CVE-2021-3064 PAN-OS: PAN-OS Remote Code Execution Vulnerability

CVE-2021-3064
On November 10, 2021, Palo Alto officially released a risk notice on memory corruption vulnerability in GlobalProtect Portal and Gateway Interfaces, the vulnerability number is CVE-2021-3064 (CVSSv3.1 Base Score: 9.8). The vulnerability only affects the PAN-OS firewall configuration with GlobalProtect enabled.

Vulnerability Detail

The GlobalProtect interface and gateway interface of PAN-OS have memory corruption vulnerabilities, allowing an unauthenticated network-based attacker to disrupt system processes and possibly execute arbitrary code with root privileges. The attacker must access the GlobalProtect interface through the network to exploit this vulnerability.

CVE-2021-3064

Versions Affected Unaffected
Prisma Access 2.2 None all
Prisma Access 2.1 None all
PAN-OS 10.1 None 10.1.*
PAN-OS 10.0 None 10.0.*
PAN-OS 9.1 None 9.1.*
PAN-OS 9.0 None 9.0.*
PAN-OS 8.1 < 8.1.17 >= 8.1.17

Solution

In this regard, we recommend that users upgrade PAN-OS to the latest version in time. You can temporarily repair with the following suggestions:
  • Disable the interface from the web interface: ‘Network > GlobalProtect > Portals’ and in ‘Network > GlobalProtect > Gateways’