
Cloud Vulnerability DB
A community-led vulnerabilities database
An insecure temporary file vulnerability (CVE-2020-1991) was discovered in Palo Alto Networks Traps that affects Windows systems. The vulnerability was disclosed on April 8, 2020, and impacts Palo Alto Networks Traps versions 5.0 (before 5.0.8) and 6.1 (before 6.1.4) on Windows platforms. The issue does not affect Cortex XDR 7.0 or Traps installations on Linux and MacOS (Palo Alto Advisory).
The vulnerability is classified as CWE-377 (Insecure Temporary File) with a CVSS v3.1 Base Score of 7.8 (HIGH). The attack vector is local (AV:L), with low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The scope is unchanged (S:U), with high impacts on confidentiality (C:H), integrity (I:H), and availability (A:H) (Palo Alto Advisory).
If exploited, this vulnerability allows a local authenticated Windows user to escalate privileges or overwrite system files. The high severity rating indicates significant potential impact on system security (Palo Alto Advisory).
The vulnerability has been fixed in Traps versions 5.0.8 and 6.1.4. Palo Alto Networks has indicated that there are no viable workarounds for this issue, making updating to the patched versions the only effective mitigation strategy (Palo Alto Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."