Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-8390 : What You Need to Know

Learn about CVE-2017-8390, a vulnerability in Palo Alto Networks PAN-OS versions prior to specified versions allowing remote code execution. Find mitigation steps and affected systems here.

A vulnerability exists in the DNS Proxy of Palo Alto Networks PAN-OS versions earlier than 6.1.18, 7.x versions earlier than 7.0.16, 7.1.x versions earlier than 7.1.11, and 8.x versions earlier than 8.0.3. This vulnerability could potentially enable remote attackers to execute arbitrary code by exploiting a domain name that has been crafted in a specific manner.

Understanding CVE-2017-8390

This CVE-2017-8390 vulnerability affects Palo Alto Networks PAN-OS versions prior to specified versions, allowing remote attackers to execute arbitrary code.

What is CVE-2017-8390?

The vulnerability in the DNS Proxy of Palo Alto Networks PAN-OS versions earlier than specific versions allows attackers to execute arbitrary code through a manipulated domain name.

The Impact of CVE-2017-8390

This vulnerability could lead to remote code execution by malicious actors exploiting crafted domain names.

Technical Details of CVE-2017-8390

The technical aspects of the vulnerability are as follows:

Vulnerability Description

The DNS Proxy in Palo Alto Networks PAN-OS before 6.1.18, 7.x before 7.0.16, 7.1.x before 7.1.11, and 8.x before 8.0.3 allows remote attackers to execute arbitrary code via a crafted domain name.

Affected Systems and Versions

        Palo Alto Networks PAN-OS versions earlier than 6.1.18
        7.x versions earlier than 7.0.16
        7.1.x versions earlier than 7.1.11
        8.x versions earlier than 8.0.3

Exploitation Mechanism

The vulnerability can be exploited by remote attackers through the manipulation of domain names to execute arbitrary code.

Mitigation and Prevention

To address CVE-2017-8390, the following steps are recommended:

Immediate Steps to Take

        Update Palo Alto Networks PAN-OS to versions 6.1.18, 7.0.16, 7.1.11, or 8.0.3 or later.
        Monitor network traffic for any suspicious activity.

Long-Term Security Practices

        Regularly update and patch all software and systems.
        Implement network segmentation to limit the impact of potential attacks.

Patching and Updates

        Apply security patches provided by Palo Alto Networks promptly to mitigate the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now