CVE-2017-17841

Severity

43%

Complexity

86%

Confidentiality

48%

Palo Alto Networks PAN-OS 6.1, 7.1, and 8.0.x before 8.0.7, when an interface implements SSL decryption with RSA enabled or hosts a GlobalProtect portal or gateway, might allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.

Palo Alto Networks PAN-OS 6.1, 7.1, and 8.0.x before 8.0.7, when an interface implements SSL decryption with RSA enabled or hosts a GlobalProtect portal or gateway, might allow remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a ROBOT attack.

CVSS 3.0 Base Score 5.9. CVSS Attack Vector: network. CVSS Attack Complexity: high. CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).

CVSS 2.0 Base Score 4.3. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N).

Overview

First reported 7 years ago

2018-01-10 18:29:00

Last updated 5 years ago

2020-02-17 16:15:00

Affected Software

paloaltonetworks pan-os 6.1.0

6.1.0

Palo Alto Networks PAN-OS 7.1.0

7.1.0

Palo Alto Networks PAN-OS 7.1.1

7.1.1

Palo Alto Networks PAN-OS 7.1.2

7.1.2

Palo Alto Networks PAN-OS 7.1.3

7.1.3

Palo Alto Networks PAN-OS 7.1.4

7.1.4

Palo Alto Networks PAN-OS 7.1.4-h2

7.1.4-h2

Palo Alto Networks PAN-OS 7.1.5

7.1.5

Palo Alto Networks PAN-OS 7.1.6

7.1.6

Palo Alto Networks PAN-OS 7.1.7

7.1.7

Palo Alto Networks PAN-OS 7.1.8

7.1.8

Palo Alto Networks PAN-OS 7.1.9

7.1.9

Palo Alto Networks PAN-OS 7.1.10

7.1.10

Palo Alto Networks PAN-OS 7.1.11

7.1.11

Palo Alto Networks PAN-OS 7.1.12

7.1.12

Palo Alto Networks PAN-OS 7.1.13

7.1.13

Palo Alto Networks PAN-OS 7.1.14

7.1.14

Palo Alto Networks PAN-OS 8.0.0

8.0.0

Palo Alto Networks PAN-OS 8.0.1

8.0.1

Palo Alto Networks PAN-OS 8.0.2

8.0.2

Palo Alto Networks PAN-OS 8.0.3

8.0.3

Palo Alto Networks PAN-OS 8.0.4

8.0.4

Palo Alto Networks PAN-OS 8.0.5

8.0.5

Palo Alto Networks PAN-OS 8.0.6

8.0.6

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.