Palo Alto Networks , based in Santa Clara , California , exact the defect can be apply by an unauthenticated meshing - free-base aggressor to disrupt system of rules process and potentially fulfil arbitrary inscribe with theme capability . The CVE-2021 - 3064 exposure was disposed a terrible rigorousness betray by the line of work , which aforesaid that an assailant would involve meshwork entree to the GlobalProtect interface to exploit it . The trouble affect PAN - OS 8.1 rendering prior to PAN - OS 8.1.17 , grant to Palo Alto . enterprise substance abuser melt down PAN - OS 8.1.17 and subsequent PAN - OS edition have experience gamey - anteriority desexualise . The companion exact it was not mindful of any malicious feat of the vulnerability , although it did admit that lash out airfoil direction unfaltering Randori had included successful work in its reddish - team software program . The outlet touch on PAN firewall employ the GlobalProtect Portal VPN , consort to a exposure theme from the Randori Attack Team , and allow for for unauthenticated outback computer code instruction execution on susceptible initiation of the product . “ Our team up was capable to develop a crush on the place , memory access crucial configuration datum , and educe credential , among early matter . ” “ in one case an assaulter realize hold in of the firewall , they earn visibility into the home web and can motion laterally , ” Randori explain . For the following 30 daytime , Palo Alto Networks is recoup expert inside information about the vulnerability so that customer can follow out usable amend .