{"id":14889,"date":"2020-06-30T10:25:24","date_gmt":"2020-06-30T08:25:24","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=14889"},"modified":"2020-06-30T10:25:24","modified_gmt":"2020-06-30T08:25:24","slug":"cve-2020-2021-in-palo-alto-networks-gerten-patchen","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/06\/30\/cve-2020-2021-in-palo-alto-networks-gerten-patchen\/","title":{"rendered":"Alert: Patch CVE-2020-2021 (in Palo Alto Networks products)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/06\/30\/cve-2020-2021-in-palo-alto-networks-gerten-patchen\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]Warning about the SAML vulnerability CVE-2020-2021 in various devices from the vendor Palo Alto and similar products. It can be assumed that the vulnerability will soon be exploited by cyber criminals to penetrate networks. <\/p>\n<p><!--more--><\/p>\n<h3>CVE-2020-2021 PAN-OS: Authentication Bypass in SAML Authentication<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg07.met.vgwort.de\/na\/33ce5912d2864907a39eb24a959cb445\" width=\"1\" height=\"1\">The vulnerability <a href=\"https:\/\/security.paloaltonetworks.com\/CVE-2020-2021\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-2021<\/a> (Authentication Bypass in SAML Authentication) exists in various Palo Alto Networks (PAN) products in their PAN-OS operating system. If SAML authentication (Security Assertion Markup Language) is enabled and the 'Validate Identity Provider Certificate' option is disabled (unchecked), improper signature verification during PAN-OS SAML authentication allows an unauthenticated network-based attacker to access protected resources. <\/p>\n<p>The attacker must have network access to the vulnerable server to exploit this vulnerability. This issue cannot be exploited if SAML is not used for authentication. This issue affects PAN-OS 9.1 versions prior to PAN-OS 9.1.3; PAN-OS 9.0 versions prior to PAN-OS 9.0.9; PAN-OS 8.1 versions prior to PAN-OS 8.1.15 and all versions of PAN-OS 8.0 (EOL). This problem does not affect PAN-OS 7.1.<\/p>\n<h2>Affected systems<\/h2>\n<p>Resources that can be protected by SAML-based Single Sign-On (SSO) authentication are, according to Palo Alto Networks:<\/p>\n<p>GlobalProtect Gateway,<br \/>GlobalProtect Portal,<br \/>GlobalProtect Clientless VPN,<br \/>Authentication and Captive Portal,<br \/>PAN-OS next-generation firewalls (PA-Series, VM-Series) and Panorama web interfaces,<br \/>Prisma Access<\/p>\n<p>In the case of GlobalProtect Gateways, GlobalProtect Portal, Clientless VPN, Captive Portal, and Prisma Access, an unauthenticated attacker with network access to the affected servers can gain access to protected resources if allowed by configured authentication and Security policies. <\/p>\n<p>There is no impact on the integrity and availability of the gateway, portal, or VPN server. An attacker cannot inspect or tamper with sessions of regular users. In the worst case, this is a critical severity vulnerability with a CVSS Base Score of 10.0 (CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:C\/C:H\/I:H\/A:N).<\/p>\n<p>In the case of PAN-OS and Panorama web interfaces, this issue allows an unauthenticated attacker with network access to the PAN-OS or Panorama web interfaces to log on as administrator and perform administrative actions. <\/p>\n<ul>\n<li>The worst case scenario is a vulnerability of critical severity with a CVSS Base Score of 10.0 (CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:C\/C:H\/I:H\/A:H).\n<p>If the web interfaces are only accessible to a restricted management network, the vulnerability is reduced to a CVSS base score of 9.6 (CVSS:3.1\/AV:A\/AC:L\/PR:N\/UI:N\/S:C\/C:H\/I:H\/A:H).<\/p>\n<\/li>\n<\/ul>\n<p>Palo Alto Networks has no known malicious attempts to exploit this vulnerability.<\/p>\n<h2>Alarm from security researchers<\/h2>\n<p>I came across the following tweet a few hours ago where it is strongly recommended that administrators patch their devices to close the vulnerability.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Yes, part of the reason the Palo-Alto vulnerability is bad is disabling cert verification is common in enterprises, as is using SAML. <a href=\"https:\/\/t.co\/W8BZ8JxtZu\">https:\/\/t.co\/W8BZ8JxtZu<\/a><\/p>\n<p>\u2014 Kevin Beaumont (@GossiTheDog) <a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1277690848147374081?ref_src=twsrc%5Etfw\">June 29, 2020<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/p>\n<p>Security researchers assume that the vulnerability will soon be exploited by cyber criminals to access internal networks<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Warning about the SAML vulnerability CVE-2020-2021 in various devices from the vendor Palo Alto and similar products. It can be assumed that the vulnerability will soon be exploited by cyber criminals to penetrate networks.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[448,580,1547],"tags":[701,69,1544],"class_list":["post-14889","post","type-post","status-publish","format-standard","hentry","category-devices","category-security","category-software","tag-device","tag-security","tag-software"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/14889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=14889"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/14889\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=14889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=14889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=14889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}