Vulnerability Name:

CVE-2021-3062 (CCN-213258)

Assigned:2021-11-10
Published:2021-11-10
Updated:2022-07-25
Summary:An improper access control vulnerability in PAN-OS software enables an attacker with authenticated access to GlobalProtect portals and gateways to connect to the EC2 instance metadata endpoint for VM-Series firewalls hosted on Amazon AWS. Exploitation of this vulnerability enables an attacker to perform any operations allowed by the EC2 role in AWS. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20 VM-Series firewalls; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11 VM-Series firewalls; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14 VM-Series firewalls; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8 VM-Series firewalls. Prisma Access customers are not impacted by this issue.
CVSS v3 Severity:8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
8.1 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)
7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:6.0 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
8.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2021-3062

Source: XF
Type: UNKNOWN
paloalto-cve20213062-sec-bypass(213258)

Source: CCN
Type: Palo Alto Networks Security Advisories
CVE-2021-3062 PAN-OS: Improper Access Control Vulnerability Exposing AWS Instance Metadata Endpoint to GlobalProtect Users

Source: CONFIRM
Type: Vendor Advisory
N/A

Vulnerable Configuration:Configuration 1:
  • cpe:/o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* (Version >= 9.0.0 and < 9.0.14)
  • OR cpe:/o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* (Version >= 10.0.0 and < 10.0.8)
  • OR cpe:/o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* (Version >= 9.1.0 and < 9.1.11)
  • OR cpe:/o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* (Version >= 8.1.0 and < 8.1.20)
  • AND
  • cpe:/a:paloaltonetworks:vm-series_firewall:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:paloaltonetworks:pan-os:9.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:9.1.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    paloaltonetworks pan-os *
    paloaltonetworks pan-os *
    paloaltonetworks pan-os *
    paloaltonetworks pan-os *
    paloaltonetworks vm-series firewall -
    paloaltonetworks pan-os 9.0.0
    paloaltonetworks pan-os 9.1.0