Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-3054


A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permission to upload plugins to execute arbitrary code with root user privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11; PAN-OS 10.0 versions earlier than PAN-OS 10.0.7; PAN-OS 10.1 versions earlier than PAN-OS 10.1.2. This issue does not affect Prisma Access.


Published

2021-09-08T17:15:12.250

Last Modified

2024-11-21T06:20:51.640

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.2 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:S/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

6.8

Impact Score

10.0

Weaknesses
  • Type: Secondary
    CWE-367
  • Type: Primary
    CWE-367

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System paloaltonetworks pan-os < 8.1.20 Yes
Operating System paloaltonetworks pan-os < 9.0.14 Yes
Operating System paloaltonetworks pan-os < 9.1.11 Yes
Operating System paloaltonetworks pan-os < 10.0.7 Yes
Operating System paloaltonetworks pan-os < 10.1.2 Yes

References