4.4
CVE-2021-3036
- EPSS 0.14%
- Veröffentlicht 20.04.2021 04:15:12
- Zuletzt bearbeitet 21.11.2024 06:20:48
- Quelle psirt@paloaltonetworks.com
- Teams Watchlist Login
- Unerledigt Login
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to use the PAN-OS XML API and exists only when a client includes a duplicate API parameter in API requests. Logged information includes the cleartext username, password, and API key of the administrator making the PAN-OS XML API request.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Paloaltonetworks ≫ Pan-os Version >= 8.1.0 < 8.1.19
Paloaltonetworks ≫ Pan-os Version >= 9.0.0 < 9.0.12
Paloaltonetworks ≫ Pan-os Version >= 9.1.0 < 9.1.6
Paloaltonetworks ≫ Pan-os Version >= 10.0.0 < 10.0.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.14% | 0.353 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 2.1 | 3.9 | 2.9 |
AV:L/AC:L/Au:N/C:P/I:N/A:N
|
psirt@paloaltonetworks.com | 4.4 | 0.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|
CWE-532 Insertion of Sensitive Information into Log File
The product writes sensitive information to a log file.