CVE-2021-3036Log File Information Exposure in Palo Alto Networks Pan-os

Severity
4.4MEDIUMNVD
EPSS
0.1%
top 65.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 20
Latest updateMay 24

Description

An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to use the PAN-OS XML API and exists only when a client includes a duplicate API parameter in API requests. Logged information includes the cleartext username, password, and API key of the administrator ma

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:NExploitability: 0.8 | Impact: 3.6

Affected Packages3 packages

NVDpaloaltonetworks/pan-os8.1.08.1.19+3
CVEListV5palo_alto_networks/pan-os8.18.1.19+3
Palo Altopaloalto/pan-os

🔴Vulnerability Details

2
GHSA
GHSA-r794-wg43-vp3f: An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logge2022-05-24
CVEList
PAN-OS: Administrator secrets are logged in web server logs when using the PAN-OS XML API incorrectly2021-04-20

📋Vendor Advisories

1
Palo Alto
PAN-OS: Administrator secrets are logged in web server logs when using the PAN-OS XML API incorrectly2021-04-14
CVE-2021-3036 — Log File Information Exposure in Palo | cvebase