PAN-OS 9.1.5 Addressed Issues
Table of Contents
                    
          Expand All
          |
          Collapse All
        
        Next-Generation Firewall Docs
- 
                  
                  
 - 
                  
                  
 - 
                  
                  
 - 
                  
                  
 - 
                  
                  
 - 
                  
                  
 - 
                  
                  
- PAN-OS 12.1
 - PAN-OS 11.2
 - PAN-OS 11.1
 - PAN-OS 11.0 (EoL)
 - PAN-OS 10.2
 - PAN-OS 10.1
 - PAN-OS 10.0 (EoL)
 - PAN-OS 9.1 (EoL)
 - PAN-OS 9.0 (EoL)
 - PAN-OS 8.1 (EoL)
 
 - 
                  
                  
- PAN-OS 12.1
 - PAN-OS 11.2
 - PAN-OS 11.1
 - PAN-OS 10.2
 - PAN-OS 10.1
 
 
                            End-of-Life (EoL)
                        
                    
                    PAN-OS 9.1.5 Addressed Issues
PAN-OS® 9.1.5 addressed issues.
    
  Issue ID  | Description  | 
|---|---|
PAN-154092  | Added an enhancement that provides an option
to increase Data Plane Development Kit (DPDK) ring size and DPDK
queue number for VM-Series firewalls deployed on ESXi.  | 
PAN-152699  | Fixed an issue where the firewall added
a redundant 0\r\n packet while processing Clientless
VPN traffic.  | 
PAN-152285  | Fixed an issue where certain GPRS tunneling
protocol (GTP-U) sessions that could not complete installation still
occupied the flow table, which led to higher session table usage.  | 
PAN-151203  | Fixed an issue where the firewall dropped
certain GTPv1 Update PDP Context packets.  | 
PAN-151164  | Fixed an issue where logs weren't able to
be migrated from PA-5200 Series firewalls manually via the CLI.  | 
PAN-151057  | Fixed an issue where upgrading the capacity
license on a virtual machine (VM) high availability (HA) pair resulted
in both firewalls going into a non-functional state instead of only
the higher capacity license firewall.  | 
PAN-150750  | (PA-5200 and PA-7000 Series firewalls
only) Fixed an intermittent issue where the firewall dropped
packets when two or more GTP packets on the same GTP tunnel were
very close to each other.  | 
PAN-150748  | Fixed an issue where the firewall silently
dropped GTPv2-C Delete Session Response packets.  | 
PAN-150746  | Fixed an issue where the firewall dropped
GTP packets with Delete Bearer messages for EBI 6 if they were received
within two seconds of receiving the Delete Bearer messages for EBI
5.  | 
PAN-150243  | Fixed an issue where after a successful
commit, the candidate configuration was not updated to running configuration
when initiated by an API-privileges-only custom role based administrator.  | 
PAN-149839  | (PA-7000 Series firewalls only)
Added CLI commands to enable/disable resource-control groups and
CLI commands to set an upper memory limit of 8G on a process (mgmtsrvr).
To enable resource-control groups, use debug software resource-control enable and
to disable them, use debug software resource-control disable.
To set the memory limit, use debug management-server limit-memory enable,
and to remove the limit, use debug management-server limit-memory disable.
For the memory limit change to take effect, the firewall must be
rebooted.  | 
PAN-149813  | Fixed an issue where the reply to an XML
API call from Panorama was in a different format after upgrading
to PAN-OS 8.1.14-h1 and later releases, which caused automated systems
to fail the API call.  | 
PAN-149770  | Fixed an issue with debug file handling
that led to a process (mgmtsrvr) restart.  | 
PAN-149480  | Fixed an issue where, if Panorama was connected
to log collectors running an earlier release, a custom report query
from Panorama, which includes new fields not supported in prior
releases, triggered a restart on a process (reportd).  | 
PAN-149426  | Fixed an issue where non-superuser administrators
with all rights enabled were unable to Review Policies or Review
Apps for downloaded or installed content versions.  | 
PAN-149325  | Fixed an issue on Panorama where the web
interface took more time than expected to load changes when the
virtual router was large or when there was a large configuration
change request from the web interface.  | 
PAN-149296  | Fixed an issue on Panorama where system
and configuration logs of dedicated Log Collectors did not show
up on Panorama appliances in Management Only mode.  | 
PAN-149008  | Fixed an issue where the CLI command Show config running following
the CLI command set cli op-command-xml-output on produces
