An authentication bypass by spoofing vulnerability exists in the authentication daemon and User-ID components of Palo Alto Networks PAN-OS by failing to verify the integrity of the Kerberos key distribution center (KDC) before authenticating users. This affects all forms of authentication that use a Kerberos authentication profile. A man-in-the-middle type of attacker with the ability to intercept communication between PAN-OS and KDC can login to PAN-OS as an administrator. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.6; All version of PAN-OS 8.0.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://security.paloaltonetworks.com/CVE-2020-2002 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-17T04:03:36.143Z
Reserved: 2019-12-04T00:00:00
Link: CVE-2020-2002

No data.

Status : Modified
Published: 2020-05-13T19:15:12.987
Modified: 2024-11-21T05:24:24.980
Link: CVE-2020-2002

No data.