CVE-2017-15944
critical-risk
Published 2017-12-11
Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.6 allows remote attackers to execute arbitrary code via vectors involving the management interface.
Do I need to act?
!
94.1% chance of exploitation in next 30 days
EPSS score — higher than 6% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (11)
Broken Link
http://www.securityfocus.com/bid/102079
Broken Link
http://www.securitytracker.com/id/1040007
Vendor Advisory
https://security.paloaltonetworks.com/CVE-2017-15944
Broken Link
http://www.securityfocus.com/bid/102079
Broken Link
http://www.securitytracker.com/id/1040007
Vendor Advisory
https://security.paloaltonetworks.com/CVE-2017-15944
71
/ 100
critical-risk
Severity
32/34 · Critical
Exploitability
34/34 · Critical
Exposure
5/34 · Minimal