Enhanced Security Measures in Place:   To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.

0day padding oracle exploit on PAN-OS master key decryption?

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Palo Alto Networks Approved
Palo Alto Networks Approved
Community Expert Verified
Community Expert Verified

0day padding oracle exploit on PAN-OS master key decryption?

L2 Linker

Ran across this and am wondering if this is truly a new 0 Day or related to a previous RCE from a little while back regarding the default Master Key?  https://twitter.com/rqu50/status/1554566757704089600  There is proof of concept code for this.

1 REPLY 1

Community Team Member

Hi @KurtHinson ,

 

Thanks for bringing this to the LiveCommunity's attention. I would also recommend bringing this up with your SE to raise more awareness towards the ability of this code to determine whether or not a default master key is being used. It does not look like an immediate risk for RCE, but for best practice please modify the master key prior to deploying firewalls in your environment.

LIVEcommunity team member
Stay Secure,
Jay
Don't forget to Like items if a post is helpful to you!

Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.
  • 1829 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!