an unreadable output.  | 
PAN-149005  | Fixed an issue where XML API failed to fetch
logs larger than 10MB.  | 
PAN-148564  | Fixed an issue where Panorama stopped showing
new logs when url_category_list was
in the URL payload format of the HTTP(S) server profile used to
forward URL logs from the Panorama Log Collector.  | 
PAN-148087  | Fixed an issue where the object identifier
(OID) being polled for the component hrStorageUsed was not
unique after a PAN-OS upgrade.  | 
PAN-147741  | Fixed an issue where an API call for correlated
events did not return any events.  | 
PAN-147595  | Fixed an issue where, after a policy commit
and session rematch, stream control transmission protocol (SCTP)
logs for an existing SCTP session still showed old rule information.  | 
PAN-147285  | Fixed an issue where host information profile
(HIP) details were not available on Panorama even when a HIP redistribution
configuration was in place.  | 
PAN-146878  | Fixed an issue where TCP traffic dropped
due to TCP sequence checking in an HA active/active configuration
where traffic was asymmetric.  | 
PAN-146841  | Fixed an issue in Panorama where a commit-all
to the managed firewalls failed with the following error message: invalid object reference when address
objects were uploaded using an external script.  | 
PAN-146787  | Fixed an issue where traffic incorrectly
matched URL based authentication policies.  | 
PAN-146650  | A fix was made to address an authentication
bypass vulnerability in the GlobalProtect SSL VPN component of PAN-OS
that allowed an attacker to bypass all client certificate checks
with an invalid certificate. As a result, the attacker was able
to authenticate as any user and gain access to restricted VPN network
resources when the gateway or portal was configured to rely only
on certificate-based authentication (CVE-2020-2050).  | 
PAN-146623  | Fixed an issue where a GlobalProtect client
in a system with umlaut diacritics serial number was unable to log
in to the GlobalProtect gateway.  | 
PAN-146506  | Fixed an issue where memory usage on a process (useridd)
was high, which caused the process to restart on the firewall acting
as the User-ID redistribution agent. This issue occurred when multiple
clients requested IP address-to-user mappings at the same time.  | 
PAN-146284  | Fixed an issue where Application and Threat
Content installation failed on the firewall with the following error
message: Error: Threat database handler failed.  | 
PAN-146117  | Fixed an issue on the firewalls where memory
usage on a process (devsrvr) increased after running
the show object dynamic-address-group all CLI
command.  | 
PAN-146115  | Fixed an issue where GlobalProtect IPsec
connections flapped when the peer address to the gateway changed
due to NAT.  | 
PAN-146107  | Fixed an issue where memory allocation failure
caused a process (pan_comm) to restart several times,
which caused the firewall to restart.  | 
PAN-145823  | Fixed an issue where BGP learned routes
were incorrectly populated with a VR error as a next hop.  | 
PAN-145757  | Fixed an issue on the firewalls where a
process (all_pktproc) restarted while processing Session Traversal
Utilities for NAT (STUN) over TCP.  | 
PAN-145752  | Fixed an issue where exporting policies
to PDF or CSV files did not include all policies and contained duplicates.  | 
PAN-145721  | Fixed an issue where Application Command
Center (ACC) data did not load when accessed from the Top Applications widget
in the Dashboard.  | 
PAN-145507  | Fixed an issue on the firewalls where traffic
originating from a GlobalProtect user did not match HIP-based Security
policies using the cached HIP report. Instead, the traffic was denied
until the GlobalProtect agent submitted a new HIP report about 20
seconds later.  | 
PAN-145305  | Fixed an issue where an inconsistent PAN-DB
cloud connection caused the firewall to negotiate the incorrect
version and decode the cloud responses with the incorrect format.  | 
PAN-145133  | A fix was made to address a vulnerability
in the PAN-OS signature-based threat detection engine that allowed
an attacker to evade threat prevention signatures using specifically
crafted TCP packets (CVE-2020-1999).  | 
PAN-145041  | Fixed an issue on the firewalls where a
process (all_task) stopped responding.  | 
PAN-144919  | Fixed an issue on an M-600 appliance where
the Panorama management server stopped receiving new logs from firewalls
because delayed log purging caused log storage on the Log Collectors
