CVE-2021-3036 — Log File Information Exposure in Palo Alto Networks Pan-os
Severity
4.4MEDIUMNVD
EPSS
0.1%
top 65.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 20
Latest updateMay 24
Description
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to use the PAN-OS XML API and exists only when a client includes a duplicate API parameter in API requests. Logged information includes the cleartext username, password, and API key of the administrator ma…
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:NExploitability: 0.8 | Impact: 3.6
Affected Packages3 packages
🔴Vulnerability Details
2GHSA▶
GHSA-r794-wg43-vp3f: An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logge↗2022-05-24
CVEList▶
PAN-OS: Administrator secrets are logged in web server logs when using the PAN-OS XML API incorrectly↗2021-04-20
📋Vendor Advisories
1Palo Alto▶
PAN-OS: Administrator secrets are logged in web server logs when using the PAN-OS XML API incorrectly↗2021-04-14