CVE-2021-3062
📋 TL;DR
An improper access control vulnerability in PAN-OS allows authenticated GlobalProtect users to access the EC2 instance metadata endpoint on AWS-hosted VM-Series firewalls. This enables attackers to perform any operations allowed by the EC2 role in AWS, potentially leading to cloud resource compromise. Affected systems include PAN-OS 8.1, 9.0, 9.1, and 10.0 versions before specific patch releases on VM-Series firewalls hosted on Amazon AWS.
💻 Affected Systems
- PAN-OS VM-Series firewalls
📦 What is this software?
Pan Os by Paloaltonetworks
Pan Os by Paloaltonetworks
Pan Os by Paloaltonetworks
Pan Os by Paloaltonetworks
⚠️ Risk & Real-World Impact
Worst Case
Full compromise of AWS resources associated with the EC2 role, including data exfiltration, service disruption, lateral movement within the cloud environment, and potential account takeover.
Likely Case
Unauthorized access to sensitive AWS metadata, credential theft from instance metadata service, and potential privilege escalation within the AWS environment.
If Mitigated
Limited impact with proper network segmentation, minimal EC2 role permissions, and monitoring of metadata service access.
🎯 Exploit Status
Exploitation requires authenticated access to GlobalProtect portals/gateways. The vulnerability allows straightforward access to EC2 metadata endpoint once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: PAN-OS 8.1.20, 9.0.14, 9.1.11, 10.0.8 or later
Vendor Advisory: https://security.paloaltonetworks.com/CVE-2021-3062
Restart Required: Yes
Instructions:
1. Download appropriate PAN-OS patch version from Palo Alto support portal. 2. Upload software to firewall. 3. Install update via CLI or WebUI. 4. Reboot firewall to complete installation.
🔧 Temporary Workarounds
Restrict GlobalProtect Access
allLimit GlobalProtect portal/gateway access to trusted users only using authentication and authorization controls.
Minimize EC2 Role Permissions
allApply principle of least privilege to EC2 instance roles to limit potential damage from metadata access.
🧯 If You Can't Patch
- Implement strict network controls to block access to EC2 metadata endpoint (169.254.169.254) from GlobalProtect interfaces
- Enhance monitoring for unusual metadata service access patterns and implement alerting
🔍 How to Verify
Check if Vulnerable:
Check PAN-OS version via WebUI (Device > Setup > Operations) or CLI (show system info). Compare against affected versions list.
Check Version:
show system info | match version
Verify Fix Applied:
Verify PAN-OS version is at or above patched versions: 8.1.20, 9.0.14, 9.1.11, or 10.0.8.
📡 Detection & Monitoring
Log Indicators:
- Unusual access to EC2 metadata endpoint from GlobalProtect IPs
- Authentication logs showing unexpected GlobalProtect user access
Network Indicators:
- HTTP requests to 169.254.169.254 from firewall interfaces
- Increased metadata service traffic
SIEM Query:
source_ip IN (GlobalProtect_IPs) AND dest_ip = '169.254.169.254' AND http_method = 'GET'