Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-0023: CVE-2022-0023 PAN-OS: Denial-of-Service (DoS) Vulnerability in DNS Proxy

An improper handling of exceptional conditions vulnerability exists in the DNS proxy feature of Palo Alto Networks PAN-OS software that enables a meddler-in-the-middle (MITM) to send specifically crafted traffic to the firewall that causes the service to restart unexpectedly. Repeated attempts to send this request result in denial-of-service to all PAN-OS services by restarting the device in maintenance mode. This issue does not impact Panorama appliances and Prisma Access customers. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.22; PAN-OS 9.0 versions earlier than PAN-OS 9.0.16; PAN-OS 9.1 versions earlier than PAN-OS 9.1.13; PAN-OS 10.0 versions earlier than PAN-OS 10.0.10; PAN-OS 10.1 versions earlier than PAN-OS 10.1.5. This issue does not impact PAN-OS 10.2.

CVE
#vulnerability#web#js

Palo Alto Networks Security Advisories / CVE-2022-0023

Attack Vector NETWORK

Attack Complexity HIGH

Privileges Required NONE

User Interaction NONE

Scope UNCHANGED

Confidentiality Impact NONE

Integrity Impact NONE

Availability Impact HIGH

NVD JSON

Published 2022-04-13

Updated 2022-04-13

Reference PAN-164264

Discovered internally

Description

An improper handling of exceptional conditions vulnerability exists in the DNS proxy feature of Palo Alto Networks PAN-OS software that enables a meddler-in-the-middle (MITM) to send specifically crafted traffic to the firewall that causes the service to restart unexpectedly. Repeated attempts to send this request result in denial-of-service to all PAN-OS services by restarting the device in maintenance mode.

This issue does not impact Panorama appliances and Prisma Access customers.

This issue impacts:

PAN-OS 8.1 versions earlier than PAN-OS 8.1.22;

PAN-OS 9.0 versions earlier than PAN-OS 9.0.16;

PAN-OS 9.1 versions earlier than PAN-OS 9.1.13;

PAN-OS 10.0 versions earlier than PAN-OS 10.0.10;

PAN-OS 10.1 versions earlier than PAN-OS 10.1.5.

This issue does not impact PAN-OS 10.2.

Product Status

Versions

Affected

Unaffected

PAN-OS 10.2

None

10.2.*

PAN-OS 10.1

< 10.1.5

>= 10.1.5

PAN-OS 10.0

< 10.0.10

>= 10.0.10

PAN-OS 9.1

< 9.1.13

>= 9.1.13

PAN-OS 9.0

< 9.0.16

>= 9.0.16

PAN-OS 8.1

< 8.1.22

>= 8.1.22

Prisma Access 3.0

None

Preferred, Innovation

Prisma Access 2.2

None

Preferred

Prisma Access 2.1

None

Preferred, Innovation

Required Configuration for Exposure

This issue is applicable only to PAN-OS hardware and virtual firewalls with the DNS proxy feature enabled. You can verify whether DNS proxy is enabled by selecting 'Network > DNS Proxy’ from the web interface.

Severity: MEDIUM

CVSSv3.1 Base Score: 5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type

CWE-755 Improper Handling of Exceptional Conditions

Solution

This issue is fixed in PAN-OS 8.1.22, PAN-OS 9.0.16, PAN-OS 9.1.13, PAN-OS 10.0.10, PAN-OS 10.1.5, and all later PAN-OS versions.

Workarounds and Mitigations

Customers with a Threat Prevention subscription can block attack traffic related to this vulnerability by enabling Threat ID 92406 (Applications and Threats content update 8556).

To completely mitigate the risk of this issue, temporarily disable the DNS proxy feature until you are able to upgrade your PAN-OS software to a fixed version.

Acknowledgments

This issue was found by Nicholas Newsom of Palo Alto Networks during internal security review.

Timeline

2022-04-13 Initial publication

Related news

CVE-2021-43286: Releases - Version notes | GoCD

An issue was discovered in ThoughtWorks GoCD before 21.3.0. An attacker with privileges to create a new pipeline on a GoCD server can abuse a command-line injection in the Git URL "Test Connection" feature to execute arbitrary code.

CVE-2022-1279: Release EBICS Java Version 1.2 · ebics-java/ebics-java-client

A vulnerability in the encryption implementation of EBICS messages in the open source librairy ebics-java/ebics-java-client allows an attacker sniffing network traffic to decrypt EBICS payloads. This issue affects: ebics-java/ebics-java-client versions prior to 1.2.

CVE-2021-41119: CS SYD - JSON Vulnerability in Haskell's Aeson library

Wire-server is the system server for the wire back-end services. Releases prior to v2022-03-01 are subject to a denial of service attack via a crafted object causing a hash collision. This collision causes the server to spend at least quadratic time parsing it which can lead to a denial of service for a heavily used server. The issue has been fixed in wire-server 2022-03-01 and is already deployed on all Wire managed services. On premise instances of wire-server need to be updated to 2022-03-01, so that their backends are no longer affected. There are no known workarounds for this issue.

CVE-2022-24788: Merge pull request from GHSA-j2x6-9323-fp7h · vyperlang/vyper@049dbdc

Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Versions of vyper prior to 0.3.2 suffer from a potential buffer overrun. Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun. Users are advised to upgrade. There are no known workarounds for this issue.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907