A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permission to upload plugins to execute arbitrary code with root user privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11; PAN-OS 10.0 versions earlier than PAN-OS 10.0.7; PAN-OS 10.1 versions earlier than PAN-OS 10.1.2. This issue does not affect Prisma Access.
The product checks the state of a resource before using that resource, but the resource’s state can change between the check and the use in a way that invalidates the results of the check. This can cause the product to perform invalid actions when the resource is in an unexpected state.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pan-os | Paloaltonetworks | 8.1.0 (including) | 8.1.20 (excluding) |
Pan-os | Paloaltonetworks | 9.0.0 (including) | 9.0.14 (excluding) |
Pan-os | Paloaltonetworks | 9.1.0 (including) | 9.1.11 (excluding) |
Pan-os | Paloaltonetworks | 10.0.0 (including) | 10.0.7 (excluding) |
Pan-os | Paloaltonetworks | 10.1.0 (including) | 10.1.2 (excluding) |