TOCTOU Race Condition Vulnerability in Palo Alto Networks PAN-OS Web Interface Allows Arbitrary Code Execution with Root Privileges

TOCTOU Race Condition Vulnerability in Palo Alto Networks PAN-OS Web Interface Allows Arbitrary Code Execution with Root Privileges

CVE-2021-3054 · MEDIUM Severity

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

A time-of-check to time-of-use (TOCTOU) race condition vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator with permission to upload plugins to execute arbitrary code with root user privileges. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.11; PAN-OS 10.0 versions earlier than PAN-OS 10.0.7; PAN-OS 10.1 versions earlier than PAN-OS 10.1.2. This issue does not affect Prisma Access.

Learn more about our Web App Pen Testing.