CWE
212 200
Advisory Published
Updated

CVE-2021-3031: Infoleak

First published: Wed Jan 13 2021(Updated: )

Padding bytes in Ethernet packets on PA-200, PA-220, PA-500, PA-800, PA-2000 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series firewalls are not cleared before the data frame is created. This leaks a small amount of random information from the firewall memory into the Ethernet packets. An attacker on the same Ethernet subnet as the PAN-OS firewall is able to collect potentially sensitive information from these packets. This issue is also known as Etherleak and is detected by security scanners as CVE-2003-0001. This issue impacts: PAN-OS 8.1 version earlier than PAN-OS 8.1.18; PAN-OS 9.0 versions earlier than PAN-OS 9.0.12; PAN-OS 9.1 versions earlier than PAN-OS 9.1.5.

Credit: psirt@paloaltonetworks.com

Affected SoftwareAffected VersionHow to fix
Paloaltonetworks Pan-os>=8.1.0<8.1.18
Paloaltonetworks Pan-os>=9.0.0<9.0.12
Paloaltonetworks Pan-os>=9.1.0<9.1.5
Paloaltonetworks Pa-200
Paloaltonetworks Pa-2020
Paloaltonetworks Pa-2050
Paloaltonetworks Pa-220
Paloaltonetworks Pa-3020
Paloaltonetworks Pa-3050
Paloaltonetworks Pa-3060
Paloaltonetworks Pa-3220
Paloaltonetworks Pa-3250
Paloaltonetworks Pa-3260
Paloaltonetworks Pa-500
Paloaltonetworks Pa-5200
Paloaltonetworks Pa-800

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2021-3031?

    CVE-2021-3031 is a vulnerability in Palo Alto Networks firewalls that allows for leakage of random information from firewall memory into Ethernet packets due to padding bytes not being cleared.

  • Which products are affected by CVE-2021-3031?

    PA-200, PA-220, PA-500, PA-800, PA-2000 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series firewalls are affected by CVE-2021-3031.

  • How severe is CVE-2021-3031?

    CVE-2021-3031 has a severity rating of 4.3, which is considered medium.

  • How can I fix CVE-2021-3031?

    To fix CVE-2021-3031, Palo Alto Networks recommends upgrading to PAN-OS version 8.1.18, 9.0.12, or 9.1.5.

  • Where can I find more information about CVE-2021-3031?

    You can find more information about CVE-2021-3031 on the Palo Alto Networks security advisory page: https://security.paloaltonetworks.com/CVE-2021-3031

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203