Palo Alto have released details of 3 new security advisories as well as updates to 2 existing. We strongly recommend that you consider upgrading your firewalls as soon as possible to avoid being susceptible to these vulnerabilities.
Our suggested PAN-OS versions are 6.1.18, 7.0.16, 7.1.11 and 8.0.3
New Security Advisories
PAN-SA-2017-0021 - Vulnerability in the PAN-OS DNS Proxy
* Critical Severity
* Fixed in PAN-OS 6.1.18, PAN-OS 7.0.16, PAN-OS 7.1.10, PAN-OS 8.0.3
* Affects DNS Proxy of PAN-OS
* CVE-2017-8390
PAN-SA-2017-0020 - Cross-Site Scripting in PAN-OS
* Medium Severity
* Fixed in PAN-OS 6.1.18, PAN-OS 7.0.16, PAN-OS 7.1.11, PAN-OS 8.0.3
* Affects the GlobalProtect external interface of PAN-OS
* CVE-2017-9467
PAN-SA-2017-0019 - Cross-Site Scripting in the Management Web Interface
* Medium Severity
* Fixed in PAN-OS 6.1.18, PAN-OS 7.0.16, PAN-OS 7.1.11, PAN-OS 8.0.3
* Affects the Management Interface of PAN-OS
* CVE-2017-9459
Updated Security Advisories
PAN-SA-2017-0018 - Kernel Vulnerability
* 6.1.18 Fix available
PAN-SA-2017-0017 - OpenSSL Vulnerability
* 6.1.18 Fix available
Comments
0 comments
Please sign in to leave a comment.