Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-22074 | An information exposure through log file vulnerability exists where the password for the configured system proxy server for a PAN-OS appliance may be displayed in cleartext when using the CLI in Palo Alto Networks PAN-OS software. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.2. |
Solution
This issue is fixed in PAN-OS 8.1.17, PAN-OS 9.0.11, PAN-OS 9.1.2, and all later PAN-OS versions.
Workaround
This issue impacts the management web interface. You can mitigate the impact of this issue by following best practices for securing the interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2020-2048 |
|
No history.
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-17T01:26:02.418Z
Reserved: 2019-12-04T00:00:00
Link: CVE-2020-2048
No data.
Status : Modified
Published: 2020-11-12T00:15:10.567
Modified: 2024-11-21T05:24:32.870
Link: CVE-2020-2048
No data.
OpenCVE Enrichment
No data.
EUVD