CVE-2020-2021

Description from NVD

When Security Assertion Markup Language (SAML) authentication is enabled and the 'Validate Identity Provider Certificate' option is disabled (unchecked), improper verification of signatures in PAN-OS SAML authentication enables an unauthenticated network-based attacker to access protected resources. The attacker must have network access to the vulnerable server to exploit this vulnerability. This issue affects PAN-OS 9.1 versions earlier than PAN-OS 9.1.3; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15, and all versions of PAN-OS 8.0 (EOL). This issue does not affect PAN-OS 7.1. This issue cannot be exploited if SAML is not used for authentication. This issue cannot be exploited if the 'Validate Identity Provider Certificate' option is enabled (checked) in the SAML Identity Provider Server Profile. Resources that can be protected by SAML-based single sign-on (SSO) authentication are: GlobalProtect Gateway, GlobalProtect Portal, GlobalProtect Clientless VPN, Authentication and Captive Portal, PAN-OS next-generation firewalls (PA-Series, VM-Series) and Panorama web interfaces, Prisma Access In the case of GlobalProtect Gateways, GlobalProtect Portal, Clientless VPN, Captive Portal, and Prisma Access, an unauthenticated attacker with network access to the affected servers can gain access to protected resources if allowed by configured authentication and Security policies. There is no impact on the integrity and availability of the gateway, portal or VPN server. An attacker cannot inspect or tamper with sessions of regular users. In the worst case, this is a critical severity vulnerability with a CVSS Base Score of 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N). In the case of PAN-OS and Panorama web interfaces, this issue allows an unauthenticated attacker with network access to the PAN-OS or Panorama web interfaces to log in as an administrator and perform administrative actions. In the worst-case scenario, this is a critical severity vulnerability with a CVSS Base Score of 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). If the web interfaces are only accessible to a restricted management network, then the issue is lowered to a CVSS Base Score of 9.6 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability.

Information Acquisition Date:2021-04-27T10:46Z
CVSS 2.0: 9.3 HIGH CVSS 3.x: 10.0 CRITICAL

▼ CVSS3 Vec CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

▼ CVSS2 Vec AV:N/AC:M/Au:N/C:C/I:C/A:C

NVD References

 N/A
     source:CONFIRM
     tags:Vendor Advisory    

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag:



List of frequently cited URLs

URLNum of Times Referred to
https://security.paloaltonetworks.com/CVE-2020-202142
http://newsbythehour.org/cybr25
https://support.f5.com/csp/article/K5214525423
https://blog.rapid7.com/2020/06/29/cve-2020-2021-authentica...7
https://www.jpcert.or.jp/newsflash/2020063001.html7
https://buff.ly/3iogdN04
https://www.zdnet.com/article/us-cyber-command-says-foreign...4
https://apa.cve.edu.es/4
https://www.tenable.com/blog/cve-2020-2021-palo-alto-networ...4
http://tweetedtimes.com/vistacomputing?s=tnp4
http://www.cvechina.wordpress.com4
https://github.com/mr-r3b00t/CVE-2020-20213
https://twitter.com/thegrugq/status/12776226470486384643
https://threatpost.com/cisa-nation-state-attackers-palo-alt...3
https://www.randori.com/cve-2020-2021-pan-os-advisory-poc/3
https://www.helpnetsecurity.com/2020/06/30/cve-2020-2021/3
https://www.cybersecuritydive.com/news/CISA-CVE-most-common...3

Information from Twitter

User URL Info Source Date
fletch_ai https://bit.ly/3GviGlo Source fletch_ai        1636614607941910531 2023/03/17

List of frequently cited URLs

URLNum of Times Referred to
security.paloaltonetworks.com42
newsbythehour.org25
support.f5.com23
blog.rapid7.com7
www.jpcert.or.jp7
buff.ly4
www.zdnet.com4
apa.cve.edu.es4
www.tenable.com4
tweetedtimes.com4
www.cvechina.wordpress.com4
github.com3
twitter.com3
threatpost.com3
www.randori.com3
www.helpnetsecurity.com3
www.cybersecuritydive.com3

Information from Twitter

User URL Info Source
fletch_ai bit.ly Show Tweet

GitHub Search Results: Up to 10
NameURL
No Data

GitHub Search Results: Up to 10
NameURL
No Data

2023/03/17 Score : 1
Added Har-sia Database : 2020/04/21
Last Modified : 2023/03/17
Highest Scored Date : 2020/06/30
Highest Score : 227