// For flags

CVE-2021-3037

PAN-OS: Secrets for scheduled configuration exports are logged in system logs

Severity Score

2.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS configuration to the destination server.

Se presenta una vulnerabilidad de exposición de información por medio de archivos de registro en el software PAN-OS de Palo Alto Networks, donde los detalles de conexión para una exportación de configuración programada son registrados en registros del sistema. La información registrada incluye el nombre de usuario en texto sin cifrar, la contraseña y la dirección IP usada para exportar la configuración de PAN-OS al servidor de destino

*Credits: This issue was found by a customer of Palo Alto Networks during a security review.
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-01-06 CVE Reserved
  • 2021-04-20 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-532: Insertion of Sensitive Information into Log File
  • CWE-534: DEPRECATED: Information Exposure Through Debug Log Files
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Paloaltonetworks
Search vendor "Paloaltonetworks"
Pan-os
Search vendor "Paloaltonetworks" for product "Pan-os"
>= 8.1.0 < 8.1.19
Search vendor "Paloaltonetworks" for product "Pan-os" and version " >= 8.1.0 < 8.1.19"
-
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Pan-os
Search vendor "Paloaltonetworks" for product "Pan-os"
>= 9.0.0 < 9.0.13
Search vendor "Paloaltonetworks" for product "Pan-os" and version " >= 9.0.0 < 9.0.13"
-
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Pan-os
Search vendor "Paloaltonetworks" for product "Pan-os"
>= 9.1.0 < 9.1.4
Search vendor "Paloaltonetworks" for product "Pan-os" and version " >= 9.1.0 < 9.1.4"
-
Affected