Vulnerability Description
An authentication bypass by spoofing vulnerability exists in the authentication daemon and User-ID components of Palo Alto Networks PAN-OS by failing to verify the integrity of the Kerberos key distribution center (KDC) before authenticating users. This affects all forms of authentication that use a Kerberos authentication profile. A man-in-the-middle type of attacker with the ability to intercept communication between PAN-OS and KDC can login to PAN-OS as an administrator. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.6; All version of PAN-OS 8.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Paloaltonetworks | Pan-Os | >= 7.1.0, < 7.1.26 |
Related Weaknesses (CWE)
References
- https://security.paloaltonetworks.com/CVE-2020-2002Vendor Advisory
- https://security.paloaltonetworks.com/CVE-2020-2002Vendor Advisory
FAQ
What is CVE-2020-2002?
CVE-2020-2002 is a vulnerability with a CVSS score of 8.1 (HIGH). An authentication bypass by spoofing vulnerability exists in the authentication daemon and User-ID components of Palo Alto Networks PAN-OS by failing to verify the integrity of the Kerberos key distri...
How severe is CVE-2020-2002?
CVE-2020-2002 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-2002?
Check the references section above for vendor advisories and patch information. Affected products include: Paloaltonetworks Pan-Os.