CVE-2021-3059

8.1 HIGH

📋 TL;DR

This CVE-2021-3059 is an OS command injection vulnerability in Palo Alto Networks PAN-OS management interface that allows man-in-the-middle attackers to execute arbitrary OS commands and escalate privileges during dynamic updates. It affects PAN-OS versions 8.1 through 10.1 and Prisma Access 2.1 firewalls. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Palo Alto Networks PAN-OS
  • Prisma Access
Versions: PAN-OS 8.1 < 8.1.20-h1, PAN-OS 9.0 < 9.0.14-h3, PAN-OS 9.1 < 9.1.11-h2, PAN-OS 10.0 < 10.0.8, PAN-OS 10.1 < 10.1.3, Prisma Access 2.1 Preferred, Prisma Access 2.1 Innovation
Operating Systems: PAN-OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires man-in-the-middle position during dynamic updates to management interface. Prisma Access customers with specific firewall versions are also impacted.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with root/admin privileges, allowing attacker to install persistent backdoors, steal sensitive data, pivot to other systems, and disrupt network operations.

🟠

Likely Case

Privilege escalation leading to unauthorized administrative access, configuration changes, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact due to network segmentation, proper access controls, and monitoring preventing successful man-in-the-middle attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires man-in-the-middle position and knowledge of the vulnerability. No public exploit code available at time of advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PAN-OS 8.1.20-h1, PAN-OS 9.0.14-h3, PAN-OS 9.1.11-h2, PAN-OS 10.0.8, PAN-OS 10.1.3

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2021-3059

Restart Required: Yes

Instructions:

1. Download appropriate PAN-OS hotfix from Palo Alto support portal. 2. Upload to firewall via web interface or CLI. 3. Install hotfix via web interface or CLI. 4. Reboot firewall to complete installation. 5. Verify version after reboot.

🔧 Temporary Workarounds

Restrict Management Interface Access

all

Limit management interface access to trusted networks only and implement strict network segmentation.

Use Encrypted Management Channels

all

Ensure all management traffic uses encrypted protocols (HTTPS, SSH) with certificate validation.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate management interfaces from untrusted networks
  • Deploy network monitoring and intrusion detection systems to detect man-in-the-middle attacks

🔍 How to Verify

Check if Vulnerable:

Check PAN-OS version via web interface (Device > Setup > Operations) or CLI command: show system info

Check Version:

show system info | match version

Verify Fix Applied:

Verify PAN-OS version matches or exceeds patched versions: 8.1.20-h1, 9.0.14-h3, 9.1.11-h2, 10.0.8, or 10.1.3

📡 Detection & Monitoring

Log Indicators:

  • Unexpected command execution in system logs
  • Unauthorized configuration changes
  • Failed authentication attempts on management interface

Network Indicators:

  • Unusual traffic patterns during dynamic updates
  • Man-in-the-middle attack indicators
  • Unexpected outbound connections from firewall

SIEM Query:

source="pan-firewall" AND (event_type="SYSTEM" OR event_type="CONFIG") AND (message="*command*" OR message="*exec*" OR message="*injection*")

🔗 References

📤 Share & Export