Published on: 12 November 2020
Palo Alto has published security advisories to address multiple vulnerabilities in PAN-OS. The detailed information about the vulnerabilities can be found at:
https://security.paloaltonetworks.com/CVE-2020-1999
https://security.paloaltonetworks.com/CVE-2020-2000
https://security.paloaltonetworks.com/CVE-2020-2022
https://security.paloaltonetworks.com/CVE-2020-2048
https://security.paloaltonetworks.com/CVE-2020-2050
Please note that PAN-OS 8.0 has reached its End-Of-Life (EOL) on 31.10.2019. No security updates will be provided after that. Users should arrange upgrading the PAN-OS to supported versions or migrating to other supported technology.
Depending on the vulnerability exploited, a successful attack could lead to arbitrary code execution, arbitrary command execution, evasion of threat detection, authentication bypass, information disclosure, elevation of privilege or denial of service on an affected system.
Software updates for affected systems are now available. System administrators of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
System administrators should contact their product support vendors for the fixes and assistance.
https://security.paloaltonetworks.com/CVE-2020-1999
https://security.paloaltonetworks.com/CVE-2020-2000
https://security.paloaltonetworks.com/CVE-2020-2022
https://security.paloaltonetworks.com/CVE-2020-2048
https://security.paloaltonetworks.com/CVE-2020-2050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2050