{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Cortex XSOAR PowerShell Image versions 7.1.x ant\u00e9rieures \u00e0 7.1.3.20270","product":{"name":"Cortex XSOAR","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 10.1.x ant\u00e9rieures \u00e0 10.1.2","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 9.1.x ant\u00e9rieures \u00e0 9.1.11","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 10.0.x ant\u00e9rieures \u00e0 10.0.8","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 8.1.x ant\u00e9rieures \u00e0 8.1.19","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 9.0.x ant\u00e9rieures \u00e0 9.0.15","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2021-3045","url":"https://www.cve.org/CVERecord?id=CVE-2021-3045"},{"name":"CVE-2020-1971","url":"https://www.cve.org/CVERecord?id=CVE-2020-1971"},{"name":"CVE-2021-3050","url":"https://www.cve.org/CVERecord?id=CVE-2021-3050"},{"name":"CVE-2021-26701","url":"https://www.cve.org/CVERecord?id=CVE-2021-26701"},{"name":"CVE-2021-3048","url":"https://www.cve.org/CVERecord?id=CVE-2021-3048"},{"name":"CVE-2021-3046","url":"https://www.cve.org/CVERecord?id=CVE-2021-3046"},{"name":"CVE-2021-3047","url":"https://www.cve.org/CVERecord?id=CVE-2021-3047"}],"links":[],"reference":"CERTFR-2021-AVI-621","revisions":[{"description":"Version initiale","revision_date":"2021-08-12T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Palo\nAlto Networks. Certaines d'entre elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Palo Alto Networks","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-3045 du 11 ao\u00fbt 2021","url":"https://security.paloaltonetworks.com/CVE-2021-3045"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-3048 du 11 ao\u00fbt 2021","url":"https://security.paloaltonetworks.com/CVE-2021-3048"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-3047 du 11 ao\u00fbt 2021","url":"https://security.paloaltonetworks.com/CVE-2021-3047"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks PAN-SA-2021-0005 du 11 ao\u00fbt 2021","url":"https://security.paloaltonetworks.com/PAN-SA-2021-0005"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-3046 du 11 ao\u00fbt 2021","url":"https://security.paloaltonetworks.com/CVE-2021-3046"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-26701 du 11 ao\u00fbt 2021","url":"https://security.paloaltonetworks.com/CVE-2021-26701"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2021-3050 du 11 ao\u00fbt 2021","url":"https://security.paloaltonetworks.com/CVE-2021-3050"}]}
