CVE-2021-3033

9.1 CRITICAL

📋 TL;DR

CVE-2021-3033 is an authentication bypass vulnerability in Palo Alto Networks Prisma Cloud Compute console that allows attackers to log in as any authorized user by exploiting improper SAML signature validation. This affects on-premises deployments of Prisma Cloud Compute versions 19.11, 20.04, 20.09, and 20.12 before update 1. The SaaS version is not vulnerable.

💻 Affected Systems

Products:
  • Palo Alto Networks Prisma Cloud Compute Console
Versions: 19.11, 20.04, 20.09, 20.12 before update 1
Operating Systems: Not OS-specific - affects the Prisma Cloud Compute application
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects on-premises deployments. Prisma Cloud Compute SaaS version is NOT vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Prisma Cloud Compute console, allowing attackers to access sensitive cloud security data, modify security policies, and potentially pivot to managed cloud environments.

🟠

Likely Case

Unauthorized access to the management console leading to data exfiltration, privilege escalation, and manipulation of cloud security configurations.

🟢

If Mitigated

Limited impact if console access is restricted to internal networks with strong network segmentation and monitoring.

🌐 Internet-Facing: HIGH - If the console is exposed to the internet, attackers can directly exploit this without any authentication.
🏢 Internal Only: HIGH - Even internally, any user with network access to the console could exploit this vulnerability to gain unauthorized access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows bypassing authentication entirely, making exploitation straightforward for attackers with network access to the console.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update 1 for version 20.12 or later versions

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2021-3033

Restart Required: Yes

Instructions:

1. Upgrade to Prisma Cloud Compute 20.12 update 1 or later. 2. Apply the update through the console or CLI. 3. Restart the Prisma Cloud Compute services. 4. Verify the fix by testing SAML authentication.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to the Prisma Cloud Compute console to trusted IP addresses only

Configure firewall rules to allow only specific source IPs to access the console port (typically 443)

Disable SAML Authentication

all

Temporarily disable SAML authentication if not required, using local authentication instead

Navigate to Settings > Authentication > SAML and disable SAML authentication

🧯 If You Can't Patch

  • Immediately restrict network access to the console using firewall rules to only allow trusted administrative IPs
  • Implement additional authentication layers such as VPN or reverse proxy with MFA before accessing the console

🔍 How to Verify

Check if Vulnerable:

Check your Prisma Cloud Compute version in the console dashboard or via CLI command: 'pcc version'. If version is 19.11, 20.04, 20.09, or 20.12 without update 1, you are vulnerable.

Check Version:

pcc version

Verify Fix Applied:

After patching, verify version shows 20.12 update 1 or later. Test SAML authentication to confirm proper signature validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual login patterns, multiple failed SAML authentication attempts followed by successful login from unexpected IPs
  • SAML authentication logs showing signature validation bypass

Network Indicators:

  • Unauthorized access attempts to the console port (typically 443) from unexpected sources
  • SAML authentication traffic patterns that bypass normal validation

SIEM Query:

source="prisma-cloud" AND (event_type="authentication" AND result="success") AND src_ip NOT IN [trusted_admin_ips]

🔗 References

📤 Share & Export