CVE-2021-3037DEPRECATED: Information Exposure Through Debug Log Files in Palo Alto Networks Pan-os

Severity
2.3LOWNVD
EPSS
0.1%
top 78.69%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 20
Latest updateMay 24

Description

An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS configuration to the destination server.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:NExploitability: 0.8 | Impact: 1.4

Affected Packages3 packages

NVDpaloaltonetworks/pan-os8.1.08.1.19+2
CVEListV5palo_alto_networks/pan-os8.18.1.19+2
Palo Altopaloalto/pan-os

🔴Vulnerability Details

2
GHSA
GHSA-5jf9-w976-2jh9: An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled confi2022-05-24
CVEList
PAN-OS: Secrets for scheduled configuration exports are logged in system logs2021-04-20

📋Vendor Advisories

1
Palo Alto
PAN-OS: Secrets for scheduled configuration exports are logged in system logs2021-04-14
CVE-2021-3037 — Palo Alto Networks Pan-os vulnerability | cvebase