An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS configuration to the destination server.
Metrics
Affected Vendors & Products
Fixes
Solution
This issue is fixed in PAN-OS 8.1.19, PAN-OS 9.0.13, PAN-OS 9.1.4, and all later PAN-OS versions. After you upgrade the PAN-OS appliance, you must change the connection details used in scheduled configuration exports. You should also change the credentials on the destination server that are used to export the configuration.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://security.paloaltonetworks.com/CVE-2021-3037 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-16T23:51:58.522Z
Reserved: 2021-01-06T00:00:00
Link: CVE-2021-3037

No data.

Status : Modified
Published: 2021-04-20T04:15:12.760
Modified: 2024-11-21T06:20:48.697
Link: CVE-2021-3037

No data.

No data.