First published: Thu Nov 12 2020(Updated: )
An information exposure through log file vulnerability exists where the password for the configured system proxy server for a PAN-OS appliance may be displayed in cleartext when using the CLI in Palo Alto Networks PAN-OS software. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.2.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | >=8.1.0<8.1.17 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.11 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.2 |
This issue is fixed in PAN-OS 8.1.17, PAN-OS 9.0.11, PAN-OS 9.1.2, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2048 is a vulnerability that allows an attacker to view the password for the configured system proxy server in cleartext.
CVE-2020-2048 has a severity value of 3.3, which is considered low.
PAN-OS 8.1 versions earlier than 8.1.17, PAN-OS 9.0 versions earlier than 9.0.11, and PAN-OS 9.1 versions earlier than 9.1.2 are affected by CVE-2020-2048.
An attacker can exploit CVE-2020-2048 by using the CLI in Palo Alto Networks PAN-OS software to view the password for the configured system proxy server.
Yes, Palo Alto Networks has released PAN-OS versions 8.1.17, 9.0.11, and 9.1.2 to address the vulnerability CVE-2020-2048.