<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Palo Alto Networks Security Advisories [30-August-2017] in PSIRT Articles</title>
    <link>https://live.paloaltonetworks.com/t5/psirt-articles/palo-alto-networks-security-advisories-30-august-2017/ta-p/174015</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;&lt;P&gt;With the release of PAN-OS 7.1.12 Palo Alto Networks has published 2 new and 1 updated Security Advisory addressing 3 security issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;New Security Advisories&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0023 -&amp;nbsp;&lt;SPAN&gt;Cross-Site Scripting in PAN-OS&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;A vulnerability exists in PAN-OS’s GlobalProtect internal and external gateway interface,&amp;nbsp;&lt;/SPAN&gt;that could allow for a cross-site scripting (XSS) attack. PAN-OS does not properly validate specific request parameters.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Medium Severity&lt;/LI&gt;
&lt;LI&gt;Fixed in PAN-OS 6.1.18, PAN-OS 7.0.17, PAN-OS 7.1.12 and PAN-OS 8.0.3&lt;/LI&gt;
&lt;LI&gt;CVE-2017-12416&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0024 -&amp;nbsp;XML External Entity (XXE) in PAN-OS&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;A vulnerability exists in PAN-OS’s GlobalProtect internal and external gateway interface,&lt;/SPAN&gt;&amp;nbsp;that could allow for XML External Entity (XXE) attack. PAN-OS does not properly parse XML input.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;High Severity&lt;/LI&gt;
&lt;LI&gt;Fixed in PAN-OS 6.1.18, PAN-OS 7.0.17, PAN-OS 7.1.12 and PAN-OS 8.0.3&lt;/LI&gt;
&lt;LI&gt;CVE-2017-9458&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Updated Security Advisory&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0022 - NTP Vulnerability&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The Network Time Protocol (NTP) library has been found to contain a&amp;nbsp;vulnerability CVE-2017-6460. Palo Alto Networks software makes use of the vulnerable library and may be affected. This issue only affects the management plane of the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Low Severity&lt;/LI&gt;
&lt;LI&gt;Fixed&amp;nbsp;in&amp;nbsp;PAN-OS 7.1.12 and PAN-OS 8.0.4&lt;/LI&gt;
&lt;LI&gt;Fixes for 6.1 and 7.0 will be released on a future date&lt;/LI&gt;
&lt;LI&gt;CVE-2017-6460&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Details of the issues, affected versions, and any mitigation information can be found in the Security Advisory.  &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please visit our Security Advisories website to learn more at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://securityadvisories.paloaltonetworks.com/%E2%80%A8%E2%80%A8" target="_self" rel="nofollow noopener noreferrer"&gt;https://securityadvisories.paloaltonetworks.com/  &lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have questions, please contact support&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/company/contact-support" target="_self" rel="nofollow noopener noreferrer"&gt;https://www.paloaltonetworks.com/company/contact-support&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;  Regards &lt;/P&gt;
&lt;P&gt;Product Security Incident Response Team&lt;BR /&gt;Palo Alto Networks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Updated August-31-2017 -&amp;nbsp;&lt;/STRONG&gt;Security Advisories updated to clarify that both the Internal and external interfaces of GlobalProtect are affected by issues listed in PAN-SA-2017-0023 and PAN-SA-2017-0024&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 31 Aug 2017 23:11:12 GMT</pubDate>
    <dc:creator>kshorrock</dc:creator>
    <dc:date>2017-08-31T23:11:12Z</dc:date>
    <item>
      <title>Palo Alto Networks Security Advisories [30-August-2017]</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/palo-alto-networks-security-advisories-30-august-2017/ta-p/174015</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;&lt;P&gt;With the release of PAN-OS 7.1.12 Palo Alto Networks has published 2 new and 1 updated Security Advisory addressing 3 security issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;New Security Advisories&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0023 -&amp;nbsp;&lt;SPAN&gt;Cross-Site Scripting in PAN-OS&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;A vulnerability exists in PAN-OS’s GlobalProtect internal and external gateway interface,&amp;nbsp;&lt;/SPAN&gt;that could allow for a cross-site scripting (XSS) attack. PAN-OS does not properly validate specific request parameters.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Medium Severity&lt;/LI&gt;
&lt;LI&gt;Fixed in PAN-OS 6.1.18, PAN-OS 7.0.17, PAN-OS 7.1.12 and PAN-OS 8.0.3&lt;/LI&gt;
&lt;LI&gt;CVE-2017-12416&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0024 -&amp;nbsp;XML External Entity (XXE) in PAN-OS&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;A vulnerability exists in PAN-OS’s GlobalProtect internal and external gateway interface,&lt;/SPAN&gt;&amp;nbsp;that could allow for XML External Entity (XXE) attack. PAN-OS does not properly parse XML input.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;High Severity&lt;/LI&gt;
&lt;LI&gt;Fixed in PAN-OS 6.1.18, PAN-OS 7.0.17, PAN-OS 7.1.12 and PAN-OS 8.0.3&lt;/LI&gt;
&lt;LI&gt;CVE-2017-9458&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Updated Security Advisory&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;PAN-SA-2017-0022 - NTP Vulnerability&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The Network Time Protocol (NTP) library has been found to contain a&amp;nbsp;vulnerability CVE-2017-6460. Palo Alto Networks software makes use of the vulnerable library and may be affected. This issue only affects the management plane of the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Low Severity&lt;/LI&gt;
&lt;LI&gt;Fixed&amp;nbsp;in&amp;nbsp;PAN-OS 7.1.12 and PAN-OS 8.0.4&lt;/LI&gt;
&lt;LI&gt;Fixes for 6.1 and 7.0 will be released on a future date&lt;/LI&gt;
&lt;LI&gt;CVE-2017-6460&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Details of the issues, affected versions, and any mitigation information can be found in the Security Advisory.  &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please visit our Security Advisories website to learn more at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://securityadvisories.paloaltonetworks.com/%E2%80%A8%E2%80%A8" target="_self" rel="nofollow noopener noreferrer"&gt;https://securityadvisories.paloaltonetworks.com/  &lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have questions, please contact support&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/company/contact-support" target="_self" rel="nofollow noopener noreferrer"&gt;https://www.paloaltonetworks.com/company/contact-support&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;  Regards &lt;/P&gt;
&lt;P&gt;Product Security Incident Response Team&lt;BR /&gt;Palo Alto Networks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Updated August-31-2017 -&amp;nbsp;&lt;/STRONG&gt;Security Advisories updated to clarify that both the Internal and external interfaces of GlobalProtect are affected by issues listed in PAN-SA-2017-0023 and PAN-SA-2017-0024&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 31 Aug 2017 23:11:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/palo-alto-networks-security-advisories-30-august-2017/ta-p/174015</guid>
      <dc:creator>kshorrock</dc:creator>
      <dc:date>2017-08-31T23:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Networks Security Advisories [30-August-2017]</title>
      <link>https://live.paloaltonetworks.com/t5/psirt-articles/palo-alto-networks-security-advisories-30-august-2017/tac-p/174176#M46</link>
      <description>&lt;P&gt;Does disabling the login page for the Global Protect Portal mitigate this vulnerability? &amp;nbsp;Does these global protect related vulnerabilities affect both the Gateway and Portal?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 31 Aug 2017 15:30:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/psirt-articles/palo-alto-networks-security-advisories-30-august-2017/tac-p/174176#M46</guid>
      <dc:creator>stmark</dc:creator>
      <dc:date>2017-08-31T15:30:57Z</dc:date>
    </item>
  </channel>
</rss>

