucene search

K
paloaltoPalo Alto Networks Product Security Incident Response TeamPA-CVE-2020-10188
HistorySep 08, 2021 - 4:00 p.m.

PAN-OS: Impact of Telnet Remote-Code-Execution (RCE) Vulnerability (CVE-2020-10188)

2021-09-0816:00:00
Palo Alto Networks Product Security Incident Response Team
securityadvisories.paloaltonetworks.com
33

0.833 High

EPSS

Percentile

98.4%

A buffer overflow vulnerability in the Telnet-based administrative management service included with PAN-OS software allows remote attackers to execute arbitrary code.

The Telnet-based administrative management service is disabled by default and this issue is not exploitable if this service is disabled.

This issue does not impact SSH or HTTPS management interfaces. This issue does not affect Prisma Access.

Work around:
Disabling the Telnet-based administrative management service completely eliminates risks of exploitation of this issue.

This issue requires the attacker to have network access to the PAN-OS Telnet interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS web interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at https://docs.paloaltonetworks.com/best-practices.

If the Telnet-based administrative management service is required and you cannot immediately upgrade your PAN-OS software, enable signatures for Unique Threat ID 59125 on traffic destined for the Telnet interface to block attacks against CVE-2020-10188.