to reach maximum capacity.  | 
PAN-144448  | Fixed an issue with the automated correlation
engine that caused firewalls to stop generating correlated event
logs for the beacon-heuristics object
(ID 6005).  | 
PAN-144232  | Fixed an issue where, when any change was
made to an authentication profile, the LDAP server or local user
database in a shared context removed the user group mapping information
from the firewall.  | 
PAN-143959  | Fixed an issue on Panorama where a custom
administrator with all rights enabled was not able to display the
content of the external dynamic list (EDL) on the Panorama web interface.  | 
PAN-143809  | Fixed an issue where Log Collectors had
problems ingesting logs for older days received at a high rate.  | 
PAN-143796  | Fixed an issue where commits failed on the
firewall due to memory allocation failure. Configuration memory
can be checked using the debug dataplane show cfg-memstat statistics CLI
command.  | 
PAN-143010  | (PA-7000 Series firewalls only)
Fixed an issue with intermittent packet loss for GlobalProtect SSL
tunnel traffic.  | 
PAN-142562  | Fixed an issue on Panorama where creating
certificates took longer than expected, which caused configuration
lock timeouts.  | 
PAN-142363  | Fixed an issue where a process (mprelay) stopped
responding and invoked an out-of-memory (OOM) killer condition and
displayed the following error messages: `tcam full` and pan_plfm_fe_cp_arp_delete.  | 
PAN-142219  | Fixed an issue where a Panorama log query
did not work for closed indices.  | 
PAN-141980  | Fixed an issue where random member ports
in a link aggregate group failed to join the aggregate group due
to the following error: Link speed mismatch.  | 
PAN-141895  | Fixed an issue that prevented GTP tunnel
session timeout values from being configured via the web interface.  | 
PAN-141793  | Fixed an issue where Panorama did not show
correct logs filtered with not, leq,
and geq.  | 
PAN-141717  | Fixed an issue where an administrative user
using custom admin roles and without access to the Device tab
was unable to expand the detailed views of Monitor > Logs.  | 
PAN-141551  | Fixed an issue where SSH service restart
management did not take effect in the SSH management server profile.  | 
PAN-141296  | Fixed an issue where a large certificate
chain transmission delayed the decryption process and did not populate
the mutual authentication cache.  | 
PAN-140900  | Fixed an issue where IP address-to-tag mapping
entries had negative time-to-live (TTL) values instead of being
removed after expiry.  | 
PAN-140883  | Fixed an issue where, after rebooting the
firewall, the SNMP object identifier (OID) for TCP connections per
second (panVsysActiveTcpCps / .1.3.6.1.4.1.25461.2.1.2.3.9.1.6.1)
returned 0 until another OID was pulled. Additionally, after a restart
of a daemon (snmpd), if the above OID was called before
other OIDs, there was an approximate 10 second delay in populating
the data pulled by each OID.  | 
PAN-140736  | Fixed an issue where configuration synchronization
failed in an HA configuration.  | 
PAN-140382  | Fixed an issue where the Host Evasion Threat
ID signature did not trigger for the initial session even after
the DNS response was received before the session expired.  | 
PAN-140227  | (PA-7000 Series firewalls only)
Fixed a rare issue where the firewall rebooted due to path monitoring
failure on the Log Processing Card (LPC).  | 
PAN-140173  | Fixed an issue where a high number of groups
in group mapping caused a process (useridd) to exit.  | 
PAN-140100  | Fixed an issue where Detailed
Log View (Monitor > Logs > Traffic)
did not display the URL filtering logs as expected on HTTP/2 stream
sessions.  | 
PAN-140084  | (PA-3200 Series firewalls only)
Fixed an issue where the default Dynamic IP and Port (DIPP) NAT
oversubscription rate was set as 2.  | 
PAN-139991  | Fixed an issue where the web interface and
the CLI were inaccessible, which caused the following error message
to display on the web interface: Timed out while getting config lock.  | 
PAN-139233  | Fixed an issue where HIP reports failed
to show up via the web interface or the CLI.  | 
PAN-139136  | Fixed an issue where a large number of groups
in group mappings caused a process (useridd) to exit.  | 
PAN-138427  | Fixed an issue where pushing a configuration
from a Panorama management server running PAN-OS 9.0 to a firewall
running PAN-OS 8.1 produced a HTTP/2 warning. To leverage this fix,
update both Panorama and the firewall to PAN-OS 9.1.5.  | 
