CVE-2021-3037

An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS configuration to the destination server.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*

History

24 Apr 2021, 02:54

Type Values Removed Values Added
CWE CWE-532
References (MISC) https://security.paloaltonetworks.com/CVE-2021-3037 - (MISC) https://security.paloaltonetworks.com/CVE-2021-3037 - Vendor Advisory
CVSS v2 : unknown
v3 : 2.3
v2 : 2.1
v3 : 2.3
CPE cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*

20 Apr 2021, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-04-20 04:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-3037

Mitre link : CVE-2021-3037

CVE.ORG link : CVE-2021-3037


JSON object : View

Products Affected

paloaltonetworks

  • pan-os
CWE
CWE-532

Insertion of Sensitive Information into Log File

CWE-534

DEPRECATED: Information Exposure Through Debug Log Files