PAN-OS 8.1.15 Addressed Issues
Focus
Focus

PAN-OS 8.1.15 Addressed Issues

Table of Contents
End-of-Life (EoL)

PAN-OS 8.1.15 Addressed Issues

PAN-OS® 8.1.15 addressed issues.
Issue ID
Description
WF500-5320
Fixed an issue where the WF-500 cluster did not synchronize verdicts after successful verdict recheck queries with the WildFire global cloud.
WF500-4716
Fixed an intermittent issue on WildFire appliances where failure to purge old sample information to make room for new samples caused a cluster to be unavailable.
PAN-148988
A fix was made to address a Security Assertion Markup Language (SAML) authentication issue (CVE-2020-2021).
PAN-148068
Fixed an issue where SSL connections were blocked if you enabled decryption with the option to block sessions that have expired certificates. This issue included servers that sent an expired AddTrust certificate authority (CA) in the certificate chain.
PAN-144782
Fixed an issue where a configuration audit created a large number of opresult.out files, which filled up the session/pan/user_tmp directory in opt/pancfg. This caused a slow Panorama response until a device restart was performed or the files were manually deleted from the root of the device.
PAN-144479
Fixed an issue where SNMP objects from the HOST-RESOURCES-MIB returned incorrect values when queried.
PAN-144251
(PA-7000 Series firewalls only) Fixed an issue where SSL decryption failed due to memory allocation failure.
PAN-143957
Fixed an issue where, after loading a saved configuration snapshot by API, a custom role-based administrator required Superuser privileges to perform a full commit.
PAN-142346
Fixed an issue where the YARA version caused the WF-500 appliance virtual machine controllers to stop responding.
PAN-142249
Fixed an issue where WildFire submission reports could not be viewed when the firewall was using the public WildFire cloud.
PAN-142031
Fixed an issue where a process (configd) failed to restart even when Panorama displayed the following message: virtual memory exceeded, restarting.
PAN-145195, PAN-145151, PAN-145150, and PAN-145149
A fix was made to address a buffer overflow vulnerability in PAN-OS that allowed an unauthenticated attacker to disrupt system processes and potentially execute arbitrary code with root privileges by sending a malicious request to the Captive Portal or Multi-Factor Authentication interface (CVE-2020-2040).
PAN-141563
Fixed an issue where Slot 8 path monitoring failure occurred due to a memory buildup in a process (logrcvr) that was caused by slow communication and connection between log forwarding and Cortex Data Lake.
PAN-140846
Fixed an issue where the dataplane restarted during a commit when Netflow was enabled.
PAN-140386
Fixed an intermittent issue where the firewall used IP addresses instead of domain names for URL category lookup after upgrading to 9.0.6.
PAN-139935
Fixed an issue in the URL process where a process (devsrvr) stopped responding.
PAN-139587
(PA-5200 Series and PA-7000 Series firewalls only) Fixed an issue where high and continuous CPU utilization was seen on dataplanes after IPSec Encapsulating Security Payload (ESP) rekeying occurred for multiple tunnels.
PAN-138870
Fixed an issue where a process (configd) restarted and administrators received one of the following error messages: Timed out while getting config lock. Please try again or Please wait while the server reboots... due to a database error.
PAN-138813
Fixed a performance drop issue seen when using API to configure larger sets of objects (more than 25 objects).
PAN-138739
Fixed an issue where, in a high availability (HA) active/active configuration in a virtual wire deployment with asymmetric traffic, decryption did not work for some sites.
PAN-138648
Fixed an issue with internal buffer and file sizes where logs were discarded due to slow log purging when the incoming log rate was high.
PAN-137966
Fixed a configuration lock issue where Panorama timed out due to a process (configd) being unable to read another process (mongod).
PAN-137387
Fixed an issue where URL filtering used the IP address instead of the hostname, which led to incorrect URL categorization.
PAN-136649
Fixed an issue where PA-7000 20GXM and PA-7000 20GQXM Network Processing Cards (NPCs) failed to process some sessions for Layer 7 inspection due to internal maximum threshold value that was not set.
PAN-136612
Fixed an issue where fragmented packets leaked, which caused the depletion of Work Query Entry (WQE) pools.
PAN-136608
Fixed an issue in Panorama where the Security policy Target displayed the serial number of the targeted device instead of the hostname.
PAN-136390
(PA-7000 Series with 100GB NPC only) Fixed an issue during firewall bootup where the following error message: Bootloader upgrade failed, ret 255 appeared when small form-factor pluggable (SFP) modules were installed.
PAN-135141
Fixed an issue where the Log Processing Card (LPC) did not come up intermittently in a fully loaded PA-7000 Series.
PAN-135039
Fixed an issue in Panorama where a memory leak occurred during an HA sync commit.
PAN-134309
