{"id":7480,"date":"2021-12-17T19:10:21","date_gmt":"2021-12-18T02:10:21","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?p=7480"},"modified":"2023-04-05T12:36:35","modified_gmt":"2023-04-05T19:36:35","slug":"palo-alto-networks-firewalls-are-vulnerable-to-cve-2021-3064-upgrade-now","status":"publish","type":"post","link":"https:\/\/webdev.securin.xyz\/articles\/palo-alto-networks-firewalls-are-vulnerable-to-cve-2021-3064-upgrade-now\/","title":{"rendered":"Palo Alto Networks\u2019 Firewalls Are Vulnerable to CVE-2021-3064. Upgrade Now!"},"content":{"rendered":"
\nPalo Alto Networks (PAN) had more than 10,000 vulnerable firewalls with their products exposed due to a massive vulnerability in a security appliance.<\/p>\n<\/blockquote>\n
<\/p>\n
A zero-day vulnerability has been discovered in Palo Alto Networks GlobalProtect VPN that unauthenticated attackers can exploit to execute arbitrary commands on affected devices with root privileges. Using the GlobalProtect portal, administrators can lock down network endpoints, secure information about gateways, and secure any certificates required to connect to them.<\/p>\n
<\/p>\n
The critical security flaw was identified as CVE-2021-3064 with remote code execution on vulnerable product installations. Following the discovery of this vulnerability, Palo Alto Networks provided an update<\/a> that addressed CVE-2021-3064.<\/p>\n
<\/p>\n
Vulnerability Details<\/h2>\n
CVE-2021-3064<\/strong><\/p>\n
<\/p>\n
CVE-2021-3064, a buffer overflow, occurs while processing user-supplied input into a fixed-length stack region. Without using an HTTP smuggling technique (the method of tampering with a website’s processing of HTTP requests sent by one or more users), the problematic code is not accessible from the outside world. When the exploitation of buffer overflow and HTTP smuggling technique is combined simultaneously, remote code execution is possible with the privileges of the vulnerable component on the firewall device.<\/p>\n
<\/p>\n
This zero-day vulnerability has a critical severity rating of 9.8 of 10 and is categorized under CWE-787 (Out-of-Bounds Write) and CWE-121 (Stack-Based Buffer Overflow). According to MITRE, CWE-787 ranks the highest among the Top 25 Most Dangerous Software Weaknesses of 2021<\/a>, making patching a top priority.<\/p>\n
<\/p>\n
Invasion Process<\/h2>\n
<\/p>\n
To exploit<\/a> this vulnerability, an attacker needs network access to the GlobalProtect service port (default port 443). This port is frequently accessible via the internet since the impacted product is a VPN site. Exploitation is challenging but doable on systems with Address Space Layout Randomization (ASLR) enabled, which appears to be the situation in most hardware devices. The lack of ASLR on virtualized devices (VM-series firewalls) makes exploiting them considerably easier, and researchers expect publicly available exploits to surface.<\/p>\n
<\/p>\n
Observations<\/h2>\n
<\/p>\n
\n
- \n
The vulnerability consists of a way for circumventing external web server validations (HTTP smuggling) and a stack-based buffer overflow.<\/p>\n<\/li>\n
- \n
This vulnerability chain has been proven to allow remote code execution on physical and virtual firewall products.<\/p>\n<\/li>\n
- \n
At present, there is no publicly known exploit code.<\/p>\n<\/li>\n
- \n
The vulnerability affects all versions of PAN-OS 8.1 prior to 8.1.17.<\/p>\n<\/li>\n
- \n
PAN has released a patch for this vulnerability.<\/p>\n<\/li>\n
- \n
The PAN Threat Prevention Signatures 91820 and 91855, which block exploitation of the issue, are also available.<\/p>\n<\/li>\n
- \n
It is used by several Fortune 500 and other global companies.<\/p>\n<\/li>\n<\/ul>\n
<\/p>\n
Popular scanners such as Nessus and Qualys identified the vulnerability and labeled it with the plugin ID below.<\/p>\n
<\/p>\n
\n
\n \n\n \n \n <\/colgroup>\n \n \n CVE<\/p>\n<\/td>\n
\n Nessus<\/p>\n<\/td>\n
\n Qualys<\/p>\n<\/td>\n
\n Nexpose<\/p>\n<\/td>\n<\/tr>\n
\n \n CVE-2021-3064<\/p>\n<\/td>\n
\n 155307<\/p>\n<\/td>\n
\n 730255<\/p>\n<\/td>\n
\n N\/A<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n
<\/p>\n
Global Exposure<\/h2>\n
<\/p>\n
According to the search results on Shodan, there are 5,887 assets potentially affected by this CVE-2021-3064. The following is the breakdown of PAN-OS version instances running on various ports exposed to attacks.<\/p>\n
\n
\n \n\n <\/colgroup>\n \n \n PAN-OS 8.1.15-h3<\/p>\n<\/td>\n
\n PANOS-8.1.15<\/p>\n<\/td>\n<\/tr>\n
\n \n <\/p>\n<\/td>\n
\n <\/p>\n<\/td>\n<\/tr>\n
\n \n PAN-OS 8.1.16<\/p>\n<\/td>\n
\n PAN-OS 8.1.10<\/p>\n<\/td>\n<\/tr>\n
\n \n <\/p>\n<\/td>\n
\n <\/p>\n<\/td>\n<\/tr>\n
\n \n PAN-OS 8.1.6<\/p>\n<\/td>\n
\n PAN-OS 8.1.11<\/p>\n<\/td>\n<\/tr>\n
\n \n <\/p>\n<\/td>\n
\n <\/p>\n<\/td>\n<\/tr>\n
\n \n PAN-OS 8.1.9<\/p>\n<\/td>\n
\n PAN-OS 8.1.7<\/p>\n<\/td>\n<\/tr>\n
\n \n <\/p>\n<\/td>\n
\n <\/p>\n<\/td>\n<\/tr>\n
\n \n PAN-OS 8.1.8<\/p>\n<\/td>\n
\n PAN-OS 8.1.4<\/p>\n<\/td>\n<\/tr>\n
\n \n <\/p>\n<\/td>\n
\n <\/p>\n<\/td>\n<\/tr>\n
\n \n PAN-OS 8.1.5<\/p>\n<\/td>\n
\n PAN-OS 8.1.0<\/p>\n<\/td>\n<\/tr>\n
\n \n <\/p>\n<\/td>\n
\n <\/p>\n<\/td>\n<\/tr>\n
\n \n PAN-OS 8.1.3<\/p>\n<\/td>\n
\n PAN-OS 8.1.8-h5<\/p>\n<\/td>\n<\/tr>\n
\n \n <\/p>\n<\/td>\n
\n <\/p>\n<\/td>\n<\/tr>\n
\n \n PAN-OS 8.1.14-h2<\/p>\n<\/td>\n
\n PAN-OS 8.1.1<\/p>\n<\/td>\n<\/tr>\n
\n \n <\/p>\n<\/td>\n
\n <\/p>\n<\/td>\n<\/tr>\n
\n \n PAN-OS 8.1.13<\/p>\n<\/td>\n<\/tr>\n
\n \n <\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n
<\/p>\n
According to the last 30 days of Google search interest, this critical vulnerability is currently trending in countries such as Japan, Canada, Poland, the United Kingdom, and India.<\/p>\n
<\/p>\n
<\/p>\n
Trending Regions<\/a><\/p>\n
<\/p>\n
A Patch to Fix this Vulnerability!<\/h2>\n
<\/p>\n