<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PAN Security Advisory (11-AUG-2021) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pan-security-advisory-11-aug-2021/m-p/426176#M94452</link>
    <description>&lt;P&gt;Thought I would just put this notice out since I know a lot of people don't actually subscribe to security advisories directly. If you haven't already, I highly recommend that you sign up for notifications via&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/&lt;/A&gt;&amp;nbsp;and the 'Subscribe' feature at the top right.&lt;/P&gt;&lt;P&gt;As a general statement, you should ensure that you are on a respective PAN-OS build that is free of any published vulnerabilities or have compensating controls in-place to protect your environment from vulnerabilities.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2021-3050: PAN-OS: Command Injection Vulnerability&amp;nbsp;in Web Interface.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;CVSS: 8.8&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;An&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;authenticated administrator&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;can execute arbitrary OS commands to escalate privileges.&amp;nbsp;&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Version&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Unaffected&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.1&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&amp;gt;= 10.1.2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.0&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&amp;gt;= 10.0.8&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.1&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.1.11&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.0&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.0.15&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2021-3046: PAN-OS: Improper SAML Authentication Vulnerability in GlobalProtect Portal&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;CVSS: 6.8&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;AN improper authentication vulnerability exists that enables a SAMB&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;authenticated&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;attacker to impersonate any other user in the GlobalProtect Portal and GlobalProtect Gateway when they are configured to use SAML authentication.&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Version&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Unaffected Version&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.1&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;10.1.* (not affected by Vuln)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.0&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&amp;gt;= 10.0.5&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.1&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.1.9&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.0&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.0.14&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 8.1&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 8.1.19&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2021-3048: PAN-OS: Invalid URLs in an EDL can lead to firewall outage&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;CVSS: 5.9&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Certain invalid URL entries contained in an EDL cause the devsrvr to stop responding. This condition causes subsequent commits to fail and prevents administrators from performing commits and configuration changes, however the firewall remains otherwise functional. If the firewall restarts, it results in a DoS condition and the firewall stops processing traffic.&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Version&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Unaffected&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.1&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;10.1.* (Not affected by vuln)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.0&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&amp;gt;= 10.0.5&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.1&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.1.9&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.0&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.0.14&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PAN-OS 8.1&lt;/TD&gt;&lt;TD&gt;8.1.* (Not affected by vuln)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2021-3045: PAN-OS: OS Command Argument Injection in Web Interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;CVSS: 4.9&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;An OS command injection vulnerability exists in the web interface that enables an&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;authenticated administrator&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;to read any arbitrary file from the file system.&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Version&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Unaffected&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.1&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;10.1.* (Not affected by vuln)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.0&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;10.0.* (Not affected by vuln)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.1&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.1.10&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.0&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.0.14&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="25px"&gt;PAN-OS 8.1&lt;/TD&gt;&lt;TD height="25px"&gt;&amp;gt;= 8.1.19&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2021-3047: PAN-OS: Weak Cryptography used in web interface authentication&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;CVSS: 4.2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;A cryptographically weak pseudo-random number generator is used during authentication to the web interface. This enables an&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;authenticated attacker,&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;with the capability to observe their own authentication secrets over a long duration on the PAN-OS appliance, to impersonate another authentication web interface administrator's session.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Version&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Unaffected&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.1&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;10.1.* (Not affected by vuln)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.0&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&amp;gt;= 10.0.4&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.1&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.1.10&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.0&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.0.14&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 8.1&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 8.1.19&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2021-26701: XSOAR: Impact of PowerShell Vulnerability CVE-2021-26701&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;CVSS: 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;XSOAR maintains docker images with PowerShell available for customers to use. The base image was updated on May 19,2021 with PowerShell version 7.1.3. PAN urges customers to upgrade their docker images to a version with the tag 7.1.3 or higher to protect against PowerShell vulnerability CVE-2021-26701.&lt;/P&gt;</description>
    <pubDate>Wed, 11 Aug 2021 17:34:12 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2021-08-11T17:34:12Z</dc:date>
    <item>
      <title>PAN Security Advisory (11-AUG-2021)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-security-advisory-11-aug-2021/m-p/426176#M94452</link>
