Vulnerability Details : CVE-2019-1579
Used for ransomware!
Remote Code Execution in PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11-h1 and earlier, and PAN-OS 8.1.2 and earlier with GlobalProtect Portal or GlobalProtect Gateway Interface enabled may allow an unauthenticated remote attacker to execute arbitrary code.
Vulnerability category: Execute code
Products affected by CVE-2019-1579
- cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
CVE-2019-1579 is in the CISA Known Exploited Vulnerabilities Catalog
This issue is known to have been leveraged as part of a ransomware campaign.
CISA vulnerability name:
Palo Alto Networks PAN-OS Remote Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Remote Code Execution in PAN-OS with GlobalProtect Portal or GlobalProtect Gateway Interface enabled.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2019-1579
Added on
2022-01-10
Action due date
2022-07-10
Exploit prediction scoring system (EPSS) score for CVE-2019-1579
96.77%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-1579
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.1
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
NIST | 2024-07-24 |
CWE ids for CVE-2019-1579
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-1579
-
http://www.securityfocus.com/bid/109310
Palo Alto Networks PAN-OS CVE-2019-1579 Multiple Remote Code Execution VulnerabilitiesBroken Link;Third Party Advisory;VDB Entry
-
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010
SonicWall Security AdvisoryThird Party Advisory
-
https://devco.re/blog/2019/07/17/attacking-ssl-vpn-part-1-PreAuth-RCE-on-Palo-Alto-GlobalProtect-with-Uber-as-case-study/
Attacking SSL VPN - Part 1: PreAuth RCE on Palo Alto GlobalProtect, with Uber as Case Study! | DEVCOREExploit;Third Party Advisory
-
https://security.paloaltonetworks.com/CVE-2019-1579
CVE-2019-1579 Remote Code Execution in GlobalProtect Portal/Gateway InterfaceVendor Advisory
Jump to