4.3
CVE-2021-3031
- EPSS 0.09%
- Published 13.01.2021 18:15:14
- Last modified 21.11.2024 06:20:47
- Source psirt@paloaltonetworks.com
- Teams watchlist Login
- Open Login
Padding bytes in Ethernet packets on PA-200, PA-220, PA-500, PA-800, PA-2000 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series firewalls are not cleared before the data frame is created. This leaks a small amount of random information from the firewall memory into the Ethernet packets. An attacker on the same Ethernet subnet as the PAN-OS firewall is able to collect potentially sensitive information from these packets. This issue is also known as Etherleak and is detected by security scanners as CVE-2003-0001. This issue impacts: PAN-OS 8.1 version earlier than PAN-OS 8.1.18; PAN-OS 9.0 versions earlier than PAN-OS 9.0.12; PAN-OS 9.1 versions earlier than PAN-OS 9.1.5.
Data is provided by the National Vulnerability Database (NVD)
Paloaltonetworks ≫ Pan-os Version >= 8.1.0 < 8.1.18
Paloaltonetworks ≫ Pa-200 Version-
Paloaltonetworks ≫ Pa-2020 Version-
Paloaltonetworks ≫ Pa-2050 Version-
Paloaltonetworks ≫ Pa-220 Version-
Paloaltonetworks ≫ Pa-3020 Version-
Paloaltonetworks ≫ Pa-3050 Version-
Paloaltonetworks ≫ Pa-3060 Version-
Paloaltonetworks ≫ Pa-3220 Version-
Paloaltonetworks ≫ Pa-3250 Version-
Paloaltonetworks ≫ Pa-3260 Version-
Paloaltonetworks ≫ Pa-500 Version-
Paloaltonetworks ≫ Pa-5200 Version-
Paloaltonetworks ≫ Pa-800 Version-
Paloaltonetworks ≫ Pa-2020 Version-
Paloaltonetworks ≫ Pa-2050 Version-
Paloaltonetworks ≫ Pa-220 Version-
Paloaltonetworks ≫ Pa-3020 Version-
Paloaltonetworks ≫ Pa-3050 Version-
Paloaltonetworks ≫ Pa-3060 Version-
Paloaltonetworks ≫ Pa-3220 Version-
Paloaltonetworks ≫ Pa-3250 Version-
Paloaltonetworks ≫ Pa-3260 Version-
Paloaltonetworks ≫ Pa-500 Version-
Paloaltonetworks ≫ Pa-5200 Version-
Paloaltonetworks ≫ Pa-800 Version-
Paloaltonetworks ≫ Pan-os Version >= 9.0.0 < 9.0.12
Paloaltonetworks ≫ Pa-200 Version-
Paloaltonetworks ≫ Pa-2020 Version-
Paloaltonetworks ≫ Pa-2050 Version-
Paloaltonetworks ≫ Pa-220 Version-
Paloaltonetworks ≫ Pa-3020 Version-
Paloaltonetworks ≫ Pa-3050 Version-
Paloaltonetworks ≫ Pa-3060 Version-
Paloaltonetworks ≫ Pa-3220 Version-
Paloaltonetworks ≫ Pa-3250 Version-
Paloaltonetworks ≫ Pa-3260 Version-
Paloaltonetworks ≫ Pa-500 Version-
Paloaltonetworks ≫ Pa-5200 Version-
Paloaltonetworks ≫ Pa-800 Version-
Paloaltonetworks ≫ Pa-2020 Version-
Paloaltonetworks ≫ Pa-2050 Version-
Paloaltonetworks ≫ Pa-220 Version-
Paloaltonetworks ≫ Pa-3020 Version-
Paloaltonetworks ≫ Pa-3050 Version-
Paloaltonetworks ≫ Pa-3060 Version-
Paloaltonetworks ≫ Pa-3220 Version-
Paloaltonetworks ≫ Pa-3250 Version-
Paloaltonetworks ≫ Pa-3260 Version-
Paloaltonetworks ≫ Pa-500 Version-
Paloaltonetworks ≫ Pa-5200 Version-
Paloaltonetworks ≫ Pa-800 Version-
Paloaltonetworks ≫ Pan-os Version >= 9.1.0 < 9.1.5
Paloaltonetworks ≫ Pa-200 Version-
Paloaltonetworks ≫ Pa-2020 Version-
Paloaltonetworks ≫ Pa-2050 Version-
Paloaltonetworks ≫ Pa-220 Version-
Paloaltonetworks ≫ Pa-3020 Version-
Paloaltonetworks ≫ Pa-3050 Version-
Paloaltonetworks ≫ Pa-3060 Version-
Paloaltonetworks ≫ Pa-3220 Version-
Paloaltonetworks ≫ Pa-3250 Version-
Paloaltonetworks ≫ Pa-3260 Version-
Paloaltonetworks ≫ Pa-500 Version-
Paloaltonetworks ≫ Pa-5200 Version-
Paloaltonetworks ≫ Pa-800 Version-
Paloaltonetworks ≫ Pa-2020 Version-
Paloaltonetworks ≫ Pa-2050 Version-
Paloaltonetworks ≫ Pa-220 Version-
Paloaltonetworks ≫ Pa-3020 Version-
Paloaltonetworks ≫ Pa-3050 Version-
Paloaltonetworks ≫ Pa-3060 Version-
Paloaltonetworks ≫ Pa-3220 Version-
Paloaltonetworks ≫ Pa-3250 Version-
Paloaltonetworks ≫ Pa-3260 Version-
Paloaltonetworks ≫ Pa-500 Version-
Paloaltonetworks ≫ Pa-5200 Version-
Paloaltonetworks ≫ Pa-800 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.09% | 0.264 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 3.3 | 6.5 | 2.9 |
AV:A/AC:L/Au:N/C:P/I:N/A:N
|
psirt@paloaltonetworks.com | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
CWE-212 Improper Removal of Sensitive Information Before Storage or Transfer
The product stores, transfers, or shares a resource that contains sensitive information, but it does not properly remove that information before the product makes the resource available to unauthorized actors.