CVE-2025-2182 — Cleartext Storage of Sensitive Info in Palo Alto Networks Pan-os
Severity
5.6MEDIUMNVD
EPSS
0.0%
top 97.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 13
Description
A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity association key (CAK). This issue is only applicable to PA-7500 Series devices which are in an NGFW cluster.
A user who possesses this key can read messages being sent between devices in a NGFW Cluster. There is no impact in non-clustered firewalls or clusters of firewalls that do not enable MACsec.
CVSS vector
CVSS:4.0/AV:P/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
Affected Packages1 packages
🔴Vulnerability Details
2GHSA▶
GHSA-75rp-wjf6-546r: A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity associati↗2025-08-13
CVEList▶
PAN-OS: Firewall Clusters using the MACsec Protocol Expose the Connectivity Association Key (CAK)↗2025-08-13