跳转到帖子

PAN-OS: Denial-of-Service (DoS) Vulnerability in BGP Software

recommended_posts

发布于
  • Members

PAN-OS: Denial-of-Service (DoS) Vulnerability in BGP Software

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
09/13/2023
Created
01/08/2025
Added
01/07/2025
Modified
01/16/2025

Description

BGP software such as FRRouting FRR included as part of the PAN-OS, Prisma SD-WAN ION, and Prisma Access routing features enable a remote attacker to incorrectly reset network sessions though an invalid BGP update. This issue is applicable only to devices and appliances with BGP routing features enabled. This issue requires the remote attacker to control at least one established BGP session that is propagated to the router to exploit it. The denial-of-service (DoS) impact on the network is dependent on the network's architecture and fault tolerant design. Prisma Access ‘Security Processing Node Endpoint Remote Network (SP-RN/Branches)' and 'Service Connections (SCs/CANs)' nodes do not peer with the Internet and do not receive Internet routes directly unless explicitly configured by the customer. Prisma Access Nodes are commonly protected by unaffected customer-premise equipment (CPE router devices). Hence the impact of this issue on Prisma Access is limited. Further details about this issue can be found at: https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling

Solution(s)

  • palo-alto-networks-pan-os-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2023-38802
  • CVE - 2023-38802
  • https://security.paloaltonetworks.com/CVE-2023-38802
  • 查看数 702
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…