An improper authentication check in Palo Alto Networks PAN-OS may allow an authenticated low privileged non-superuser custom role user to elevate privileges and become superuser. This issue affects PAN-OS 7.1 versions prior to 7.1.25; 8.0 versions prior to 8.0.20; 8.1 versions prior to 8.1.11; 9.0 versions prior to 9.0.5. PAN-OS version 7.0 and prior EOL versions have not been evaluated for this issue.
The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the product in an invalid state.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pan-os | Paloaltonetworks | 7.1.0 (including) | 7.1.25 (excluding) |
Pan-os | Paloaltonetworks | 8.0.0 (including) | 8.0.20 (excluding) |
Pan-os | Paloaltonetworks | 8.1.0 (including) | 8.1.11 (excluding) |
Pan-os | Paloaltonetworks | 9.0.0 (including) | 9.0.5 (excluding) |