An improper input validation vulnerability in the configuration daemon of Palo Alto Networks PAN-OS Panorama allows for a remote unauthenticated user to send a specifically crafted registration request to the device that causes the configuration service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS Panorama services by restarting the device and putting it into maintenance mode. This issue affects: All versions of PAN-OS 7.1, PAN-OS 8.0; PAN-OS 8.1 versions earlier than 8.1.14; PAN-OS 9.0 versions earlier than 9.0.7; PAN-OS 9.1 versions earlier than 9.1.0.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://security.paloaltonetworks.com/CVE-2020-2011 |     | 
History
                    No history.
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: palo_alto
Published: 2020-05-13T19:07:14.502947Z
Updated: 2024-09-16T23:26:56.835Z
Reserved: 2019-12-04T00:00:00
Link: CVE-2020-2011
 Vulnrichment
                        Vulnrichment
                    No data.
 NVD
                        NVD
                    Status : Modified
Published: 2020-05-13T19:15:13.847
Modified: 2024-11-21T05:24:26.657
Link: CVE-2020-2011
 Redhat
                        Redhat
                    No data.