CVE-2025-2182Cleartext Storage of Sensitive Info in Palo Alto Networks Pan-os

Severity
5.6MEDIUMNVD
EPSS
0.0%
top 97.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 13

Description

A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity association key (CAK). This issue is only applicable to PA-7500 Series devices which are in an NGFW cluster. A user who possesses this key can read messages being sent between devices in a NGFW Cluster. There is no impact in non-clustered firewalls or clusters of firewalls that do not enable MACsec.

CVSS vector

CVSS:4.0/AV:P/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

Affected Packages1 packages

CVEListV5palo_alto_networks/pan-os11.2.011.2.8+1

🔴Vulnerability Details

2
GHSA
GHSA-75rp-wjf6-546r: A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity associati2025-08-13
CVEList
PAN-OS: Firewall Clusters using the MACsec Protocol Expose the Connectivity Association Key (CAK)2025-08-13

📋Vendor Advisories

1
Microsoft
Heap-based Buffer Overflow in vim/vim2022-06-14
CVE-2025-2182 — Cleartext Storage of Sensitive Info | cvebase