Vulnerability Name:

CVE-2019-1581 (CCN-165871)

Assigned:2018-12-06
Published:2019-08-21
Updated:2019-12-05
Summary:A remote code execution vulnerability in the PAN-OS SSH device management interface that can lead to unauthenticated remote users with network access to the SSH management interface gaining root access to PAN-OS. This issue affects PAN-OS 7.1 versions prior to 7.1.24-h1, 7.1.25; 8.0 versions prior to 8.0.19-h1, 8.0.20; 8.1 versions prior to 8.1.9-h4, 8.1.10; 9.0 versions prior to 9.0.3-h3, 9.0.4.
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-20
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2019-1581

Source: XF
Type: UNKNOWN
paloalto-panos-cve20191581-sec-bypass(165871)

Source: CONFIRM
Type: UNKNOWN
https://security.paloaltonetworks.com/CVE-2019-1581

Source: CCN
Type: PAN-SA-2019-0022
Mitigation Bypass in PAN-OS

Vulnerable Configuration:Configuration 1:
  • cpe:/o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* (Version <= 7.1.24)
  • OR cpe:/o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* (Version >= 8.0.0 and <= 8.0.19)
  • OR cpe:/o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* (Version >= 8.1.0 and <= 8.1.9)
  • OR cpe:/o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* (Version >= 9.0.0 and <= 9.0.3)

  • Configuration CCN 1:
  • cpe:/o:paloaltonetworks:pan-os:7.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.4:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.5:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.7:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.8:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.10:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.11:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:6.1.18:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.13:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.5:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.12:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.9:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.16:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:6.1.21:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.18:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.11:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.1.3:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.21:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.14:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.1.5:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.22:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.15:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.1.6:-:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:9.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:9.0.2:-:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.18:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.1.8:h4:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:9.0.2:h4:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.3:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.6:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.9:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.14:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.15:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.17:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.19:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.20:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.23:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:7.1.24:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.4:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.6:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.7:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.8:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.10:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.12:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.11:h1:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.13:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.16:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.17:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.19:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.3:h4:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.4:h2:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.0.6:h3:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.1.0:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.1.4:-:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.1.4:h2:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.1.6:h2:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.1.7:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.1.8:-:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.1.9:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:9.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:9.0.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    paloaltonetworks pan-os *
    paloaltonetworks pan-os *
    paloaltonetworks pan-os *
    paloaltonetworks pan-os *
    paloaltonetworks pan-os 7.1.1
    paloaltonetworks pan-os 7.1.4
    paloaltonetworks pan-os 7.1.5
    paloaltonetworks pan-os 7.1.7
    paloaltonetworks pan-os 7.1.8
    paloaltonetworks pan-os 8.0.1
    paloaltonetworks pan-os 7.1.10
    paloaltonetworks pan-os 8.0.2
    paloaltonetworks pan-os 7.1.11
    paloaltonetworks pan-os 6.1.18
    paloaltonetworks pan-os 7.1.13
    paloaltonetworks pan-os 8.0.5
    paloaltonetworks pan-os 7.1.12
    paloaltonetworks pan-os 8.0
    paloaltonetworks pan-os 8.1.1
    paloaltonetworks pan-os 8.0.9
    paloaltonetworks pan-os 7.1.16
    paloaltonetworks pan-os 8.1.2
    paloaltonetworks pan-os 6.1.21
    paloaltonetworks pan-os 7.1.18
    paloaltonetworks pan-os 8.0.11
    paloaltonetworks pan-os 8.1.3
    paloaltonetworks pan-os 7.1.21
    paloaltonetworks pan-os 8.0.14
    paloaltonetworks pan-os 8.1.5
    paloaltonetworks pan-os 7.1.22
    paloaltonetworks pan-os 8.0.15
    paloaltonetworks pan-os 8.1.6 -
    paloaltonetworks pan-os 9.0.0
    paloaltonetworks pan-os 9.0.2 -
    paloaltonetworks pan-os 8.0.18
    paloaltonetworks pan-os 8.1.8 h4
    paloaltonetworks pan-os 9.0.2 h4
    paloaltonetworks pan-os 7.1.2
    paloaltonetworks pan-os 7.1.3
    paloaltonetworks pan-os 7.1.6
    paloaltonetworks pan-os 7.1.9
    paloaltonetworks pan-os 7.1.14
    paloaltonetworks pan-os 7.1.15
    paloaltonetworks pan-os 7.1.17
    paloaltonetworks pan-os 7.1.19
    paloaltonetworks pan-os 7.1.20
    paloaltonetworks pan-os 7.1.23
    paloaltonetworks pan-os 7.1.24
    paloaltonetworks pan-os 8.0.3
    paloaltonetworks pan-os 8.0.4
    paloaltonetworks pan-os 8.0.6
    paloaltonetworks pan-os 8.0.7
    paloaltonetworks pan-os 8.0.8
    paloaltonetworks pan-os 8.0.10
    paloaltonetworks pan-os 8.0.12
    paloaltonetworks pan-os 8.0.11 h1
    paloaltonetworks pan-os 8.0.13
    paloaltonetworks pan-os 8.0.16
    paloaltonetworks pan-os 8.0.17
    paloaltonetworks pan-os 8.0.19
    paloaltonetworks pan-os 8.0.3 h4
    paloaltonetworks pan-os 8.0.4 h2
    paloaltonetworks pan-os 8.0.6 h3
    paloaltonetworks pan-os 8.1.0
    paloaltonetworks pan-os 8.1.4 -
    paloaltonetworks pan-os 8.1.4 h2
    paloaltonetworks pan-os 8.1.6 h2
    paloaltonetworks pan-os 8.1.7
    paloaltonetworks pan-os 8.1.8 -
    paloaltonetworks pan-os 8.1.9
    paloaltonetworks pan-os 9.0.1
    paloaltonetworks pan-os 9.0.3