Lucene search

K
paloaltoPalo Alto Networks Product Security Incident Response TeamPA-CVE-2024-5916
HistoryAug 14, 2024 - 4:00 p.m.

PAN-OS: Cleartext Exposure of External System Secrets

2024-08-1416:00:00
Palo Alto Networks Product Security Incident Response Team
securityadvisories.paloaltonetworks.com
3
pan-os
vulnerability
disclose
external systems
passwords
tokens
administrator

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

CVSS4

6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

PASSIVE

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/SC:H/VI:N/SI:N/VA:N/SA:N/AU:N/U:Amber/R:U/V:C/RE:H

AI Score

6.2

Confidence

Low

An information exposure vulnerability in Palo Alto Networks PAN-OS software enables a local system administrator to unintentionally disclose secrets, passwords, and tokens of external systems. A read-only administrator who has access to the config log, can read secrets, passwords, and tokens to external systems.

Work around:
No work around available.

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

CVSS4

6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

PASSIVE

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/SC:H/VI:N/SI:N/VA:N/SA:N/AU:N/U:Amber/R:U/V:C/RE:H

AI Score

6.2

Confidence

Low

Related for PA-CVE-2024-5916