PAN-137663  | Fixed a cosmetic issue where misleading
App-ID and rule shadowing warnings populated after a commit.  | 
PAN-137157  | Fixed an issue where Panorama became inaccessible
with the following error message: Timed out while getting config lock.  | 
PAN-135989  | Fixed an issue where the serial number was
unknown for VM-Series firewalls after upgrading from PAN-OS 8.0
to PAN-OS 8.1.  | 
PAN-135354  | Fixed an issue where the paths between the
control plane and the dataplanes in network processing cards (NPCs)
stalled in the dataplane-to-control plane direction due to the Ring
Descriptor entries becoming out of sync on each side. This produced
unrecoverable data path monitoring failures, which caused the chassis
to become nonfunctional.  | 
PAN-135071  | Fixed an issue in Panorama where the template
stack drop-down was missing templates when using access domain.
This issue is fixed only for existing template stacks.  | 
PAN-134907  | Fixed an issue where IP tags were not evaluated
in the filter evaluation criteria when Dynamic Address Groups were
configured.  | 
PAN-134745  | Fixed an issue where Panorama commits failed
due to a process (useridd) running on high file descriptors
as a large number firewalls connect to Panorama for User-ID redistribution.  | 
PAN-134226  | Fixed an issue where AdminStatus for HA1
and High Speed Chassis Interconnect (HSCI) interfaces were incorrectly
reported.  | 
PAN-133934  | Fixed an intermittent issue where user-to-IP
address mappings were not redistributed to client firewalls.  | 
PAN-131750  | Fixed an issue where a configuration push
from Panorama to the firewall showed the Commit All status
as completed even though the job was still being processed.  | 
PAN-130955  | Fixed an issue where templates on the secondary
Panorama appliance were out of sync with the primary Panorama appliance
due to an empty content-preview node.  | 
PAN-130389  | (PA-220 firewalls only) Fixed an
issue where rx-broadcast and rx-multicast interface counters were
not increasing even broadcast and/or multicast traffic was being
received.  | 
PAN-130357  | Fixed a memory leak issue where virtual
memory used by the SNMP process started to slowly increase when
the request was sent with a request-id of
0.  | 
PAN-129376  | (PA-800 Series firewalls only)
Fixed an issue that prevented ports 9-12 from being powered down
by hardware after being requested to do so.  | 
PAN-129234  | Fixed an issue where syslog connection failures
were frequently reported in system logs.  | 
PAN-128048  | Fixed an issue where certificate-based authentication
with IKEv2 IPSec tunnels failed to establish with some third-party
vendors.  | 
PAN-126353  | Fixed an issue where the XML API used to
retrieve hardware status periodically failed with a 200 OK message
and no data.  | 
PAN-125218  | A fix was made to address an information
exposure vulnerability in Panorama that disclosed the token for
the Panorama web interface administrator's session to a managed
device when the Panorama administrator performed a context switch (CVE-2020-2022).  | 
PAN-124681  | A fix was made to address a vulnerability
where Ethernet packets on PA-200, PA-220, PA-500, PA-800, PA-2000
Series, PA-3000 Series, PA-3200 Series, PA-5000 Series, PA-5200
Series, and PA-7000 Series firewalls were not cleared before the
data frame was created (CVE-2021-3031).  | 
PAN-121035  | Added support of high powered module PAN-QSFP28-100GBASE-ER4.  | 
PAN-120245  | Fixed an issue on Panorama where WildFire
cloud content download failed for content deployment to the WF-500
appliance.  | 
PAN-119982  | Fixed an issue where template variable view
failed to display some template variables when the Device
Priority type variable was configured.  | 
PAN-115541  | Fixed an issue where removing a cipher from
an SSL/TLS profile did not take effect if it was attached to the
management interface.  | 
PAN-112449  | Fixed an issue that caused a daemon (snmpd)
to hang when sending a Simple Network Management Protocol (SNMP)
GET request for LcLogUsageTable on
a Panorama appliance in Management Only mode.  | 
PAN-110423  | Fixed an issue where mounting failure occurred
and root partition reached 100%.  | 
PAN-110168  | Fixed an issue where the firewall and Panorama
web interface did not present HSTS headers to your web browser.  | 
PAN-103018  | Fixed an issue where, when defining the
match criteria for dynamic address groups on Panorama, the boolean
AND/OR operators did not function properly.  |