{"vulnerability": "CVE-2020-2034", "sightings": [{"uuid": "75600c84-7eb7-43ab-bc3f-203127c2582a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2020-2034", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/kriittinen-haavoittuvuus-palo-alton-verkkolaitteissa", "content": "", "creation_timestamp": "2026-03-17T14:50:10.270204Z"}, {"uuid": "61cd9033-ed4b-4705-8335-21f8c2619b2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2020-2034", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/kriittinen-haavoittuvuus-palo-alton-verkkolaitteissa", "content": "", "creation_timestamp": "2020-06-30T14:21:48.000000Z"}, {"uuid": "42d9be87-bc4c-4881-8145-29c748aed1d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-2034", "type": "seen", "source": "https://t.me/SecLabNews/8054", "content": "\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Palo Alto Networks \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0435 \u043e\u043f\u0430\u0441\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2020-2034) \u0432 \u043a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u043e\u043c \u0440\u0435\u0448\u0435\u043d\u0438\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 PAN-OS GlobalProtect. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434 \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0441 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u0441\u0443\u043f\u0435\u0440\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f. \u041f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043c\u0435\u043d\u0435\u0435 \u043e\u043f\u0430\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c (CVE-2020-2031, CVE-2020-2030 \u0438 CVE-2020-1982), \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0434\u0435\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u0442\u044c TLS-\u0442\u0440\u0430\u0444\u0438\u043a, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0438\u043b\u0438 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0438\u0442\u044c DoS-\u0430\u0442\u0430\u043a\u0438.    \n\u041e\u0431\u0437\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e: 10 \u0438\u044e\u043b\u044f 2020 \u0433\u043e\u0434\u0430", "creation_timestamp": "2020-07-13T17:35:05.000000Z"}, {"uuid": "fac30399-e84f-41a0-9708-d5533893a6cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-2034", "type": "seen", "source": "MISP/766706df-0884-40c4-b3c0-eccb029f298d", "content": "", "creation_timestamp": "2024-11-14T06:10:16.000000Z"}, {"uuid": "b3f68af2-8d44-4754-b0e9-98a38d9b5064", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-20340", "type": "seen", "source": "https://t.me/cibsecurity/28193", "content": "\u203c CVE-2020-20340 \u203c\n\nA SQL injection vulnerability in the 4.edu.php\\conn\\function.php component of S-CMS v1.0 allows attackers to access sensitive database information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-02T00:35:12.000000Z"}, {"uuid": "bfb39080-3d8a-4d03-90a8-b6047a3a242e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-20341", "type": "seen", "source": "https://t.me/cibsecurity/28197", "content": "\u203c CVE-2020-20341 \u203c\n\nYzmCMS v5.5 contains a server-side request forgery (SSRF) in the grab_image() function.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-02T00:35:26.000000Z"}, {"uuid": "6c717d0b-15a5-4f4e-b443-116bc1929979", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-2034", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1746", "content": "CVE-2020-2034:\nAn OS Command Injection vulnerability in the PAN-OS (&lt;9.1.3, &lt;9.0.9, &lt;8.1.15, 8.0, 7.1) GlobalProtect portal allows an unauthenticated network-based attacker to execute arbitrary OS commands with root privileges\nhttps://security.paloaltonetworks.com/CVE-2020-2034\nPoC\nto determine the version used by the Palo Alto Network Firewall, by examining the etag from a curl scan on their favicon, and login.esp:\nhttps://github.com/blackhatethicalhacking/CVE-2020-2034-POC", "creation_timestamp": "2020-09-14T11:10:04.000000Z"}, {"uuid": "3bdcdaec-efd8-4011-96b5-70e7a7f1eb34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-2034", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lvh2scjbyk2f", "content": "", "creation_timestamp": "2025-08-02T21:02:19.663614Z"}]}