CVE-2020-2011
HIGH
Published 2020-05-13T19:07:14.502947Z
Actions:
CVSS Score
V3.1
7.5
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score Metrics
Exploitability: N/A
Impact: N/A
EPSS Score
v2023.03.01
0.002
probability
of exploitation in the wild
There is a 0.2% chance that this vulnerability will be exploited in the wild within the next 30 days.
Updated: 2025-01-25
Exploit Probability
Percentile: 0.557
Higher than 55.7% of all CVEs
Attack Vector Metrics
Impact Metrics
Description
An improper input validation vulnerability in the configuration daemon of Palo Alto Networks PAN-OS Panorama allows for a remote unauthenticated user to send a specifically crafted registration request to the device that causes the configuration service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS Panorama services by restarting the device and putting it into maintenance mode. This issue affects: All versions of PAN-OS 7.1, PAN-OS 8.0; PAN-OS 8.1 versions earlier than 8.1.14; PAN-OS 9.0 versions earlier than 9.0.7; PAN-OS 9.1 versions earlier than 9.1.0.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Published: 2020-05-13T19:07:14.502947Z
Last Modified: 2024-09-16T23:26:56.835Z
Copied to clipboard!