Fixed an issue where a process (devsrvr) restarted when it hit the limit of the number of custom patterns available in the allocated memory.
PAN-133411
Fixed an issue where after making configuration changes and selecting Preview Changes, a 500 Internal Server Error message displayed due to a memory leak.
PAN-132712
Fixed an issue where scheduled reports did not run on a PA-7000 Series firewall not managed by Panorama after upgrade to 8.1.10 or 9.0.4 and later versions.
PAN-132047
Fixed a rare issue where log forwarding from a PA-7080 firewall to an M-600 appliance appeared to slow or fail due to an elastic search error.
PAN-131792
Fixed an issue where the Name log filter (Monitor > Logs > Traffic) was not maintained when viewing the Log Viewer for a Security policy rule (Policies > Security) from the drop-down.
PAN-130776
Fixed an issue on Panorama where Applications and Threats content update deployment failed due to the content version date check.
PAN-128195
Fixed an issue on Panorama where processes (vld) ran on high CPU when the incoming system log rate was 0.
PAN-128078
Fixed an issue where a process (mgmtsrvr) stopped responding and was inaccessible through SSH or HTTPS until the firewall was power cycled.
PAN-127358
Fixed an issue with a memory leak in a process (configd) where virtual memory exceeded the limit, which caused the process to restart.
PAN-127260
Fixed an issue where the /opt/pancfg partition became full due to a large amount of botnet reports that were not automatically deleted.
PAN-126944
Fixed an issue where the Panorama Template did not allow for Ethernet Interface Link Speed configurations greater than 1,000Mbps.
PAN-120614
Fixed an issue where a commit from a Panorama appliance running PAN-OS 9.1 to a managed firewall running PAN-OS 9.0 or earlier failed with the following error message in ms.log: error generating tranform ike-pre-transform.xsl.
PAN-120454
Fixed an issue where the firewall did not fail over to the secondary LDAP server when the primary LDAP server was not reachable and the configured LDAP bind timeout was not properly honored when SSL protocol was used.
PAN-120113
Fixed an issue where the to, from, and subject fields did not populate in the threat logs if the fields were out of order.
PAN-120105
Fixed an issue where email header information intermittently was not present in threat logs.
PAN-119645
Fixed an issue where a process (panio) used unnecessary memory and caused an out-of-memory (OOM) condition on the dataplane if the dataplane was already low on memory.
PAN-119289
Fixed an issue on Panorama M-Series and virtual appliances where you were unable to query Cortex Data Lake by the serial number filter.
PAN-117606
Fixed an issue where a process (configd) crashed while making configuration changes on Panorama.
PAN-117487
Fixed an issue where a process (mgmtsrvr) stopped responding due to a memory corruption issue when acquiring a configuration lock.
PAN-117359
(Firewalls with an AutoFocus license only) Fixed an issue where AutoFocus threat intelligence did not display when hovering over source and destination addresses in the logs when you configure a service route or proxy.
PAN-117075
Fixed an issue where the firewall did not process the TLS record in SSL Inbound Inspection as expected, which introduced out-of-order packets in the transmit stage packet capture and affected client performance while accessing HTTP video applications.
PAN-116002
Fixed an issue where an incorrect optimization could cause IP address-to-user mapping to not update within 60 seconds.
PAN-115093
Fixed an issue where the firewall generated excessive logs for content decoder (CTD) errors.
PAN-115035
Fixed a rare issue where Traffic logs, Threat logs and URL filtering logs stopped generating.
PAN-112120
Fixed an issue where threat Name field of a threat Custom Report displayed the threat ID instead of the threat name.
PAN-108929
Fixed an issue where software deployment failed for managed devices.
PAN-106773
Fixed an issue where Panorama was unable to access api.threatvault.paloaltonetworks.com with the configure proxy option.
PAN-106763
Fixed an issue where the dataplane crashed while freeing up memory due to a corrupted or long certificate field in the handshake.
PAN-104368
Fixed an issue where a daemon (routed) stopped responding when authentication was used for RIP.
PAN-103290
(PA-3200 Series firewalls only) Fixed an issue where the firewall stopped recording dataplane diagnostic data in dp-monitor.log after a few hours of uptime.
PAN-102202
Fixed an issue where the OSPF summary Link State Advertisement (LSA) for the default 0.0.0.0/0 route were not advertised by the Area Border Router (ABR).
PAN-98933
Fixed an issue on an M-Series appliances in an HA active/passive configuration where the schedules (Device > Dynamic Updates) were unresponsive after a failover or restart of Panorama.
PAN-98863
Fixed an issue where a process (routed) restarted when navigating through OSPF tabs in Virtual Routers.
PAN-98628
Fixed an issue where debug software pprof service <service-name> CLI command did not yield any data.