First published: Wed Sep 09 2020(Updated: )
An information exposure through log file vulnerability where sensitive fields are recorded in the configuration log without masking on Palo Alto Networks PAN-OS software when the after-change-detail custom syslog field is enabled for configuration logs and the sensitive field appears multiple times in one log entry. The first instance of the sensitive field is masked but subsequent instances are left in clear text. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.10; PAN-OS 9.1 versions earlier than PAN-OS 9.1.4.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | >=8.1.0<=8.1.15 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.10 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.4 |
This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.10, PAN-OS 9.1.4, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2043 is an information exposure through log file vulnerability in Palo Alto Networks PAN-OS software.
CVE-2020-2043 allows sensitive fields to be recorded in the configuration log without proper masking.
The severity of CVE-2020-2043 is medium with a severity value of 3.3.
Versions 8.1.0 to 8.1.15, 9.0.0 to 9.0.10, and 9.1.0 to 9.1.4 of Palo Alto Networks PAN-OS are affected.
To fix CVE-2020-2043, upgrade to a version of Palo Alto Networks PAN-OS that is not affected by this vulnerability.