CVE-2020-1992
PAN-OS vulnerability analysis and mitigation

Overview

A format string vulnerability (CVE-2020-1992) was discovered in the Varrcvr daemon of PAN-OS on PA-7000 Series devices with a Log Forwarding Card (LFC). The vulnerability affects Palo Alto Networks PAN-OS versions 9.0 (before 9.0.7) and 9.1 (before 9.1.2) specifically on PA-7000 Series devices with an LFC installed and configured. The issue requires WildFire services to be configured and enabled, and does not affect PAN-OS 8.1 and earlier releases or any other PA Series firewalls (Palo Advisory).

Technical details

The vulnerability is classified as a format string vulnerability (CWE-134) that could allow remote attackers to exploit the Varrcvr daemon. The CVSS v3.1 base score is 8.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating that the attack requires network access, has high attack complexity, requires no privileges or user interaction, and can result in high impacts to confidentiality, integrity, and availability (NVD, Palo Advisory).

Impact

If successfully exploited, the vulnerability can allow attackers to crash the Varrcvr daemon, creating a denial of service condition. More critically, there is potential for attackers to execute code with root privileges on affected systems (Palo Advisory).

Mitigation and workarounds

The vulnerability has been fixed in PAN-OS versions 9.0.7, 9.1.2, and all later versions. Palo Alto Networks has stated that there are no viable workarounds for this issue, making updating to a patched version the only effective mitigation (Palo Advisory).

Community reactions

The vulnerability was discovered in production use by a customer of Palo Alto Networks (Palo Advisory).

Additional resources


SourceThis report was generated using AI

Related PAN-OS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-4231HIGH8.6
  • PAN-OSPAN-OS
  • cpe:2.3:o:paloaltonetworks:pan-os
NoYesJun 13, 2025
CVE-2025-4230HIGH8.4
  • PAN-OSPAN-OS
  • cpe:2.3:o:paloaltonetworks:pan-os
NoYesJun 13, 2025
CVE-2025-4615HIGH7
  • PAN-OSPAN-OS
  • cpe:2.3:o:paloaltonetworks:pan-os
NoYesOct 09, 2025
CVE-2026-0227MEDIUM6.6
  • PAN-OSPAN-OS
  • cpe:2.3:o:paloaltonetworks:pan-os
NoYesJan 15, 2026
CVE-2025-4614MEDIUM4.8
  • PAN-OSPAN-OS
  • cpe:2.3:o:paloaltonetworks:pan-os
NoYesOct 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management