- Description
- The PAN-OS management web interface page in PAN-OS 6.1.20 and earlier, PAN-OS 7.1.16 and earlier, PAN-OS 8.0.8 and earlier, and PAN-OS 8.1.0 may allow an attacker to access the GlobalProtect password hashes of local users via manipulation of the HTML markup.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 3.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 3.6
- Exploitability score
- 1.8
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:N/A:N
- nvd@nist.gov
- CWE-269
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3E0A3B65-E605-45D0-A282-E755C2DE24F8",
"versionEndIncluding": "6.1.20",
"versionStartExcluding": "6.0.0"
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B338748F-AD0A-4747-866B-607180C4691C",
"versionEndIncluding": "7.1.16",
"versionStartIncluding": "7.1.0"
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F9BB1E6B-50FD-4154-84D2-39FBCD1ED585",
"versionEndIncluding": "8.0.8",
"versionStartExcluding": "8.0.0"
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:8.1.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2A55A45A-5A3B-4E99-8BAD-F2D939DFF59F"
}
],
"operator": "OR"
}
]
}
]