      <description>&lt;P&gt;Thought I would just put this notice out since I know a lot of people don't actually subscribe to security advisories directly. If you haven't already, I highly recommend that you sign up for notifications via&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/&lt;/A&gt;&amp;nbsp;and the 'Subscribe' feature at the top right.&lt;/P&gt;&lt;P&gt;As a general statement, you should ensure that you are on a respective PAN-OS build that is free of any published vulnerabilities or have compensating controls in-place to protect your environment from vulnerabilities.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2021-3050: PAN-OS: Command Injection Vulnerability&amp;nbsp;in Web Interface.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;CVSS: 8.8&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;An&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;authenticated administrator&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;can execute arbitrary OS commands to escalate privileges.&amp;nbsp;&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Version&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Unaffected&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.1&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&amp;gt;= 10.1.2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.0&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&amp;gt;= 10.0.8&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.1&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.1.11&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.0&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.0.15&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2021-3046: PAN-OS: Improper SAML Authentication Vulnerability in GlobalProtect Portal&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;CVSS: 6.8&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;AN improper authentication vulnerability exists that enables a SAMB&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;authenticated&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;attacker to impersonate any other user in the GlobalProtect Portal and GlobalProtect Gateway when they are configured to use SAML authentication.&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Version&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Unaffected Version&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.1&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;10.1.* (not affected by Vuln)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.0&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&amp;gt;= 10.0.5&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.1&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.1.9&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.0&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.0.14&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 8.1&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 8.1.19&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2021-3048: PAN-OS: Invalid URLs in an EDL can lead to firewall outage&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;CVSS: 5.9&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Certain invalid URL entries contained in an EDL cause the devsrvr to stop responding. This condition causes subsequent commits to fail and prevents administrators from performing commits and configuration changes, however the firewall remains otherwise functional. If the firewall restarts, it results in a DoS condition and the firewall stops processing traffic.&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Version&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Unaffected&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.1&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;10.1.* (Not affected by vuln)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.0&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&amp;gt;= 10.0.5&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.1&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.1.9&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.0&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.0.14&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;PAN-OS 8.1&lt;/TD&gt;&lt;TD&gt;8.1.* (Not affected by vuln)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2021-3045: PAN-OS: OS Command Argument Injection in Web Interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;CVSS: 4.9&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;An OS command injection vulnerability exists in the web interface that enables an&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;authenticated administrator&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;to read any arbitrary file from the file system.&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Version&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Unaffected&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.1&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;10.1.* (Not affected by vuln)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.0&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;10.0.* (Not affected by vuln)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.1&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.1.10&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.0&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.0.14&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="25px"&gt;PAN-OS 8.1&lt;/TD&gt;&lt;TD height="25px"&gt;&amp;gt;= 8.1.19&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2021-3047: PAN-OS: Weak Cryptography used in web interface authentication&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;CVSS: 4.2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;A cryptographically weak pseudo-random number generator is used during authentication to the web interface. This enables an&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;authenticated attacker,&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;with the capability to observe their own authentication secrets over a long duration on the PAN-OS appliance, to impersonate another authentication web interface administrator's session.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Version&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&lt;STRONG&gt;Unaffected&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.1&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;10.1.* (Not affected by vuln)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="50%" height="30px"&gt;PAN-OS 10.0&lt;/TD&gt;&lt;TD width="50%" height="30px"&gt;&amp;gt;= 10.0.4&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.1&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.1.10&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 9.0&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 9.0.14&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD height="30px"&gt;PAN-OS 8.1&lt;/TD&gt;&lt;TD height="30px"&gt;&amp;gt;= 8.1.19&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CVE-2021-26701: XSOAR: Impact of PowerShell Vulnerability CVE-2021-26701&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;CVSS: 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;XSOAR maintains docker images with PowerShell available for customers to use. The base image was updated on May 19,2021 with PowerShell version 7.1.3. PAN urges customers to upgrade their docker images to a version with the tag 7.1.3 or higher to protect against PowerShell vulnerability CVE-2021-26701.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 17:34:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-security-advisory-11-aug-2021/m-p/426176#M94452</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-08-11T17:34:12Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Security Advisory (11-AUG-2021)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-security-advisory-11-aug-2021/m-p/426444#M94493</link>
      <description>&lt;P&gt;Great info ! Thanks for the heads up &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;!&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 12 Aug 2021 09:34:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-security-advisory-11-aug-2021/m-p/426444#M94493</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2021-08-12T09:34:27Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Security Advisory (11-AUG-2021)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-security-advisory-11-aug-2021/m-p/426630#M94515</link>
      <description>&lt;P&gt;Hi, the versions with the fix for&amp;nbsp;CVE-2021-3050 (9.0.15, 9.1.11, 10.0.8, 10.1.2) do not appear to be available yet, any idea if they will be released soon?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Aug 2021 23:30:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-security-advisory-11-aug-2021/m-p/426630#M94515</guid>
      <dc:creator>Pzilla</dc:creator>
      <dc:date>2021-08-12T23:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Security Advisory (11-AUG-2021)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-security-advisory-11-aug-2021/m-p/426632#M94516</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/114902"&gt;@Pzilla&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I didn’t include it in my summary, but PAN actually includes guidance in the official advisory. They intend to have it available in September.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We intend to fix this issue in PAN-OS 9.0.15 (ETA November 2021), PAN-OS 9.1.11 (ETA September 2021), PAN-OS 10.0.8 (ETA September 2021), PAN-OS 10.1.2 (ETA September 2021) and all later PAN-OS versions.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Aug 2021 23:59:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-security-advisory-11-aug-2021/m-p/426632#M94516</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-08-12T23:59:11Z</dc:date>
    </item>
  </channel>
</rss>

