Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.105325 |
Kategorie: | Palo Alto PAN-OS Local Security Checks |
Titel: | Palo Alto PAN-OS PAN-SA-2015-0005 |
Zusammenfassung: | Devices running PAN-OS 7.0.0 (including Panorama) that are configured to use LDAP for captive portal or device management authentication;do not properly perform authentication against the LDAP server in specific cases, leading to an authentication bypass. There is no issue if you are using Radius or local;authentication instead of LDAP or prior versions of PAN-OS. This does not affect authentication attempts from GlobalProtect clients either. |
Beschreibung: | Summary: Devices running PAN-OS 7.0.0 (including Panorama) that are configured to use LDAP for captive portal or device management authentication do not properly perform authentication against the LDAP server in specific cases, leading to an authentication bypass. There is no issue if you are using Radius or local authentication instead of LDAP or prior versions of PAN-OS. This does not affect authentication attempts from GlobalProtect clients either. Vulnerability Impact: This vulnerability can lead to authentication bypass for captive portal or device management login attempts. Affected Software/OS: PAN-OS 7.0.0 Solution: Update to PAN-OS 7.0.1 CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Copyright | This script is Copyright (C) 2015 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |