CVE-2017-7945
Published Apr 29, 2017
Last updated 5 years ago
Overview
- Description
- The GlobalProtect external interface in Palo Alto Networks PAN-OS before 6.1.17, 7.x before 7.0.15, 7.1.x before 7.1.9, and 8.x before 8.0.2 provides different error messages for failed login attempts depending on whether the username exists, which allows remote attackers to enumerate account names and conduct brute-force attacks via a series of requests, aka PAN-SA-2017-0014 and PAN-72769.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-209
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E21D41C6-2ED7-46E1-A75D-62A9D8A671FE", "versionEndIncluding": "6.1.15" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "624F100E-2163-4B32-8F9A-02CB98A54F8B" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EE577FC-15FF-4E57-8257-DCDFFB2A9985" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6BCC7DB4-24B3-4F4A-86C5-B9D59E891E2F" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EC541C0-0BB9-4011-A3B8-DDCD00A324F7" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8F8C2BE-21DE-49FE-A58F-97158657EF24" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDB6D0AB-5364-432A-8F7A-9DB53E1BF5D2" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.5:h2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB55A087-CFA7-45F3-8FEF-9A37804073A3" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BEEBF0F-FBB2-43B7-9F56-0FBF2DADCA2F" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "831890DD-6702-4AA1-9F20-B0E22B06043A" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "448EC192-C6FD-4E97-AE26-51001986E7FC" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A02BEFED-A8AB-4A51-8E01-69123C20F9FA" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59E29A65-120E-4FB6-B54B-8E86B52CED05" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9A95E6A-CD9A-473B-A6DC-AE2E48684A02" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9C19ADE-22F7-42D0-A6FD-81EDB334B484" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8AAF08A-5478-4942-8CC0-0F267F464684" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "033CDBB8-59A7-44BA-B28C-57A91CCD0B83" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "685DCF3A-39BD-4C38-9DC4-2AF715BB65AF" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94C08178-C348-4B87-B951-27BA9102E60C" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEFDAAE0-7A3B-4B9A-BC2A-AE5E8BCAE406" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32839A0C-6229-430C-88A7-9E0ECC9F49CD" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6A695BB-D919-4025-B5C3-7BFDF4D602F4" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.4:h2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEA3E4BA-6127-4864-BFD8-6A14BA99BD3F" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D0EB9B8-42D6-4011-81E6-90E3A9773D9C" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F9B6C6A-4FF5-4807-AC02-F9E5526C4B28" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE7CE914-E21C-4850-96D8-A5C31C32C065" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:7.1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B7D2AA1-7381-436E-A080-87867C681DF6" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:8.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4A47526-2888-49CC-895F-F7361A35C45C" }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:8.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A5715D2-8821-4704-B977-D3550E94DFCD" } ], "operator": "OR" } ] } ]