Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-22069 | An information exposure through log file vulnerability where sensitive fields are recorded in the configuration log without masking on Palo Alto Networks PAN-OS software when the after-change-detail custom syslog field is enabled for configuration logs and the sensitive field appears multiple times in one log entry. The first instance of the sensitive field is masked but subsequent instances are left in clear text. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.10; PAN-OS 9.1 versions earlier than PAN-OS 9.1.4. |
Solution
This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.10, PAN-OS 9.1.4, and all later PAN-OS versions.
Workaround
This issue requires access to PAN-OS log files generated in the system. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2020-2043 |
|
No history.
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-16T22:08:43.659Z
Reserved: 2019-12-04T00:00:00
Link: CVE-2020-2043
No data.
Status : Modified
Published: 2020-09-09T17:15:26.213
Modified: 2024-11-21T05:24:32.427
Link: CVE-2020-2043
No data.
OpenCVE Enrichment
No data.
EUVD