Lucene search

K
paloaltoPalo Alto Networks Product Security Incident Response TeamPA-CVE-2021-3036
HistoryApr 14, 2021 - 4:00 p.m.

PAN-OS: Administrator secrets are logged in web server logs when using the PAN-OS XML API incorrectly

2021-04-1416:00:00
Palo Alto Networks Product Security Incident Response Team
securityadvisories.paloaltonetworks.com
32

0.0004 Low

EPSS

Percentile

12.1%

An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly.

This vulnerability applies only to PAN-OS appliances that are configured to use the PAN-OS XML API and exists only when a client includes a duplicate API parameter in API requests.

Logged information includes the cleartext username, password, and API key of the administrator making the PAN-OS XML API request.

Work around:
You must change the passwords and generate a new API key for all impacted PAN-OS administrators. Confirm that there aren’t any PAN-OS XML API requests that repeat API parameters in the request.

0.0004 Low

EPSS

Percentile

12.1%

Related for PA-CVE-2021-3036