Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-1978— VM-Series on Microsoft Azure: Inadvertent collection of credentials in Tech support files on HA configured VMs

CVSS 5.8 · Medium EPSS 0.09% · P26
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-1978

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
VM-Series on Microsoft Azure: Inadvertent collection of credentials in Tech support files on HA configured VMs
Source: NVD (National Vulnerability Database)
Vulnerability Description
TechSupport files generated on Palo Alto Networks VM Series firewalls for Microsoft Azure platform configured with high availability (HA) inadvertently collect Azure dashboard service account credentials. These credentials are equivalent to the credentials associated with the Contributor role in Azure. A user with the credentials will be able to manage all the Azure resources in the subscription except for granting access to other resources. These credentials do not allow login access to the VMs themselves. This issue affects VM Series Plugin versions before 1.0.9 for PAN-OS 9.0. This issue does not affect VM Series in non-HA configurations or on other cloud platforms. It does not affect hardware firewall appliances. Since becoming aware of the issue, Palo Alto Networks has safely deleted all the tech support files with the credentials. We now filter and remove these credentials from all TechSupport files sent to us. The TechSupport files uploaded to Palo Alto Networks systems were only accessible by authorized personnel with valid Palo Alto Networks credentials. We do not have any evidence of malicious access or use of these credentials.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
凭证管理
Source: NVD (National Vulnerability Database)
Vulnerability Title
Palo Alto Networks VM Series firewalls 信任管理问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Palo Alto Networks VM Series firewalls是美国Palo Alto Networks公司的一款虚拟化防火墙产品。 Palo Alto Networks VM Series firewalls 1.0.8及之前版本(用于Microsoft Azure平台)中存在信任管理问题漏洞,该漏洞源于技术支持文件中包含帐户凭据。攻击者可利用该漏洞获取Azure仪表板服务的帐户凭据。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Palo Alto NetworksVM-Series Plugin 1.0 ~ 1.0.8 -

II. Public POCs for CVE-2020-1978

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-1978

登录查看更多情报信息。

Same Patch Batch · Palo Alto Networks · 2020-04-08 · 7 CVEs total

CVE-2020-19928.1 HIGHPAN-OS on PA-7000 Series: Varrcvr daemon network-based denial of service or privilege esca
CVE-2020-19917.8 HIGHTraps: Insecure temporary file vulnerability may allow privilege escalation on Windows
CVE-2020-19907.2 HIGHPAN-OS: Buffer overflow in the management server
CVE-2020-19897.0 HIGHGlobal Protect Agent: Incorrect privilege assignment allows local privilege escalation
CVE-2020-19884.2 MEDIUMGlobal Protect Agent: Local privilege escalation due to an unquoted search path vulnerabil
CVE-2020-19873.9 LOWGlobal Protect Agent: VPN cookie local information disclosure

IV. Related Vulnerabilities

V. Comments for CVE-2020-1978

No comments yet


Leave a comment