CVE-2022-0023

CVSS V2 Medium 4.3 CVSS V3 Medium 5.9
Description
An improper handling of exceptional conditions vulnerability exists in the DNS proxy feature of Palo Alto Networks PAN-OS software that enables a meddler-in-the-middle (MITM) to send specifically crafted traffic to the firewall that causes the service to restart unexpectedly. Repeated attempts to send this request result in denial-of-service to all PAN-OS services by restarting the device in maintenance mode. This issue does not impact Panorama appliances and Prisma Access customers. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.22; PAN-OS 9.0 versions earlier than PAN-OS 9.0.16; PAN-OS 9.1 versions earlier than PAN-OS 9.1.13; PAN-OS 10.0 versions earlier than PAN-OS 10.0.10; PAN-OS 10.1 versions earlier than PAN-OS 10.1.5. This issue does not impact PAN-OS 10.2.
Overview
  • CVE ID
  • CVE-2022-0023
  • Assigner
  • psirt@paloaltonetworks.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-04-13T19:15:09
  • Last Modified Date
  • 2022-10-18T18:50:33
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* 1 OR 8.1.0 8.1.22
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* 1 OR 9.0.0 9.0.16
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* 1 OR 9.1.0 9.1.13
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* 1 OR 10.0.0 10.0.10
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* 1 OR 10.1.0 10.1.5
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • HIGH
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 5.9
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 2.2
  • Impact Score
  • 3.6
References
Reference URL Reference Tags
https://security.paloaltonetworks.com/CVE-2022-0023 Vendor Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 06:27:41 Added to TrackCVE