<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PAN OS vulnerability in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-vulnerability/m-p/357501#M87776</link>
    <description>&lt;P&gt;I have a Palo Alto (PA-5220) HA pair with software running (SW: 9.0.9-h1, Global-protect version: 5.1.3). I found below vulnerabilities are affecting the current PAN OS. I am planning to upgrade it. Could you please suggest the best recommended software with Global protect version for my firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Model:&amp;nbsp;&amp;nbsp;PA-5220&lt;/P&gt;&lt;P&gt;Software Version:&amp;nbsp;SW: 9.0.9-h1,&amp;nbsp;global-protect-client-package-version: 5.1.3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Vulnerabilities affecting the current PAN OS:&amp;nbsp;&lt;/P&gt;&lt;P&gt;---------------------------------------------------------&lt;/P&gt;&lt;P&gt;CVE-2020-2037 PAN-OS: OS command injection vulnerability in the management web interface&lt;/P&gt;&lt;P&gt;CVE-2020-2039 PAN-OS: Management web interface denial-of-service (DoS) through unauthenticated file upload&lt;/P&gt;&lt;P&gt;CVE-2020-2043 PAN-OS: Passwords may be logged in clear text when using after-change-detail custom syslog field for config logs&lt;/P&gt;&lt;P&gt;CVE-2020-2044 PAN-OS: Passwords may be logged in clear text while storing operational command (op command) history&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Manu&lt;/P&gt;</description>
    <pubDate>Tue, 20 Oct 2020 16:31:36 GMT</pubDate>
    <dc:creator>Manu_Shankar</dc:creator>
    <dc:date>2020-10-20T16:31:36Z</dc:date>
    <item>
      <title>PAN OS vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-vulnerability/m-p/357501#M87776</link>
      <description>&lt;P&gt;I have a Palo Alto (PA-5220) HA pair with software running (SW: 9.0.9-h1, Global-protect version: 5.1.3). I found below vulnerabilities are affecting the current PAN OS. I am planning to upgrade it. Could you please suggest the best recommended software with Global protect version for my firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Model:&amp;nbsp;&amp;nbsp;PA-5220&lt;/P&gt;&lt;P&gt;Software Version:&amp;nbsp;SW: 9.0.9-h1,&amp;nbsp;global-protect-client-package-version: 5.1.3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Vulnerabilities affecting the current PAN OS:&amp;nbsp;&lt;/P&gt;&lt;P&gt;---------------------------------------------------------&lt;/P&gt;&lt;P&gt;CVE-2020-2037 PAN-OS: OS command injection vulnerability in the management web interface&lt;/P&gt;&lt;P&gt;CVE-2020-2039 PAN-OS: Management web interface denial-of-service (DoS) through unauthenticated file upload&lt;/P&gt;&lt;P&gt;CVE-2020-2043 PAN-OS: Passwords may be logged in clear text when using after-change-detail custom syslog field for config logs&lt;/P&gt;&lt;P&gt;CVE-2020-2044 PAN-OS: Passwords may be logged in clear text while storing operational command (op command) history&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Manu&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2020 16:31:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-os-vulnerability/m-p/357501#M87776</guid>
      <dc:creator>Manu_Shankar</dc:creator>
      <dc:date>2020-10-20T16:31:36Z</dc:date>
    </item>
    <item>
      <title>Re: PAN OS vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-os-vulnerability/m-p/357722#M87801</link>
      <description>&lt;P&gt;Recommended release on 9.0 is 9.0.10:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304" target="_blank"&gt;https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 12:27:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-os-vulnerability/m-p/357722#M87801</guid>
      <dc:creator>erikda</dc:creator>
      <dc:date>2020-10-21T12:27:34Z</dc:date>
    </item>
  </channel>
</rss>

