An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS configuration to the destination server.
Fixes

Solution

This issue is fixed in PAN-OS 8.1.19, PAN-OS 9.0.13, PAN-OS 9.1.4, and all later PAN-OS versions. After you upgrade the PAN-OS appliance, you must change the connection details used in scheduled configuration exports. You should also change the credentials on the destination server that are used to export the configuration.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2024-09-16T23:51:58.522Z

Reserved: 2021-01-06T00:00:00

Link: CVE-2021-3037

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-20T04:15:12.760

Modified: 2024-11-21T06:20:48.697

Link: CVE-2021-3037

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.